Analysis Overview
SHA256
8b20f47382ac9fb608e568787d9d2974a3c3716bf56ba0208ef5599b19db4a1c
Threat Level: Known bad
The file kdmapper.exe was found to be: Known bad.
Malicious Activity Summary
Neshta
Detect Neshta payload
Xworm
Detect Xworm Payload
Command and Scripting Interpreter: PowerShell
Drops startup file
Reads user/profile data of web browsers
Loads dropped DLL
Checks computer location settings
Modifies system executable filetype association
Executes dropped EXE
Looks up external IP address via web service
Adds Run key to start application
Drops file in Windows directory
Drops file in Program Files directory
Unsigned PE
Enumerates physical storage devices
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Checks processor information in registry
Suspicious use of SendNotifyMessage
Creates scheduled task(s)
Enumerates system info in registry
Modifies system certificate store
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious use of FindShellTrayWindow
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-27 08:08
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-27 08:08
Reported
2024-05-27 08:11
Platform
win7-20240221-en
Max time kernel
149s
Max time network
147s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Xworm
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RtkAudUService64.lnk | C:\ProgramData\kdmapper.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RtkAudUService64.lnk | C:\ProgramData\kdmapper.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
| N/A | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kdmapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kdmapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kdmapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\RtkAudUService64 = "C:\\ProgramData\\RtkAudUService64.exe" | C:\ProgramData\kdmapper.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\PROGRA~2\INTERN~1\ielowutil.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ieinstal.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MOZILL~1\UNINST~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~1\wabmig.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\kdmapper.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI54FB~1\WMPDMC.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI54FB~1\WMPDMC.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~1\wab.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI54FB~1\wmpconfig.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\ImagingDevices.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\iexplore.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ielowutil.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~1\WinMail.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\misc.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI54FB~1\setup_wm.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\iexplore.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI54FB~1\wmlaunch.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WI54FB~1\wmplayer.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\kdmapper.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\ImagingDevices.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\kdmapper.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\kdmapper.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\RtkAudUService64.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\kdmapper.exe
"C:\Users\Admin\AppData\Local\Temp\kdmapper.exe"
C:\ProgramData\kdmapper.exe
"C:\ProgramData\kdmapper.exe"
C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe
"C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\kdmapper.exe'
C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe
C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\kdmapper.exe'
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 1472
