Analysis Overview
SHA256
fc68c8abc16227d7157a7666f71919af2702a891419d74e6fed5f4b324e3487d
Threat Level: Known bad
The file kdmapper.rar was found to be: Known bad.
Malicious Activity Summary
Detect Neshta payload
Neshta
Xworm
Detect Xworm Payload
Command and Scripting Interpreter: PowerShell
Reads user/profile data of web browsers
Modifies system executable filetype association
Executes dropped EXE
Drops startup file
Adds Run key to start application
Looks up external IP address via web service
Drops file in Program Files directory
Drops file in Windows directory
Enumerates physical storage devices
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Modifies registry class
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-21 17:42
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-21 17:42
Reported
2024-05-21 17:45
Platform
win11-20240508-en
Max time kernel
146s
Max time network
151s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Xworm
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RtkAudUService64.lnk | C:\ProgramData\kdmapper.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RtkAudUService64.lnk | C:\ProgramData\kdmapper.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
| N/A | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\RtkAudUService64 = "C:\\ProgramData\\RtkAudUService64.exe" | C:\ProgramData\kdmapper.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\msedge.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI8A19~1\ImagingDevices.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_proxy.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmpshare.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdate.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\msedge_proxy.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\kdmapper.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~2\wab.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmprph.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\iexplore.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\setup_wm.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\pwahelper.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ieinstal.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_pwa_launcher.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmplayer.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\notification_helper.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ielowutil.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmlaunch.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\cookie_exporter.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI8A19~1\ImagingDevices.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmpshare.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\iexplore.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\kdmapper.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\setup_wm.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~2\wabmig.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\Installer\setup.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings | C:\ProgramData\kdmapper.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\kdmapper.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\kdmapper.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\kdmapper\kdmapper.exe
"C:\Users\Admin\AppData\Local\Temp\kdmapper\kdmapper.exe"
C:\ProgramData\kdmapper.exe
"C:\ProgramData\kdmapper.exe"
C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe
