Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 10:26

General

  • Target

    577028f2ee33bde1bde022ab2b0add76c8b35041d50f194e59cb47187bd9bd1a.exe

  • Size

    45KB

  • MD5

    ccc6c72a15e2a003907a85c9fe2401b0

  • SHA1

    ce2ed5738913c466e7c63b380ad9150ecf34267b

  • SHA256

    577028f2ee33bde1bde022ab2b0add76c8b35041d50f194e59cb47187bd9bd1a

  • SHA512

    73898628b62240056164936c2d721235805853a2ab5512051be5bbde1125e7b17379a0a1a6418d1f56e0d3b09c1a55e56a9707ff9114e33441977dcbff24160a

  • SSDEEP

    768:FuPfZTg4pYiWUU9jjmo2qroMGSe8IwPIdzjb+gX3ixhWjy7otnz2EuzBDZSx:FuPfZTgKa2jMkd3bBXS3qy7M2rVdSx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

M13

C2

editorials.duckdns.org:5801

Mutex

FMP1pUmaOyhu

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

remcos

Botnet

QBB-MAR24

C2

vdt11.duckdns.org:30277

accumulator.duckdns.org:30288

fourseason4.duckdns.org:30299

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Mozila

  • mouse_option

    false

  • mutex

    zswqtyomhf-IUVU4S

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    nvidia

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    quickbook;adp;intuit;bank;wellsfargo;truist;paytrace;cvv;csc;chase;shopify;square;visa;master;amex;globalgateway;firstdata;nuvei;merchant

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\577028f2ee33bde1bde022ab2b0add76c8b35041d50f194e59cb47187bd9bd1a.exe
        "C:\Users\Admin\AppData\Local\Temp\577028f2ee33bde1bde022ab2b0add76c8b35041d50f194e59cb47187bd9bd1a.exe"
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3148
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jegvxk.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4932
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jegvxk.exe"'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4516
            • C:\Users\Admin\AppData\Local\Temp\jegvxk.exe
              "C:\Users\Admin\AppData\Local\Temp\jegvxk.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4228
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k move Ca Ca.cmd & Ca.cmd & exit
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4344
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  7⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:800
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "wrsa.exe opssvc.exe"
                  7⤵
                    PID:4596
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    7⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:796
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                    7⤵
                      PID:996
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 55261565
                      7⤵
                        PID:4308
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /V "PracticePpCloserCholesterol" Trauma
                        7⤵
                          PID:2132
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b Ralph + Allah + Ships + Dramatic + Pubs + Tn 55261565\B
                          7⤵
                            PID:4400
                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55261565\Producers.pif
                            55261565\Producers.pif 55261565\B
                            7⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:4936
                          • C:\Windows\SysWOW64\PING.EXE
                            ping -n 5 127.0.0.1
                            7⤵
                            • Runs ping.exe
                            PID:3972
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c schtasks.exe /create /tn "Ae" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\DataHarbor.js'" /sc minute /mo 5 /F
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1564
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /create /tn "Ae" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\DataHarbor.js'" /sc minute /mo 5 /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:3112
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\SecureData Technologies\DataHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataHarbor.url" & exit
                  2⤵
                  • Drops startup file
                  PID:2628
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4328 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:1028

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55261565\B

                  Filesize

                  696KB

                  MD5

                  527d80b7cc8f3e5a75f4e2a0633e01d4

                  SHA1

                  2c1e3d2b3e0a683773532347dbe32ce5dd18831f

                  SHA256

                  00de072e034f1fe7b762f1c3db2c1759f426bf805f65b1d990648a6948004d7f

                  SHA512

                  031db84a96f60a44b99a951a81bb34f36f3de1d92ec26d62a0e32bba83c6a9ffe3a0be2469825909808d6bab7041d738e762590bbf489aad012d68bfef29533c