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kdmapper.exe'
C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe
C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kdmapper.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\RtkAudUService64.exe'
C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe
C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\RtkAudUService64.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RtkAudUService64.exe'
C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe
C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RtkAudUService64.exe'
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RtkAudUService64" /tr "C:\ProgramData\RtkAudUService64.exe"
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe /create /f /RL HIGHEST /sc minute /mo 1 /tn RtkAudUService64 /tr C:\ProgramData\RtkAudUService64.exe
C:\Windows\system32\taskeng.exe
taskeng.exe {C1BCD75C-053B-486B-B5BB-C117FCF12AE7} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
C:\ProgramData\RtkAudUService64.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | keyauth.win | udp |
| US | 104.26.1.5:443 | keyauth.win | tcp |
| US | 8.8.8.8:53 | apps.identrust.com | udp |
| IE | 2.18.24.9:80 | apps.identrust.com | tcp |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| TR | 178.215.236.228:7000 | tcp |
Files
memory/1612-0-0x0000000074191000-0x0000000074192000-memory.dmp
memory/1612-1-0x0000000074190000-0x000000007473B000-memory.dmp
memory/1612-2-0x0000000074190000-0x000000007473B000-memory.dmp
\ProgramData\kdmapper.exe
| MD5 | 1fb060973127af435a948361cba03b9e |
| SHA1 | f861149e155e9bb3ef1f2f748874e884cde54cee |
| SHA256 | 194bee6ca7df1015b6b5c5296d04f711128a4ec2970bdab1bf621af758251949 |
| SHA512 | 8d22e67d3200ab028822985e35c6314051b1dc0cab612e6917e326f0c75ad9d9a97af7f8146f70468026b5efcc5d09d4d1d9f89f34191cfed3179db1285e5eba |
memory/2744-11-0x000007FEF51F3000-0x000007FEF51F4000-memory.dmp
\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe
| MD5 | accad9cf663d5819ab171725c62de978 |
| SHA1 | 6abf132629ebd01588f95e6e87422142145d2c21 |
| SHA256 | 48ef492c2a7daed9b5fd95cbe3b567a6f75e123ae4d9afeafb0fa1d3784a9c0b |
| SHA512 | 4fc791d57b89c4792dba0820af337cea924747efa102952f46afa9ba25f42360836146a9cd7285104657bb4756dfba77856f71e20290cf2f6202a1032ac416da |
\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe
| MD5 | c6468039d2d2d29d67da192c4b93fbce |
| SHA1 | 6c295a9bff97d20fd8d1e7bd0306047965c03c27 |
| SHA256 | 574ffc78000ac5e306858cead0d0669ecc3c0bd2541001bab1d2f5c46e9d74e7 |
| SHA512 | 5777425adec2b763f3535dce5963422b986fb2ec25517f326b99956ffe5970a477f05cb1009f1fd54da2890ab26e79687bcf05efacb8f8a06a2bc0400b228be9 |
memory/1612-27-0x0000000074190000-0x000000007473B000-memory.dmp
memory/2744-32-0x0000000000B20000-0x0000000000B38000-memory.dmp
memory/2548-34-0x0000000001160000-0x000000000117C000-memory.dmp
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
| MD5 | 9e2b9928c89a9d0da1d3e8f4bd96afa7 |
| SHA1 | ec66cda99f44b62470c6930e5afda061579cde35 |
| SHA256 | 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043 |
| SHA512 | 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156 |
C:\Users\Admin\AppData\Local\Temp\CabA324.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 29f65ba8e88c063813cc50a4ea544e93 |
| SHA1 | 05a7040d5c127e68c25d81cc51271ffb8bef3568 |
| SHA256 | 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184 |
| SHA512 | e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa |
C:\Users\Admin\AppData\Local\Temp\TarA4C1.tmp
| MD5 | 435a9ac180383f9fa094131b173a2f7b |
| SHA1 | 76944ea657a9db94f9a4bef38f88c46ed4166983 |
| SHA256 | 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34 |
| SHA512 | 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3d25575a89c8bd8672f19a79bc0dd75c |