"C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\kdmapper.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\kdmapper.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kdmapper.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kdmapper.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\RtkAudUService64.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\RtkAudUService64.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RtkAudUService64.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RtkAudUService64.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RtkAudUService64" /tr "C:\ProgramData\RtkAudUService64.exe"
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe /create /f /RL HIGHEST /sc minute /mo 1 /tn RtkAudUService64 /tr C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | keyauth.win | udp |
| US | 172.67.72.57:443 | keyauth.win | tcp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| DE | 45.88.90.228:7000 | tcp | |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| DE | 45.88.90.228:7000 | tcp | |
| DE | 45.88.90.228:7000 | tcp | |
| DE | 45.88.90.228:7000 | tcp |
Files
memory/2948-0-0x0000000074A71000-0x0000000074A72000-memory.dmp
memory/2948-1-0x0000000074A70000-0x0000000075021000-memory.dmp
memory/2948-2-0x0000000074A70000-0x0000000075021000-memory.dmp
C:\ProgramData\kdmapper.exe
| MD5 | 1fb060973127af435a948361cba03b9e |
| SHA1 | f861149e155e9bb3ef1f2f748874e884cde54cee |
| SHA256 | 194bee6ca7df1015b6b5c5296d04f711128a4ec2970bdab1bf621af758251949 |
| SHA512 | 8d22e67d3200ab028822985e35c6314051b1dc0cab612e6917e326f0c75ad9d9a97af7f8146f70468026b5efcc5d09d4d1d9f89f34191cfed3179db1285e5eba |
memory/3400-17-0x00007FF8262D3000-0x00007FF8262D5000-memory.dmp
C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe
| MD5 | accad9cf663d5819ab171725c62de978 |
| SHA1 | 6abf132629ebd01588f95e6e87422142145d2c21 |
| SHA256 | 48ef492c2a7daed9b5fd95cbe3b567a6f75e123ae4d9afeafb0fa1d3784a9c0b |
| SHA512 | 4fc791d57b89c4792dba0820af337cea924747efa102952f46afa9ba25f42360836146a9cd7285104657bb4756dfba77856f71e20290cf2f6202a1032ac416da |
memory/3400-20-0x0000000000DA0000-0x0000000000DB8000-memory.dmp
memory/2948-26-0x0000000074A70000-0x0000000075021000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe
| MD5 | c6468039d2d2d29d67da192c4b93fbce |
| SHA1 | 6c295a9bff97d20fd8d1e7bd0306047965c03c27 |
| SHA256 | 574ffc78000ac5e306858cead0d0669ecc3c0bd2541001bab1d2f5c46e9d74e7 |
| SHA512 | 5777425adec2b763f3535dce5963422b986fb2ec25517f326b99956ffe5970a477f05cb1009f1fd54da2890ab26e79687bcf05efacb8f8a06a2bc0400b228be9 |
memory/3908-38-0x00000000009F0000-0x0000000000A0C000-memory.dmp
memory/3908-39-0x0000000002F70000-0x0000000002F82000-memory.dmp
memory/3908-41-0x0000000005EB0000-0x0000000005EEC000-memory.dmp
memory/3400-149-0x00007FF8262D0000-0x00007FF826D92000-memory.dmp
C:\Windows\svchost.com
| MD5 | c23ae27db3868ed615e2fb10aad9c430 |
| SHA1 | 2ae4f18703f36e3e484da9a14cf557a2f2c83d8d |
| SHA256 | a61dd97cf9eed6d01cd393a00f9cecc33368bd5a04ccbbb74ddcb37b984ebcec |
| SHA512 | 4504277050aec35a50476148de71c88fbb1b520bd8c2e8c79e30e7dd6b1f5d41889b9f35adc9bf3c4fdbcba0652e02a4deb9fba608874a3f5d8c0637cbb8adef |
memory/2016-158-0x0000000004D20000-0x0000000004D56000-memory.dmp
memory/2016-159-0x0000000005390000-0x00000000059BA000-memory.dmp
memory/2016-160-0x00000000051D0000-0x00000000051F2000-memory.dmp
memory/2016-161-0x00000000059C0000-0x0000000005A26000-memory.dmp