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55261565\Producers.pif

                  Filesize

                  915KB

                  MD5

                  b06e67f9767e5023892d9698703ad098

                  SHA1

                  acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                  SHA256

                  8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                  SHA512

                  7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Address

                  Filesize

                  57KB

                  MD5

                  2f1444edbc395a062c86e4bd4d35c7e1

                  SHA1

                  83e32d68d566c862b46d88c59be2643c8f4298e6

                  SHA256

                  60c993b8ce5a85fa643fc07506baa5201310b862dff680c626b4f7de17dffdea

                  SHA512

                  78163ac68634490be8e5d2d233ab1422cb8ae74c47cf8dd265d914c0fa30dff5a0c89ef30c84a5e1fb62ed297f939675f328da8c43f401ab1ae5662ddb24affb

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Against

                  Filesize

                  8KB

                  MD5

                  0ac0230d7cc179e8bdfb4c30fc76b0fe

                  SHA1

                  1664ba8e23c60df302087d513eeace2d1eac37f7

                  SHA256

                  d8a21e4ad99b539d6c796dfeebad93c05004961b0dcf757064f3f0c81119dd07

                  SHA512

                  a176375691b11ff2847f00453947579437a0ee0570863f8ac9f80bee7b79c11c5dd66c1131b29f256ebb9e6a1df17a1c33d3e71583ff3991bb6f4797998828f1

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Agent

                  Filesize

                  22KB

                  MD5

                  50019e430f9228f1bc52800e46930871

                  SHA1

                  b16ca9636047c2121221ee41886f55d68da105d6

                  SHA256

                  9dea69aa231abec6ff7d03648f37433dc3eb51db157241ea79a2b87904e17840

                  SHA512

                  f6d57facccd075dda5a453d80369f0b8d38ab256ab1b2b607b0899bf64ab37c11494810b8465d85e974f2786d35ce5cac6ac79b6a8be5a461d28c997ea8b7089

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Allah

                  Filesize

                  198KB

                  MD5

                  8862fcc4c27af7eddcb30df766546ddf

                  SHA1

                  eb8c12e471b3592f34774828084ec228b73e1087

                  SHA256

                  e79d50c21c76b291a3517d5b205810799c82ad72e21c33240ba9e6e4e42d6c5a

                  SHA512

                  71b96157470d5d65cc4eadb4a7baa5f033e1f6b7aaacc58a9e8358dc87382ddb0ccc9ac63a36079f3c39211cdc08a53fc31ab723223ba016088ed123c2573d39

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Amended

                  Filesize

                  30KB

                  MD5

                  7d67a0930dccb0a2e0e9d78973ea9b89

                  SHA1

                  ae6d65028ecacc8a7de68f43294fb44aeb5df7e9

                  SHA256

                  fcb294f8b795bbc27eef59132bfc5496f432557a833dae99ddeada9f8f587ad2

                  SHA512

                  3b68cc2174d9cb305dc230ce0c1e840f5f2f5731b29b7d8d66d94a696a918dd6f92829726ef401791e836c13f12c6d01714b8f77a6ef3933fa7c25e543738499

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Burden

                  Filesize

                  31KB

                  MD5

                  8ab299d3bed4a3afb22f744748497117

                  SHA1

                  8db4d6f47d474a8634058d1b892e6855150c5432

                  SHA256

                  53af6a0c5f6cbf03170bceb0143ebd0f0708cd70faa2a704166b7232e70ae9f7

                  SHA512

                  0bda9acdecdacfb7398b92499a4f05ec107cfb3285f338834fd2c75af491fa2abccbafcb2065ff78d1ba3e681a300677cb5a0a21b74acb97160d3ba9b076dcb6

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ca

                  Filesize

                  6KB

                  MD5

                  33a1d5c68f3db5b14314c1e7ea2e3670

                  SHA1

                  ca078955954ff8dd7bec6d5d19a6324dc44cd40f

                  SHA256

                  8fe182906edf9269837cecf291b0354a48d5bf5e7d6d67538d7f99ba3539c4f4

                  SHA512

                  1a9d88449968fcf90e1d6346a59fdf71287e11d6d808bb012ec313077e1b8660a8834197c9e1d955adec73214a241900da77d181f94b3866b122028837a5169c