| SHA1 | ed28d8edb6471d488acea300cd9edbcd9a81fa2b |
| SHA256 | 165396b30a87bdef9ad8917753d403504f83391f2b791d764b3412cc7601570b |
| SHA512 | 304b247f5c89eb472d03d2d251bde5e3fa6f4df7153f6e20b217231025e408de247879b5843617332ba59acb2a011569257e8abb0e1eda1e4dd6d81a063b7410 |
C:\Windows\svchost.com
| MD5 | c23ae27db3868ed615e2fb10aad9c430 |
| SHA1 | 2ae4f18703f36e3e484da9a14cf557a2f2c83d8d |
| SHA256 | a61dd97cf9eed6d01cd393a00f9cecc33368bd5a04ccbbb74ddcb37b984ebcec |
| SHA512 | 4504277050aec35a50476148de71c88fbb1b520bd8c2e8c79e30e7dd6b1f5d41889b9f35adc9bf3c4fdbcba0652e02a4deb9fba608874a3f5d8c0637cbb8adef |
C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
| MD5 | cf6c595d3e5e9667667af096762fd9c4 |
| SHA1 | 9bb44da8d7f6457099cb56e4f7d1026963dce7ce |
| SHA256 | 593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d |
| SHA512 | ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80 |
C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE
| MD5 | d4fdbb8de6a219f981ffda11aa2b2cc4 |
| SHA1 | cca2cffd4cf39277cc56ebd050f313de15aabbf6 |
| SHA256 | ba3dc87fca4641e5f5486c4d50c09d087e65264e6c5c885fa6866f6ccb23167b |
| SHA512 | 7167e13dbcc8c96114fef5fc7ae19afa31173617db153dd283aa6d8256f6b8c09c8f906f5d418efe9f7f242cdfaef24b93c11c451701c4d56eb48d18de4e88bf |
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE
| MD5 | 02ee6a3424782531461fb2f10713d3c1 |
| SHA1 | b581a2c365d93ebb629e8363fd9f69afc673123f |
| SHA256 | ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc |
| SHA512 | 6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec |
C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE
| MD5 | 6a091285d13370abb4536604b5f2a043 |
| SHA1 | 8bb4aad8cadbd3894c889de85e7d186369cf6ff1 |
| SHA256 | 909205de592f50532f01b4ac7b573b891f7e6e596b44ff94187b1ba4bcc296bb |
| SHA512 | 9696e4f60a5b1166535ca8ca3fb495d718086463d1a12fa1facc08219ad5b918208ddd2a102f7955e29153b081e05985c4ae6e4302ab36d548bb62991a47db18 |
C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE
| MD5 | a741183f8c4d83467c51abab1ff68d7b |
| SHA1 | ddb4a6f3782c0f03f282c2bed765d7b065aadcc6 |
| SHA256 | 78be3aeb507db7e4ee7468c6b9384ee0459deebd503e06bd4988c52247ecea24 |
| SHA512 | c15dbecc0754a662892ecaff4b9b6c1bad46f710d8e1b973f86eaee467444f8e5764b31ace8f5a9a5e936947cc4dcb97cb1b14a6930c1025f38a3544393b6b18 |
C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE
| MD5 | 7ce8bcabb035b3de517229dbe7c5e67d |
| SHA1 | 8e43cd79a7539d240e7645f64fd7f6e9e0f90ab9 |
| SHA256 | 81a3a1dc3104973a100bf8d114b6be35da03767a0cbbaf925f970ffcbe5f217c |
| SHA512 | be7fcd50b4f71b458ca001b7c019bf1169ec089d7a1ce05355134b11cbe75a5a29811f9efec803877aeb1a1d576ea2628926e0131361db23214275af6e89e80c |
C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe
| MD5 | 2f6f7891de512f6269c8e8276aa3ea3e |
| SHA1 | 53f648c482e2341b4718a60f9277198711605c80 |
| SHA256 | d1ee54eb64f31247f182fd62037e64cdb3876e1100bc24883192bf46bab42c86 |
| SHA512 | c677f4f7bfb2e02cd0babed896be00567aad08304cbff3a85fcc9816b10247fedd026fee769c9bd45277a4f2814eabe6534f0b04ea804d0095a47a1477188dd6 |
memory/2980-198-0x0000000000400000-0x000000000041B000-memory.dmp
C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe
| MD5 | e1833678885f02b5e3cf1b3953456557 |
| SHA1 | c197e763500002bc76a8d503933f1f6082a8507a |
| SHA256 | bd9a16d8d7590a2ec827913db5173f8beb1d1ef44dab1920ef52a307f922bc14 |
| SHA512 | fe107e1c8631ec6ac94f772e6a7be1fdc2a533fe3cfcf36b1ff018c8d01bd7f1f818f0a2448f736838c953cd516ea7327c416dea20706ed2420327af8ef01abe |
C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE
| MD5 | eef2f834c8d65585af63916d23b07c36 |
| SHA1 | 8cb85449d2cdb21bd6def735e1833c8408b8a9c6 |
| SHA256 | 3cd34a88e3ae7bd3681a7e3c55832af026834055020add33e6bd6f552fc0aabd |
| SHA512 | 2ee8766e56e5b1e71c86f7d1a1aa1882706d0bca8f84b2b2c54dd4c255e04f037a6eb265302449950e5f5937b0e57f17a6aa45e88a407ace4b3945e65043d9b7 |