memory/2016-162-0x0000000005AB0000-0x0000000005B16000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cbasjdjl.0ua.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe
| MD5 | 8ffc3bdf4a1903d9e28b99d1643fc9c7 |
| SHA1 | 919ba8594db0ae245a8abd80f9f3698826fc6fe5 |
| SHA256 | 8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6 |
| SHA512 | 0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE
| MD5 | 3b73078a714bf61d1c19ebc3afc0e454 |
| SHA1 | 9abeabd74613a2f533e2244c9ee6f967188e4e7e |
| SHA256 | ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29 |
| SHA512 | 75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE
| MD5 | 9dfcdd1ab508b26917bb2461488d8605 |
| SHA1 | 4ba6342bcf4942ade05fb12db83da89dc8c56a21 |
| SHA256 | ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5 |
| SHA512 | 1afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE
| MD5 | 176436d406fd1aabebae353963b3ebcf |
| SHA1 | 9ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a |
| SHA256 | 2f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f |
| SHA512 | a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE
| MD5 | 12c29dd57aa69f45ddd2e47620e0a8d9 |
| SHA1 | ba297aa3fe237ca916257bc46370b360a2db2223 |
| SHA256 | 22a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880 |
| SHA512 | 255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE
| MD5 | 92dc0a5b61c98ac6ca3c9e09711e0a5d |
| SHA1 | f809f50cfdfbc469561bced921d0bad343a0d7b4 |
| SHA256 | 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc |
| SHA512 | d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE
| MD5 | 8c753d6448183dea5269445738486e01 |
| SHA1 | ebbbdc0022ca7487cd6294714cd3fbcb70923af9 |
| SHA256 | 473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997 |
| SHA512 | 4f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE
| MD5 | 4ddc609ae13a777493f3eeda70a81d40 |
| SHA1 | 8957c390f9b2c136d37190e32bccae3ae671c80a |
| SHA256 | 16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950 |
| SHA512 | 9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe
| MD5 | 5791075058b526842f4601c46abd59f5 |
| SHA1 | b2748f7542e2eebcd0353c3720d92bbffad8678f |
| SHA256 | 5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394 |
| SHA512 | 83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe
| MD5 | cce8964848413b49f18a44da9cb0a79b |
| SHA1 | 0b7452100d400acebb1c1887542f322a92cbd7ae |
| SHA256 | fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5 |
| SHA512 | bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE
| MD5 | 09acdc5bbec5a47e8ae47f4a348541e2 |
| SHA1 | 658f64967b2a9372c1c0bdd59c6fb2a18301d891 |
| SHA256 | 1b5c715d71384f043843ea1785a6873a9f39d2daae112ccdeffcd88b10a3a403 |
| SHA512 | 3867bf98e1a0e253114a98b78b047b0d8282b5abf4aaf836f31cc0e26224e2a1b802c65df9d90dc7696a6dbcb9a8e4b900f1d1299e1b11e36f095ebaf8a2e5b8 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe
| MD5 | 576410de51e63c3b5442540c8fdacbee |
| SHA1 | 8de673b679e0fee6e460cbf4f21ab728e41e0973 |
| SHA256 | 3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe |
| SHA512 | f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe
| MD5 | 322302633e36360a24252f6291cdfc91 |
| SHA1 | 238ed62353776c646957efefc0174c545c2afa3d |
| SHA256 | 31da9632f5d25806b77b617d48da52a14afc574bbe1653120f97705284ea566c |
| SHA512 | 5a1f7c44ce7f5036bffc18ebac39e2bf70e6f35fa252617d665b26448f4c4473adfa115467b7e2d9b7068823e448f74410cdcdfef1ac1c09021e051921787373 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE
| MD5 | 39c8a4c2c3984b64b701b85cb724533b |
| SHA1 | c911f4c4070dfe9a35d9adcb7de6e6fb1482ce00 |