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Certificate

                  Filesize

                  31KB

                  MD5

                  184f096751caec12704430a8e41e3aad

                  SHA1

                  2ee65c621054a7869e89ecdce4841d85eccf1f67

                  SHA256

                  15e88eee0317b96ad9ca8dd935ae2f00d97d1b452f858b8dd1eccbf147fec8f7

                  SHA512

                  0bf022f3983543b4af8d03a122410b16cb67b1dd2528a02fa847fede26b4d6a1dee3d24ef9f9ee27848bfa8648aa005bd29b84dd84d14692f09e854833411d0c

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Contacting

                  Filesize

                  28KB

                  MD5

                  076ee29c9d87047bfc8e9ae0e4866232

                  SHA1

                  0da2fb4164c91698d44d5da8982d046842a7cafb

                  SHA256

                  6c54e47993d96de4cff50a58f888210fea1638478e7c1900c5603b1190be1e67

                  SHA512

                  287ec22f3d1d61eaad2c4cdd24fc95fdbca9aa7818f4b9d165088edce57c744758e5d73caa0e4a4e1ac3a5a3c1e2f0da2135e61b0681b9d8d2f95c27f3975fbf

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Countries

                  Filesize

                  40KB

                  MD5

                  847bd3ca5d517b615b2aae09396103a4

                  SHA1

                  da18825c6dd4f0d298a553bf75acc419070cc89b

                  SHA256

                  cb14061f09209cffbb5f78f14e8f58526d80574166c616a90c018389777b307e

                  SHA512

                  83542bf26a49ef828e473cf230533c9b7a86dc8d2db75619dcfbda8e4be02bbed79e9d97e92389070d93739a84a1b6bab8b6293f75bb76fd72a2f75181c0f999

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Described

                  Filesize

                  5KB

                  MD5

                  fb58cfd77efdc56bd607e238438eeb24

                  SHA1

                  98b986c4f7487988f36de614e9d81fdc454339e0

                  SHA256

                  7131c4fad13a64192c6f45042bf677be066c4674800d9d341e7caabed60826f3

                  SHA512

                  381b35cc8f3ea44bea1dc8d0eb2eccc26aee51c0f18cb54fabd1ef26e06e52bea7db1a198c4a81ffa29e3885bb0cb39514624a7b99b242ddb81a30e7728c9237

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Doc

                  Filesize

                  27KB

                  MD5

                  cae39f23bcceede4dfb3bec27d287738

                  SHA1

                  eee360e72de481ed0ee633c92d824e7161f6e53c

                  SHA256

                  f5722e096f7792fa1e2ad0feb95e699708dd1b0b0dab2bff6084dc7284ca3f5f

                  SHA512

                  b33a944b9500af4fe79a33dd8b58961ac52f9874f0f6e5ed95509996d8ccdcf3affaf6d7132b45243ef9b5df3ed939d3f78db4a05896b396e7b5112efd997a5f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Doug

                  Filesize

                  66KB

                  MD5

                  f973ed00174e893650e2ab59d49c238f

                  SHA1

                  68c82647ec792a91856d0357a9036cbc3b493611

                  SHA256

                  867363edf9a833d4b65f8e85d40da799c3b48f4179728b664784570425232eef

                  SHA512

                  674cab63e6329fa854ceaa5aa946f4df8765497cc685ad2ba9d0cad83bce33dd39880f8112f7b52abccbd450c9582609f59b231cb54f71459679950c3d89d4e6

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Dramatic

                  Filesize

                  104KB

                  MD5

                  a80e448148e31bf56fe104e43bc08924

                  SHA1

                  b3921c7e5b0e6199b18d4554dca5e4c4d114c669

                  SHA256

                  58553dcd2a100a31cd005f0c29257b7d784c118d12368cc1f155a7ec98a94769

                  SHA512

                  4c639d59d117714672ee53f4b7f85fd2169cc5062e3fc16c2b64d8987ab813ecf1131493df7189c30f616b38e8ed1ff3c87fe8ee0ac1654f51e6d86e7bd96879