C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe
| MD5 | 3ec4922dbca2d07815cf28144193ded9 |
| SHA1 | 75cda36469743fbc292da2684e76a26473f04a6d |
| SHA256 | 0587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801 |
| SHA512 | 956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7 |
C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE
| MD5 | 8c4f4eb73490ca2445d8577cf4bb3c81 |
| SHA1 | 0f7d1914b7aeabdb1f1e4caedd344878f48be075 |
| SHA256 | 85f7249bfac06b5ee9b20c7f520e3fdc905be7d64cfbefb7dcd82cd8d44686d5 |
| SHA512 | 65453075c71016b06430246c1ee2876b7762a03112caf13cff4699b7b40487616c88a1160d31e86697083e2992e0dd88ebf1721679981077799187efaa0a1769 |
C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE
| MD5 | 831270ac3db358cdbef5535b0b3a44e6 |
| SHA1 | c0423685c09bbe465f6bb7f8672c936e768f05a3 |
| SHA256 | a8f78ac26c738b13564252f1048ca784bf152ef048b829d3d22650b7f62078f0 |
| SHA512 | f64a00977d4b6f8c43f53cee7bb450f3c8cbef08525975055fde5d8c515db32d2bfad92e99313b3a10a72a50dd09b4ffe28e9af4c148c6480622ba486776e450 |
C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
| MD5 | 566ed4f62fdc96f175afedd811fa0370 |
| SHA1 | d4b47adc40e0d5a9391d3f6f2942d1889dd2a451 |
| SHA256 | e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460 |
| SHA512 | cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7 |
C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
| MD5 | 58b58875a50a0d8b5e7be7d6ac685164 |
| SHA1 | 1e0b89c1b2585c76e758e9141b846ed4477b0662 |
| SHA256 | 2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae |
| SHA512 | d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE
| MD5 | a24fbb149eddf7a0fe981bd06a4c5051 |
| SHA1 | fce5bb381a0c449efad3d01bbd02c78743c45093 |
| SHA256 | 5d13230eae7cd9b4869145c3280f7208788a8e68c9930a5c9aa3e822684a963d |
| SHA512 | 1c73b762c340a8d7ea580985ba034a404c859d814690390a6e0b6786575c219db9ca20880ea20313bb244560e36cf24e4dda90229b3084d770495f4ceedfd5de |
C:\PROGRA~2\Google\Update\DISABL~1.EXE
| MD5 | 3b0e91f9bb6c1f38f7b058c91300e582 |
| SHA1 | 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f |
| SHA256 | 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d |
| SHA512 | a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f |
C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE
| MD5 | 92ee5c55aca684cd07ed37b62348cd4e |
| SHA1 | 6534d1bc8552659f19bcc0faaa273af54a7ae54b |
| SHA256 | bee98e2150e02ad6259184a35e02e75df96291960032b3085535fb0f1f282531 |
| SHA512 | fc9f4569a5f3de81d6a490f0fff4765698cdc891933979a3ce661a6291b606630a0c2b15647fc661109fcea466c7a78552b9cfbca6c5b2079ea1632a9f1b6e22 |
C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE
| MD5 | 7a4edc8fb7114d0ea3fdce1ea05b0d81 |
| SHA1 | 02ecc30dbfab67b623530ec04220f87b312b9f6b |
| SHA256 | ff16fdc703e55ddfe5ee867f343f3b20b496e7199c6c4b646335a01026f74550 |
| SHA512 | 39519685b1dd872008abfa967f79fd3b7a5e6f6ee1b9c3de891aae64490b2d0feb56bcd3f5dab4527d2c6d07646db5966028df153f38a1c09ee88a1ba9a1ef44 |
C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE
| MD5 | 25b9301a6557a958b0a64752342be27d |
| SHA1 | 0887e1a9389a711ef8b82da8e53d9a03901edebc |
| SHA256 | 5d916f7c7f6cb6cfd7545a57cb9c9d9c6df16af3517298c346901081a9135303 |
| SHA512 | 985f6b2fcac2f0425a1a339a55616012879a393caa747412d04c1ee4de3b12aff2cc051860066d84ecbeae335eaa5116ccb8a02090a2674eded367378c56b1ab |
C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE
| MD5 | 5d2fd8de43da81187b030d6357ab75ce |
| SHA1 | 327122ef6afaffc61a86193fbe3d1cbabb75407e |
| SHA256 | 4d117648525a468532da011f0fc051e49bf472bbcb3e9c4696955bd398b9205f |
| SHA512 | 9f7470978346746b4e3366f9a6b277aa747cc45f13d36886fc16303221565d23348195b72ac25f7b1711789cd7cb925d7ceea91e384ef4f904a4e49b4e06d9b2 |
C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE
| MD5 | 44623cc33b1bd689381de8fe6bcd90d1 |
| SHA1 | 187d4f8795c6f87dd402802723e4611bf1d8089e |