| SHA256 | 888a1dd0033e5d758a4e731e3e55357de866e80d03b1b194375f714e1fd4351d |
| SHA512 | f42ca2962fe60cff1a13dea8b81ff0647b317c785ee4f5159c38487c34d33aecba8478757047d31ab2ee893fbdcb91a21655353456ba6a018fc71b2278db4db2 |
memory/2016-173-0x0000000005BE0000-0x0000000005F37000-memory.dmp
memory/2016-187-0x0000000006640000-0x000000000668C000-memory.dmp
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe
| MD5 | d47ed8961782d9e27f359447fa86c266 |
| SHA1 | d37d3f962c8d302b18ec468b4abe94f792f72a3b |
| SHA256 | b1ec065f71cc40f400e006586d370997102860504fd643b235e8ed9f5607262a |
| SHA512 | 3e33f2cdf35024868b183449019de9278035e7966b342ba320a6c601b5629792cbb98a19850d4ca80b906c85d10e8503b0193794d1f1efa849fa33d26cff0669 |
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe
| MD5 | e7a27a45efa530c657f58fda9f3b9f4a |
| SHA1 | 6c0d29a8b75574e904ab1c39fc76b39ca8f8e461 |
| SHA256 | d6f11401f57293922fb36cd7542ae811ab567a512449e566f83ce0dcef5ff8e5 |
| SHA512 | 0c37b41f3c075cd89a764d81f751c3a704a19240ad8e4ebab591f399b9b168b920575749e9d24c2a8f0400b9f340ab9fea4db76ff7060d8af00e2b36ac0c4a54 |
C:\PROGRA~2\Google\Update\DISABL~1.EXE
| MD5 | 3b0e91f9bb6c1f38f7b058c91300e582 |
| SHA1 | 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f |
| SHA256 | 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d |
| SHA512 | a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe
| MD5 | 4e53c18875eae1d86001eb7062816bdf |
| SHA1 | dcace17a70e0c8baf661de66db11d8d547d8bdd6 |
| SHA256 | 7a189d655bc0f0f203556143b0a869d3e58f62ef78a670e15da578cd525bd84c |
| SHA512 | 5c02d06d1a80d61dda79544419ca0093c6f42ffea065b3ee2a3f7f9e688a0ceac02eef4fd78e552662a3348b6c969dbfc066c1678ad3ccead2bca8a77cd16dcb |
C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe
| MD5 | 05bdfd8a3128ab14d96818f43ebe9c0e |
| SHA1 | 495cbbd020391e05d11c52aa23bdae7b89532eb7 |
| SHA256 | 7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb |
| SHA512 | 8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da |
C:\PROGRA~2\MOZILL~1\UNINST~1.EXE
| MD5 | 9cc8047a7f7963378556e4de802b0a7d |
| SHA1 | e8b64a0be5eb3d465a259c1211dd8d1d62202dd8 |
| SHA256 | aac915fbd1808bab7670e4a143642ca857a4c4ffe3f9bc0999ffb5b9f566bd65 |
| SHA512 | 260334d4f2967cf52ccf2ad21a346a3ae38d39a07f58188588f55285d58a904afd3b8c1ee7a9d86d1010b90b1fbcfc19f30074f803bf356cb8ee2ebc62fd35c5 |
C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE
| MD5 | 99ac881582035c636c2359fcc7c72b71 |
| SHA1 | 34e222ce94d0fb0cbfe61e7e37d527c01a413e5e |
| SHA256 | 8aa538991767d32b538ad399c1e2af1e536ab9fc04ca70f13c0728347f404753 |
| SHA512 | 44bd12f2e8da0bd02c0348720bc73d00823ab9bb6a5ef7eba1881dacf0817c37d763b0cc3ab201e958822220ecc4d93a871ca693bb0f6ed95c1b26eb7a00d6f2 |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateOnDemand.exe
| MD5 | 3d13bdb98b3c19709efcd345d8fd59b4 |
| SHA1 | 53f5d91bf81a45a5a20d7f3671f31f306754cf2e |
| SHA256 | 1cb45e4404fed0ded0bfe7acd8e7c26beff744e0f157e5321d1e7192a4cd33d7 |
| SHA512 | 319b24eecf06a3ff982b695d3e2dffe45ccdf4bbb1975a8de541c61590e6a87dc3f48cef4befb454110fc364d82bd9a9be2d694c4603a63b1892bd9fc19313cc |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe
| MD5 | 9f742c7e0eca1dd773df895cbdd2b8ab |
| SHA1 | 2f0977e3da4564adc67e23fe0d8ad648a998fb21 |
| SHA256 | 7690edb96e306a365a3b70a01061b27ba6617b6aa19ed9a44e246b90388db83f |
| SHA512 | a9e14debecef621085584fd9e65f5140bdac5d437f62f4873ab7886ecac9d01a95cd11e766b6656451dce2353d7b340a944da4d5d824be5a3b444879a64af4ac |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe
| MD5 | 25b132b0ef2aa14ceba30092c2659be6 |
| SHA1 | aeff839c1dfa56d5dcbd6e5b4e7232e3c364ef78 |
| SHA256 | 7c9bd83409f49cf3e25c407d0847dc141c92b18437a2c32f2d29e255780c24e5 |
| SHA512 | 17a138269b039f7d73f7b79bc05c75ca49f73359a59c6329c72e0613f54fcd152b3d952423a23bd26797ecf35f4ca6921ef4af3151c88fac25f28104e1011988 |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateBroker.exe
| MD5 | d75525435aa7684c170c5dc2da79cbd4 |
| SHA1 | 4db21157c85b98229bd03f6d61fa1bbcaac38cca |
| SHA256 | 837aa78c2b5ee6cd161e4020d288d2b46bc380890b5e7070f07252974fdb7190 |
| SHA512 | ad7d4e5613a62ceaf8465c2b0e75437fe390532677a444a969b3338868d592e8a43eccd4b25de6828554234d81957baeee4f75c3ff004aa080f821c82f574456 |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdate.exe
| MD5 | 8276a426ba43984a9f339e6451aedbb3 |
| SHA1 | 00965ad5ed1578cb220d1f024ab51ee048d0d9fc |
| SHA256 | 81df1bd3d6a8fbc580ad8b7d1c40aa92851b49eae10f1f6920f096b76524a4e9 |
| SHA512 | b0cb4576a2cbf8f7c0b293f06eb5dcffd1d14c32f4603820a73ee2736263c06afc980547e2bfefa80ca27a37a7a316eb433151fe441651ea2e1b8e9fe564ffc3 |
C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe
| MD5 | 0a56ae9287a690aac4c2b0e66307d64f |
| SHA1 | b8b1b2ca1c3e1fc50decc309cbd83caf4ee8c8f7 |
| SHA256 | 06ed4addcca437139ecdee0ea7307c83dda2438daf183e1161648ddf74e15975 |
| SHA512 | 61cce3293c7b4b6e659f9b99d40cea5302f62bb8a332d45d1690bc129c72bf2a48ed779215c387268dbcee7a727900ffeaffcc16f7ffdb9b8bc1a0ea15e413b5 |
C:\PROGRA~2\MICROS~1\Edge\Application\pwahelper.exe
| MD5 | ae233c9a94ac29078a9b84a0e2f21d0e |
| SHA1 | 74352f8a9f95dac8d4149592f2ca5cafa3f22df5 |
| SHA256 | d351a76537354ee30c5c229ce5ad7684befc6aeac30dbf8c38c03f7780c9ab87 |
| SHA512 | 4985561bd596b002849f3c840b04b5443385f3eb6ba3e1016090a6623b61b0143c4cc928f2b5aa95a70fda8363359ebbdcdd89a5521e90e93aa1c17903ac4109 |
C:\PROGRA~2\MICROS~1\Edge\Application\msedge_proxy.exe
| MD5 | a504bdfc2f71c8040cb5b6c743d32f34 |
| SHA1 | e693d0844f6a6c7d82a70e289f99c62a216dd13a |
| SHA256 | 8ba67958788de5da6de9288f1bb6d2b73f57cc88534359a9a627063e86fcb076 |
| SHA512 | 0ac11251e930ffb1ca965c7f584fcd64d9a2432e248b6d98847e10b67c80482a0591f663f046b7d6add34160bc2deedaf89313a5a6f2cccfa395264c193c4f89 |
C:\PROGRA~2\MICROS~1\Edge\Application\msedge.exe
| MD5 | 88bec53e56a6b3121e0574d1c663d067 |
| SHA1 | 681608f0cadf80ba96652b9c488516caf70e7b0f |
| SHA256 | c6fbfeeee15a2fe7302a80fd5e679cec3212f4eb1a92ef14dd7f19a19a107299 |
| SHA512 | c60926f095fb4bd4ddd351d61e412eca97246f8dce14c655c9a54741c078fcb1380730758ca4d35a84da968b4284c8787ab10dc3884adf5e5f8cba58db2adde3 |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\notification_helper.exe
| MD5 | 40309a97594ecfed9e8cd0368b51f002 |
| SHA1 | 8a1ca73a3ee107c1f172877a21f2e8b6a5c30f54 |
| SHA256 | 48e26052483e4981461c09644924f28464019919cc740cece6069adb71c3be48 |
| SHA512 | 359d44547d0cb2c5fa403cc2e1e860bd502db6066a6e09871a047edfaa4ee9449415cbe6ce32a13eb3276fa7f13bd4397572a4439989b080aa4c3ff1c8adcbca |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_pwa_launcher.exe
| MD5 | 34d0a4d388738301876a910823dfcb8a |
| SHA1 | 46849a3f21432aceb23b403ce4a3625a45d1b7d2 |
| SHA256 | dbb4397b616325e5484d4d26836d4e1da826e83be51b1ebf59c758bf5bd58a34 |
| SHA512 | ed65ecca79d99824d289bba7e77dd714087ad34536aaf95648b31d93d28d5ecb8b42c776332651c98ffb02c18a9b9e792f0293ded46051ff4def050efeb95c3e |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedgewebview2.exe
| MD5 | fccf74c2b9b3e8af2814e8b6493eeb93 |
| SHA1 | 74ea75ba393e718e802e84060c74780d5e38bae5 |