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Easter

                  Filesize

                  31KB

                  MD5

                  bd149eda715704536ff042e5e345dd39

                  SHA1

                  f387f3b2a5dac9faca21654feb760a019c0fbc88

                  SHA256

                  4c4ab3ff5ea503b7c6bc341c6934b278a67a8834073596ae9504db5b47e541b7

                  SHA512

                  d11aacd76dee6d1208a071f8709c4e8d694c31d1f99485674cbce989ff5e57af7073066ddf734d4ce5ea2ded4d70fc7af18ccc4dbe9f5343a2a0e82a9c9b89df

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Engineers

                  Filesize

                  21KB

                  MD5

                  f6d835baa00eb12b061c27bf6e97e3f5

                  SHA1

                  75e0bcb7dc2f124a6c4787dad815b04d151d9048

                  SHA256

                  2ee58656feaefac362ab00ec07f5d3fdf248860a0b88b9ee4ccd2baae8a72709

                  SHA512

                  704cfa5e5b7f9740cbc9be898309bce6771ea286dc849b43eb02f90dd9cd33a3e5c2c1e6bf422cc5e25930b6ffda3f503d19100e644d8bb71189ac0d8ab9201a

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Finals

                  Filesize

                  28KB

                  MD5

                  c356a5d4880a316896a4c858e30172bd

                  SHA1

                  0a3358d27d11d90158037754d2d83325130e8beb

                  SHA256

                  395f842ea0b9b99664044d06ad386cfc0ce507dce83fa7f379a96b5986d9ec58

                  SHA512

                  b8ae8db0e5e8bfe6ffb20081168f674dc4db9e965274480d3dd0a0d4f3458dcd43a82b1dd0c1b5da369c5097ae106368402cf835704563b164eed26059399cad

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Gives

                  Filesize

                  61KB

                  MD5

                  bdbfdcb87d5de7dfb24af6cc9df2f3e6

                  SHA1

                  a48d1791550452811782c052a22242234fb74e92

                  SHA256

                  e12d69c1d47f4a32f2fb90de6a86f605884aa039a5a82f772f91f43347923958

                  SHA512

                  e419ad8d30ca7624f0f5d79df800c1b13622edd3a995c6074487f58b1992f1c8db21d2f1753e05aa208a310ee68e0119075c0d20791212503e71f3a660e5a18f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Gross

                  Filesize

                  31KB

                  MD5

                  0a82c510c42d6fe2b50f2fe6a8d6ef8b

                  SHA1

                  840291cdcc2baa6e5395826653639c7fcec76a39

                  SHA256

                  e8847bf2f61cbcfc2b933c54e128e566d6378c86a57c661a46a45e68cad0579d

                  SHA512

                  f19402bad34fa96005dde9ad6a7b99877295491cbbf89a907a2aeb05fc42d17005e2f8ac5e348aab73a4b2a991a8593e82605a7daa14d9afe3e704b1af495549

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Handle

                  Filesize

                  14KB

                  MD5

                  c5ae05d4ce0ae93518b0a3821a7962ff

                  SHA1

                  653c20d2ec0ac43784c6f18bbfb48e3a71aecedc

                  SHA256

                  a27d3a57a1577a2f160f1a8a876448c7549cf2ed83a23b61a6ac872e7015250c

                  SHA512

                  9adfb2a10b105fa3a7b4192a58a2c9a10a3b4f44cfd6660512c2116f16dc751cea4a55af72dcb16990364ee9580fdc4a98c9e180b91ef54316aceba0d3bc93fd

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Horrible

                  Filesize

                  5KB

                  MD5

                  05081d597b979afd138a8a8f0d96af1b

                  SHA1

                  29280d7ad8d7ce292daed3495118259c409deb51

                  SHA256

                  b49bc653add694ddc2f0d2262b82cbf7be9641c94059d7f33d581d3c1b1f231f

                  SHA512

                  591eb563bf9ef8d308c372c33bd5e9b302d4d97f5f734bc16bacf801fc33d1462047da4843bd1373a92a814c44c0262a73f2135e7cd4cc7c69147a51bc0a50ca

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Instructional

                  Filesize

                  55KB

                  MD5

                  7ef57a224f0b827ac433627101972165

                  SHA1

                  63268e080eaf461b963c034ad8ee0799988fd5d0

                  SHA256

                  548512c10c8ff729a151bfbf1d20477e4237464c21738e75c699cb7b58eca2e5

                  SHA512

                  12a3dfca855a0555d2a24ab24e3e926546314c01e05f11cf777f10d6d52cec406cd01831bd70155c51ad580ac4c6bfcf55b91d549e64ebad2f1dfc07b88fb00c

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Leu

                  Filesize

                  28KB

                  MD5

                  91960eaae040925930e30b4fac5082f1

                  SHA1

                  fa42466de1f8cd2bd29c333baf1ffccc639e98e7

                  SHA256

                  227d2da3fc718dc7c43898027a4acc399527f34ffe9818f9bc9b06c093501efa

                  SHA512

                  11bb17198bc66cc9034ce3ef21ea7cc417fb666de7f6db365a1b932f381dae8fe9faeaf84beaad83115098c6b72fda3372775aa6f79391d3cc62a0680d4c7d53

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Newscom

                  Filesize

                  65KB

                  MD5

                  3f1f913a4889eb35bb0123a5c180c208

                  SHA1

                  a7503b5656839d269031fe26f52ef37b3d489af1

                  SHA256

                  91fb912c434de2af34de53abec52c80ece480ca84951b0b76d6ca40b401d8d79

                  SHA512

                  7bd5b6599f89c138efb8f07614df5728888c39f3f35629218c121af90a9ac0468dc7c6f216225d7c812d7dfd375567c392da3259e66d70a165b0ed5ee6999c21

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Oakland

                  Filesize

                  6KB

                  MD5

                  57b1d850d6d3a51c78d7fdbb9553fc46

                  SHA1

                  e287133cfd2e509a41cb3c4714ac2473a22df84c

                  SHA256

                  73cc9cd63bc03f5d024c861e7f87e8cc1e2d2d22152fea1af091c854b4db106c

                  SHA512

                  33fbfd4fe6c66bee6e14b76e0406bc0b3b81798b846096b265c11371434eccb1d1e9530ed5e2ee126194b9c8dd50d8388661c2ea52e6c1432a2c0f9494e8bae6

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Plaza

                  Filesize

                  53KB

                  MD5

                  7a8340d1fb26243fd3e727e6fb29b876

                  SHA1

                  3bfe9f6bf478818969b7e26b595d533a69389d5d

                  SHA256

                  9f8e7f0e59bff04d54d55a938b8639494e602d9e7c914b137fbdbed48aa7e387

                  SHA512

                  c958b9c17b55e071d73d8292c39508f2d86c5acf0c58a6752ed74bad7c1261a037131a0aac5679da8c1292b83713eecd74a46383f38d337799e86567000879f7

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Pubs

                  Filesize

                  80KB

                  MD5

                  f16b992d5d57ea401af7de623db61d9a

                  SHA1

                  e2d8ddc060ebe7d025c3e89ab91b7174ef4dc3c4

                  SHA256

                  6bb460957673c06d027aeb7b337a3bd66288bc33ca9787a2e59ad8dbc0fb2149

                  SHA512

                  3347c776f7a37e200ca662b69600d768fcfb49ffd92f97c08256f070da140f1cbd8e89856614bd70b360c9a927bb82587695155bb257a7bfd45efb962f6dac75

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ralph

                  Filesize

                  139KB

                  MD5

                  a974b58f7e758012641b34eb2951594d

                  SHA1

                  d5dcd28b2a96fc60d8e772c90f7baec70fd19733

                  SHA256

                  e89150742355fc76dc8f918e47b5cc64a61373e2e5b25d1976fd126fbb47bee6

                  SHA512

                  01c1093d390e851008babca46990886a5dbf547c689dafb6b56bfb522dcb542c61346dcdaa8cd52c9917c4ef31e39d1bd2df3be12339e4c260624e9976917273