| SHA256 | 8c2ffa56077b4d79db8118b544f095faf4803dbe5676af3f0d9ac52b15d73724 |
| SHA512 | 909f02d7f14e08078275f492ae5df978d6e81e57d15e95083d8bc23631aa6d720088eefdbe60173db6dca3485d00c599937b42262f2c8e395a4fce84222c9dcb |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\Installer\setup.exe
| MD5 | 4df2f346ca3852b5dff45c058d22eab3 |
| SHA1 | 7724a7e7cb09d79a44104e694d06999c225e5f2a |
| SHA256 | 59c94097f063a245ebce78f2e63354bb94f12f3faf10a7800381e20a249d0132 |
| SHA512 | 746dcad9a5febe85202061583d9c241bee8c1375fa01735dcc200050fe685f9e04ba97f4ccc86802bafe5b0b9f56534adb5f4262a5db7b468e8014a3a70af735 |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\identity_helper.exe
| MD5 | 105512023f579c681bbf55f4f88a2ded |
| SHA1 | 2b7e3fb82461924e2afa09cf778da484605cb855 |
| SHA256 | bbdb39a2dec157d2a571101338907d3ce6b6b4122ee077644cd1285ccb0515b0 |
| SHA512 | 0aeacf1bd617722c29dcd763208c20e89d90cff4c43a478f1292ef0964a3172fcc22cc2b1850ec68981c4760674e68f804bf3bba2155d9bbf9c7aa38f7394985 |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\elevation_service.exe
| MD5 | 7e37d766247059f57b1749cc981dae75 |
| SHA1 | 3c97628e79d241dac9c9275ea4137f97c215a142 |
| SHA256 | 4b681840018519bd755191705a1e0330557a33943f165f80a01fda3641db4cd3 |
| SHA512 | a924960c22a5246024ace05c76b54f6db3be3ea6bbb08b4c12fad5379dba7b5c4bb0f5deece37b01f908ef876dbf616dc808d5d2f734867698a24f49c5c1e3f2 |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\cookie_exporter.exe
| MD5 | b9c69481857d7550c5ebd77cc50a1d84 |
| SHA1 | a2e18198fd96975f9f3206330af9a933e336ddc1 |
| SHA256 | 3f3063f7da14b31417aa8dbc0e5242a50a29f7948cd1288e0647d9f927129123 |
| SHA512 | cb1c02d0aa19210835ab584bdd49fbb9c446bd793d4c0e68f0a0f04f6a5c7e0f595009d544120e71a641f9776c39b17d7c0c5fea76392581f6aa094cd6fb4647 |
C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\BHO\ie_to_edge_stub.exe
| MD5 | 23622b7d65653e1dd46db1d10c52d933 |
| SHA1 | 5278e3311ef9adac97bcd572ef4466161deb921d |
| SHA256 | 6e872df59c1f0f474f5f2e1bacd84b8570b08195fe5615a7293eecf540f88505 |
| SHA512 | 8b2a0c9f71baa78fbe30c82a2f530faf106adabe366200555891af3ea5b52ca327f05e8f53c55d73d94c08fc60433218235b638b0ada1617ee57668087966b26 |
C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE
| MD5 | f7c714dbf8e08ca2ed1a2bfb8ca97668 |
| SHA1 | cc78bf232157f98b68b8d81327f9f826dabb18ab |
| SHA256 | fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899 |
| SHA512 | 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE
| MD5 | 25e165d6a9c6c0c77ee1f94c9e58754b |
| SHA1 | 9b614c1280c75d058508bba2a468f376444b10c1 |
| SHA256 | 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217 |
| SHA512 | 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf |
C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE
| MD5 | e5589ec1e4edb74cc7facdaac2acabfd |
| SHA1 | 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f |
| SHA256 | 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67 |
| SHA512 | f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a |
C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE
| MD5 | 96a14f39834c93363eebf40ae941242c |
| SHA1 | 5a3a676403d4e6ad0a51d0f0e2bbdd636ae5d6fc |
| SHA256 | 8ee4aa23eb92c4aba9a46b18ac249a5fa11c5abb7e2c1ca82cd5196401db790a |
| SHA512 | fbf307a8053e9478a52cfdf8e8bad3d7c6664c893458786ae6ee4fffc6fe93006e99a2a60c97fb62dad1addd5247621517f4edee5d9545717c4587a272cef9a2 |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE
| MD5 | 400836f307cf7dbfb469cefd3b0391e7 |
| SHA1 | 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10 |