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ship

                  Filesize

                  59KB

                  MD5

                  4ee2eb033971771442694d51f877aa08

                  SHA1

                  10e1f53b1f76d31616b02263f1c8155a31a12ae3

                  SHA256

                  eab751b00d7868c43dd73fc335db478eb972614b58e23a9f0c3bb0df646f717e

                  SHA512

                  2bad7a41283affac84e065714a5fb93c77d331349cfe9534379f31ef323b5f76ad23b924f9ac22d266d585f60469f5f125903d9a11f114ec528ba61e1b1d8af4

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ships

                  Filesize

                  119KB

                  MD5

                  1bf3f6b55b113d110de3091575ac02c2

                  SHA1

                  873bbfc1f69313bdec577fd1136adc67eec270e0

                  SHA256

                  ad21d827e3b53f19c72871b04d7d1571061b042ed78c088e900f885470afa56d

                  SHA512

                  00dd3b147ad0ccfe0199e8ac0df8fc18956f0c6000d23b5d18adac4e46b81015ef165ad26dc6aa860a79fcdfa9aa2ac4f6127c35086f3e45b1362582135bb247

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Titles

                  Filesize

                  40KB

                  MD5

                  21e0a2dfe5a51dd772c2a102d6703b12

                  SHA1

                  63d0f52d0a6e5a6dcfd62aab7299cad5d8d2414d

                  SHA256

                  2e401bf0a9b30780a303542e6be448e35252343f9075be7fb2ce5128310c849f

                  SHA512

                  d88621355dd802ff274385c82d9fcf88e58e1b8ccb62577fca99cafa6bba26f9644d5e8162888c1bf97b89450c45daad741e41d7ad3ca5bf4c0d07969274be98

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Tn

                  Filesize

                  56KB

                  MD5

                  4f1a0562fab81fc5c47804290b2a144f

                  SHA1

                  0f9ef6730ed2fd82914e39c6a45cb1f0efa7c676

                  SHA256

                  c3ec52ded75e4b59581b597428cd789d410e268032f634bc79bbc0fc5c77f3be

                  SHA512

                  f91e4494659f2cb5a78a3abd6ff1d39777344bfb12eb1202fe85250f422e075a7d7250e072e839dd6add6d149a51b82bda2298e72b5fc0578004308b1ba30ea8

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Transmission

                  Filesize

                  22KB

                  MD5

                  b92c4f6b4352a908f74255aea103df2b

                  SHA1

                  56d2656225f2268810cd29ae576bd87b8590affe

                  SHA256

                  d463bea5d65edb53fabc498a9e6f8e50b987005b92265250a78a46ba113cebd6

                  SHA512

                  070855772dd586dde5a3a0edeaae35b1a0de660b2dabda239ae3aac96de960c1124ed3da02f46412dcfa6d8e29c6651352c8c425e3f974421f711ad33a213495

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Trauma

                  Filesize

                  116B

                  MD5

                  d28368b59133b09310fe4bfed02bb30b

                  SHA1

                  3ea95f6849f9eb2aedd95315b64830da935dc649

                  SHA256

                  bac7834614bccbd0b5817fe71686694c45b94e8dad5166d2882e5bf1e5c66efe

                  SHA512

                  9a73088934ece6fe4858999f011b2eda85461757928fead68523487858dec861918ec9a9bac8c972017e3e93eb78bc3519e57f06665cd94907033f53431668b2

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Troy

                  Filesize

                  40KB

                  MD5

                  2e21b3eaa80d05db9ce298446fa8feac

                  SHA1

                  12c1772d993a5daef5eff187b349af39d2c950f5

                  SHA256

                  23b268706366127a038c863b295be8265bfaf6b9338ad5a000189977a42b1a73

                  SHA512

                  0a58764d032c022806ab057c7b936103c4a982540385a4f95c565ea6a8e16e56ec7209ef28929d25b57e474c01a9f183f9ced8608faa725faa60ac1bc2d4d6c7

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Undertaken

                  Filesize

                  11KB

                  MD5

                  1f2eaeafaa57afc5f15db490df5bd283

                  SHA1

                  fc71234945dc27086d4dc16c542ee276bf02777a

                  SHA256

                  f2182e5d3dc0558ee5860bca90972d50ee27f5c8d227a14be9623e3f4f0d6cdf

                  SHA512

                  cd88baea6638d98ac23316c9d9d36df5fdb2972ac365781a3db73b91bc1e28514b2346b1e04391193a458479ac036bc7df75643d5058a5a3e3a6600630e02304

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wnc2cmcg.r4c.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\jegvxk.exe

                  Filesize

                  1.2MB

                  MD5

                  dbdb7a817464438f4a84aec658e670fe

                  SHA1

                  8518a2297881af1ec621837e2f23eec145fff56c

                  SHA256

                  32d51390a20fca6fe51be252a8b2f7baff4aa63b156bc0590cbbc2912d1c6218

                  SHA512

                  029f7f8cc6cceea92bde409a5e8af65e99c168d2b503504d38d3437fdcb8bc8ec3ee2c815ff3582a9b892da2799340beb116de2e3910ad28eb4d2bf5d0186b27

                • memory/3148-8-0x0000000006830000-0x0000000006DD4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3148-12-0x00000000017F0000-0x000000000180E000-memory.dmp

                  Filesize

                  120KB

                • memory/3148-1-0x0000000000DF0000-0x0000000000E02000-memory.dmp

                  Filesize

                  72KB

                • memory/3148-2-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3148-0-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

                  Filesize

                  4KB

                • memory/3148-3-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

                  Filesize

                  4KB

                • memory/3148-4-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3148-7-0x00000000061E0000-0x000000000627C000-memory.dmp

                  Filesize

                  624KB

                • memory/3148-9-0x0000000005CD0000-0x0000000005D36000-memory.dmp

                  Filesize

                  408KB

                • memory/3148-10-0x00000000072A0000-0x0000000007316000-memory.dmp

                  Filesize

                  472KB

                • memory/3148-11-0x0000000007220000-0x0000000007282000-memory.dmp

                  Filesize

                  392KB

                • memory/4516-14-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4516-26-0x0000000005720000-0x0000000005A74000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4516-15-0x00000000023E0000-0x0000000002416000-memory.dmp

                  Filesize

                  216KB

                • memory/4516-34-0x0000000006D40000-0x0000000006DD6000-memory.dmp

                  Filesize

                  600KB

                • memory/4516-16-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4516-17-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4516-42-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4516-18-0x0000000004F40000-0x0000000005568000-memory.dmp

                  Filesize

                  6.2MB

                • memory/4516-35-0x0000000006220000-0x000000000623A000-memory.dmp

                  Filesize

                  104KB

                • memory/4516-33-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4516-36-0x0000000006270000-0x0000000006292000-memory.dmp

                  Filesize

                  136KB

                • memory/4516-19-0x00000000055A0000-0x00000000055C2000-memory.dmp

                  Filesize

                  136KB

                • memory/4516-20-0x0000000005640000-0x00000000056A6000-memory.dmp

                  Filesize

                  408KB

                • memory/4516-41-0x0000000074E70000-0x0000000075620000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4516-32-0x0000000005D80000-0x0000000005DCC000-memory.dmp

                  Filesize

                  304KB

                • memory/4516-31-0x0000000005C10000-0x0000000005C2E000-memory.dmp

                  Filesize

                  120KB

                • memory/4936-129-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-140-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-130-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-131-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-132-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-133-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-134-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-135-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-136-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-128-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-141-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-142-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-143-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-145-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-146-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-148-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-147-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB

                • memory/4936-149-0x0000000000100000-0x0000000000182000-memory.dmp

                  Filesize

                  520KB