| SHA256 | cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a |
| SHA512 | aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8 |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE
| MD5 | 5da33a7b7941c4e76208ee7cddec8e0b |
| SHA1 | cdd2e7b9b0e4be68417d4618e20a8283887c489c |
| SHA256 | 531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751 |
| SHA512 | 977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6 |
C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe
| MD5 | de69c005b0bbb513e946389227183eeb |
| SHA1 | 2a64efdcdc71654356f77a5b77da8b840dcc6674 |
| SHA256 | ad7b167ab599b6dad7e7f0ad47368643d91885253f95fadf0fadd1f8eb6ee9c7 |
| SHA512 | 6ca8cec0cf20ee9b8dfe263e48f211b6f1e19e3b4fc0f6e89807f39d3f4e862f0139eb5b35e3133ef60555589ad54406fb11d95845568a5538602f287863b7d7 |
C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe
| MD5 | 6f87ccb8ab73b21c9b8288b812de8efa |
| SHA1 | a709254f843a4cb50eec3bb0a4170ad3e74ea9b3 |
| SHA256 | 14e7a1f2f930380903ae3c912b4a70fd0a59916315c46874805020fe41215c22 |
| SHA512 | 619b45b9728880691a88fbfc396c9d34b41d5e349e04d2eb2d18c535fffc079395835af2af7ca69319954a98852d2f9b7891eff91864d63bf25759c156e192ee |
C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe
| MD5 | 0511abca39ed6d36fff86a8b6f2266cd |
| SHA1 | bfe55ac898d7a570ec535328b6283a1cdfa33b00 |
| SHA256 | 76ae68fc7c6c552c4a98c5df640cd96cf27b62e7e1536b7f7d08eff56fcde8b8 |
| SHA512 | 6608412e3ed0057f387bafcddcb07bfe7da4f207c7300c460e5acc4bd234cec3362191800789eb465eb120ec069e3ed49eabb6bd7db30d9e9245a89bb20e4346 |
C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE
| MD5 | cbd96ba6abe7564cb5980502eec0b5f6 |
| SHA1 | 74e1fe1429cec3e91f55364e5cb8385a64bb0006 |
| SHA256 | 405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa |
| SHA512 | a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc |
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe
| MD5 | e316c67c785d3e39e90341b0bbaac705 |
| SHA1 | 7ffd89492438a97ad848068cfdaab30c66afca35 |
| SHA256 | 4fc8b9433b45c2607cbdf3d1c042c3918b854c9db3ade13b5bb2761d28f1c478 |
| SHA512 | 25ec433c10adc69305de97107463be74d7b4768acca27886498485e8bc2c8b099994e6c1c6c09a7e603816203d6b18e509fb79f24992915eb802f59bcb790090 |
C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe
| MD5 | 15f4411f1b14234b5bed948ed78fa86e |
| SHA1 | f9775a3d87efb22702d934322ffcda3511b79c17 |
| SHA256 | cd6c08078343089d299a30f7bf16555ab349e946892dca1c49c6c0336d27ff0e |
| SHA512 | c44d2e96d6d0264075379066fd5d11ba30a675bb6f6b6279c4ac0d12066975c30c33b69b52457cbed4e35852e8b15b3daad9274d6f957ae0681fb7a6c48a33cb |
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE
| MD5 | bcd0f32f28d3c2ba8f53d1052d05252d |
| SHA1 | c29b4591df930dabc1a4bd0fa2c0ad91500eafb2 |
| SHA256 | bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb |
| SHA512 | 79f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10 |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE
| MD5 | 3b35b268659965ab93b6ee42f8193395 |
| SHA1 | 8faefc346e99c9b2488f2414234c9e4740b96d88 |
| SHA256 | 750824b5f75c91a6c2eeb8c5e60ae28d7a81e323d3762c8652255bfea5cba0bb |
| SHA512 | 035259a7598584ddb770db3da4e066b64dc65638501cdd8ff9f8e2646f23b76e3dfffa1fb5ed57c9bd15bb4efa3f7dd33fdc2e769e5cc195c25de0e340eb89ab |
memory/2016-186-0x00000000060F0000-0x000000000610E000-memory.dmp
memory/2016-230-0x00000000065D0000-0x0000000006604000-memory.dmp
memory/2016-231-0x000000006F4D0000-0x000000006F51C000-memory.dmp
memory/2016-240-0x0000000006690000-0x00000000066AE000-memory.dmp
memory/2016-241-0x00000000072F0000-0x0000000007394000-memory.dmp
memory/2016-242-0x0000000007A20000-0x000000000809A000-memory.dmp
memory/2016-243-0x00000000073A0000-0x00000000073BA000-memory.dmp
memory/2016-244-0x0000000007400000-0x000000000740A000-memory.dmp
memory/2016-245-0x0000000007640000-0x00000000076D6000-memory.dmp
memory/2016-246-0x00000000075A0000-0x00000000075B1000-memory.dmp
memory/2016-247-0x00000000075D0000-0x00000000075DE000-memory.dmp
memory/2016-248-0x00000000075E0000-0x00000000075F5000-memory.dmp
memory/2016-249-0x00000000077E0000-0x00000000077FA000-memory.dmp
memory/2096-250-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2016-251-0x0000000007630000-0x0000000007638000-memory.dmp
memory/4912-255-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2096-257-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4912-260-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2096-259-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Windows\directx.sys
| MD5 | 9e06cbaea528ed37c8d88cb88a27a9ff |
| SHA1 | 8c6863473edbbe39d692ede22a57d09076bd40e1 |
| SHA256 | fb23916ef2ef95cabf567d35d79de3209bd357967bbe1aac618b684d06f4ad36 |
| SHA512 | b9ea6e2ef1e35be7ee1e2782452ff4419787792299b30cfd7adf9b37dc6d92d3e6ec36040e6320822e405c7fafe7f79d05975b8430af113041d1726a9bf90754 |
memory/3448-266-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3636-272-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5100-278-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | ee3858ca954be519d4644e9038a1a2e0 |
| SHA1 | ff8321314f4a2db9144d8cd1f8f4d9d916822be9 |
| SHA256 | d2ccef3483981d8ef92aa978527e658afeb92c68d8b1c3bcc9848cc5056c4985 |
| SHA512 | 84d8d7da70de59e2a3c44834ed49705aad44f0f613045d71b1f48278fa36f7c6b0682134ab1e913405466e7a73ce6b6f3f097d2358db28bd96a4da9f9fc757db |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | af184099ea76fa5ffbcf0c61d24736ca |
| SHA1 | 48ad2ea9492e1844290bae283cf51478221d430b |
| SHA256 | ccb525241501370e8c5c00310551965c5e49a848c376f878c0582693a7060461 |
| SHA512 | 48c604c715681cd614c2296fcc366cec316d2cac71b20c0ed61817af3d47c00c8b84a4eef1737e233c578206d41dc4343f1381a6484aaa357429ec360ec9a3df |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | af1ad026fc37f6a7980f6ded5cfc7b5f |
| SHA1 | 863cceab4af37e497922c09636a04747afef5bd2 |
| SHA256 | 0e6bc847a0983c133e71641368b1aaa8f4f923dcd5f121fbbad282e9652cca62 |
| SHA512 | 1f2105091e46f0efda62146c12ce00f82310798c2b4e49446c125467897b97264dd460a09e74b3e229485b282dcb81772b624d9f3914fd7c4d9ca6e010dfdb55 |
memory/1584-294-0x0000000005C90000-0x0000000005FE7000-memory.dmp
memory/1092-319-0x0000000006C90000-0x0000000006CDC000-memory.dmp
memory/4852-328-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Windows\directx.sys
| MD5 | 0c990affde0d001b607d6fe0983ac629 |
| SHA1 | 64c90738879adf86e38214c153b2eb56ff0a72b3 |
| SHA256 | d9c9ab1b0a993b6953ce5da366d72578d9e643603a161684cb1b9a7187c1c519 |
| SHA512 | 1dc49b832463dde3cbe19067a0041e919e4206a6d0fe7ac30a525a0746c8dcddcc1fb5df585e083f963a7e877985e33d893b89fc064be7f33ba5de99b73d9813 |
memory/1092-330-0x0000000070710000-0x000000007075C000-memory.dmp
memory/1092-339-0x00000000079B0000-0x0000000007A54000-memory.dmp
memory/3256-349-0x0000000070710000-0x000000007075C000-memory.dmp
memory/1584-340-0x0000000070710000-0x000000007075C000-memory.dmp
memory/1092-358-0x0000000007DC0000-0x0000000007DD1000-memory.dmp
memory/1092-359-0x0000000007E00000-0x0000000007E15000-memory.dmp
memory/3400-362-0x00007FF8262D0000-0x00007FF826D92000-memory.dmp