| SHA256 | 380154eab37e79ed26a7142b773b8a8df6627c64c99a434d5a849b18d34805ba |
| SHA512 | 19002885176caceb235da69ee5af07a92b18dac0fb8bb177f2c1e7413f6606b1666e0ea20f5b95b4fa3d82a3793b1dbe4a430f6f84a991686b024c4e11606082 |
C:\PROGRA~2\MICROS~1\Office14\misc.exe
| MD5 | 02e02577a83a1856dc838f9e2f24e8d2 |
| SHA1 | 2ab44e2072a3598fc7092b2ccb9aff3a2c5d4ced |
| SHA256 | 3b6ca9d9fcbb0c1677fe4caeef03e4db326f70166f030b5f9fa9f2856031d4fc |
| SHA512 | a95d454a4f9e5271bc52e6c245c7840a92b8331b84260b2556432ac66dd07bec1b2c3dcf41282d6d8ae581a152f3147e75dc673ce0c7ecbb653dcc61bc1d1bd8 |
C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE
| MD5 | 33cb3cf0d9917a68f54802460cbbc452 |
| SHA1 | 4f2e4447fabee92be16806f33983bb71e921792b |
| SHA256 | 1230b2032d2d35a55cd86d1215eb38fa18bcf590c3c19b9ac4dda5350c24e10a |
| SHA512 | 851f0a098020cb1da3f5f48febce3b9eaef3b885df9134b3fb6b364f3a7572a8c516456710a15f66f0a44eff59cfa50f2dc8bb5d274e5c093294b2ea96fd49cb |
C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE
| MD5 | 8acc19705a625e2d4fa8b65214d7070a |
| SHA1 | ad16e49369c76c6826a18d136bf9618e8e99ec12 |
| SHA256 | 3fb179a3ae88a3d14db48de29d4b9d43243b80b2118b578b8117ad776ce47f12 |
| SHA512 | 92e22275194b5a73d825e1e7ad5a5cb5649d3679f545f88328aa72e39c161c4d797b7b3462e590edf546ddbd53c1508a49056f50fa63b113134e1bdc7d977dec |
C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE
| MD5 | 06ac9f5e8fd5694c759dc59d8a34ee86 |
| SHA1 | a29068d521488a0b8e8fc75bc0a2d1778264596b |
| SHA256 | ab6a5bfc12229c116033183db646125573989dfc2fc076e63e248b1b82f6751d |
| SHA512 | 597dfd9cb82acc8f3033f2215df7138f04445f5826054528242e99e273f9cc4a7a956c75f280e6145fcdb22824a1f258246e22637de56a66dcae72ac2c1d14fe |
C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE
| MD5 | 56f047ff489e52768039ce7017bdc06e |
| SHA1 | 3f249d6a9e79c2706ed2e0e12f7e76ebd5e568fc |
| SHA256 | 62d6c979d708efe21c9618a18232fd2c74e85bb9560daa298025ab9af784202d |
| SHA512 | a2eae7eae6548d325480560dcca83283a022f00f7d9bd19c0ae801a7acec133a33c5c5eb79432d47c8258d153cadea988217845d58eb4e8aa8070a068befe5e8 |
C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE
| MD5 | 4f8fc8dc93d8171d0980edc8ad833b12 |
| SHA1 | dc2493a4d3a7cb460baed69edec4a89365dc401f |
| SHA256 | 1505f3721dd3d7062dadde1633d17e4ee80caf29fd5b6aa6e6a0c481324ffd4e |
| SHA512 | bdc3f83d7428418516daf23a9c2d00571cbaa3755391dfd8c500b6df7f621a67ad8e27775bcdaa20b159cd77d08bcdaf81a0cb7fffdd812978888d43512113a6 |
C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe
| MD5 | b1e0da67a985533914394e6b8ac58205 |
| SHA1 | 5a65e6076f592f9ea03af582d19d2407351ba6b6 |
| SHA256 | 67629b025fed676bd607094fa7f21550e18c861495ba664ee0d2b215a4717d7f |
| SHA512 | 188ebb9a58565ca7ed81a46967a66d583f7dea43a2fc1fe8076a79ef4a83119ccaa22f948a944abae8f64b3a4b219f5184260eff7201eb660c321f6c0d1eba22 |
C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE
| MD5 | 71509f22e82a9f371295b0e6cf4a79bb |
| SHA1 | c7eefb4b59f87e9a0086ea80962070afb68e1d27 |
| SHA256 | f9837240f5913bfa289ac2b5da2ba0ba24f60249d6f7e23db8a78bb10c3c7722 |
| SHA512 | 3ea6347bbb1288335ac34ee7c3006af746ca9baccfbc688d85a5ca86b09d3e456047239c0859e8dd2cdc22d254897fccd0919f00826e9665fd735cfb7c1554e7 |
C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE
| MD5 | 685db5d235444f435b5b47a5551e0204 |
| SHA1 | 99689188f71829cc9c4542761a62ee4946c031ff |
| SHA256 | fde30bfdd34c7187d02eabe49f2386b4661321534b50032a838b179a21737411 |
| SHA512 | a06d711574fbe32f07d20e1d82b7664addd664bf4a7ee07a8f98889172afe3653f324b5915968950b18e76bbfc5217a29704057fd0676611629aa9eb888af54a |
C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE
| MD5 | f7c714dbf8e08ca2ed1a2bfb8ca97668 |
| SHA1 | cc78bf232157f98b68b8d81327f9f826dabb18ab |
| SHA256 | fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899 |
| SHA512 | 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE
| MD5 | 25e165d6a9c6c0c77ee1f94c9e58754b |
| SHA1 | 9b614c1280c75d058508bba2a468f376444b10c1 |
| SHA256 | 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217 |
| SHA512 | 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf |
C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE
| MD5 | e5589ec1e4edb74cc7facdaac2acabfd |
| SHA1 | 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f |
| SHA256 | 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67 |
| SHA512 | f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a |
C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE
| MD5 | 96a14f39834c93363eebf40ae941242c |
| SHA1 | 5a3a676403d4e6ad0a51d0f0e2bbdd636ae5d6fc |
| SHA256 | 8ee4aa23eb92c4aba9a46b18ac249a5fa11c5abb7e2c1ca82cd5196401db790a |
| SHA512 | fbf307a8053e9478a52cfdf8e8bad3d7c6664c893458786ae6ee4fffc6fe93006e99a2a60c97fb62dad1addd5247621517f4edee5d9545717c4587a272cef9a2 |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE
| MD5 | 400836f307cf7dbfb469cefd3b0391e7 |
| SHA1 | 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10 |
| SHA256 | cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a |
| SHA512 | aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8 |
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE
| MD5 | 5da33a7b7941c4e76208ee7cddec8e0b |
| SHA1 | cdd2e7b9b0e4be68417d4618e20a8283887c489c |
| SHA256 | 531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751 |
| SHA512 | 977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6 |
C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE
| MD5 | 46e43f94482a27df61e1df44d764826b |
| SHA1 | 8b4eab017e85f8103c60932c5efe8dff12dc5429 |
| SHA256 | dc6658dec5bf89f65f2d4b9bdb27634bac0bf5354c792bc8970a2b39f535facd |
| SHA512 | ce5bdd3f9a2394ffda83c93fc5604d972f90bd72e6aded357bdf27a2b21a0469f6ac71ce40d9fb4ed8c845468c4171a3c5b4501edbae79447c4f4e08342d4560 |
C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe
| MD5 | 467aee41a63b9936ce9c5cbb3fa502cd |
| SHA1 | 19403cac6a199f6cd77fc5ac4a6737a9a9782dc8 |
| SHA256 | 99e5bea5f632ef4af76e4e5108486d5e99386c3d451b983bcd3ad2a49cc04039 |
| SHA512 | 00c9ccdbbd6fd1be0c2dafd485d811be9bf2076d4efeabc256179befd92679b964e80edcb90ef21f3e874578fdb0003878227f560ca76498865770280f87113e |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe
| MD5 | 034978c5262186b14fd7a2892e30b1cf |
| SHA1 | 237397dd3b97c762522542c57c85c3ff96646ba8 |
| SHA256 | 159776d43dd2a8d843b82ece0faf469f9088a625d474ce4eea9db59d94a844e6 |
| SHA512 | d216e757616121d9902b0db2669b6e2aa9eb2697427c9ea2804ebda9690abbf9219c6e603d63ff19dc6115a072985ca862499b5f8319ca057a16e81aec9ea949 |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe
| MD5 | 60f6a975a53a542fd1f6e617f3906d86 |
| SHA1 | 2be1ae6fffb3045fd67ed028fe6b22e235a3d089 |
| SHA256 | be23688697af7b859d62519807414565308e79a6ecac221350cd502d6bf54733 |
| SHA512 | 360872d256ef91ea3debfb9b3efa22ee80859af9df29e0687c8e1b3c386d88ff1dc5635b86e714fbf1a7d4d6bc3d791efa31a9d9d13e0f79547b631bddb5108d |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe
| MD5 | da31170e6de3cf8bd6cf7346d9ef5235 |
| SHA1 | e2c9602f5c7778f9614672884638efd5dd2aee92 |
| SHA256 | 7737ab500cbbd5d507881d481eef9bd91cf6650bf8d2b41b47b1a8c5f2789858 |
| SHA512 | 2759d938d6ad963e0bf63481a700f7c503d06011a60bcfc1071b511e38afa87d903deb36f9cbfa0b3fd08f1ecb88d2c0bddf0d3b5f2dea2a0cca1a80471669f3 |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE
| MD5 | 12a5d7cade13ae01baddf73609f8fbe9 |
| SHA1 | 34e425f4a21db8d7902a78107d29aec1bde41e06 |
| SHA256 | 94e8ea2ed536484492d746f6f5808192cb81ae3c35f55d60826a2db64a254dd5 |
| SHA512 | a240f5c59226749792cfb9fbd76b086d2544a493b834a72c0bfd8b076ed753ec8876ff056fc35f63f5497183d985f8f8c5c7b6abbcad70981f1ec83af1b3bd76 |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE
| MD5 | 3f67da7e800cd5b4af2283a9d74d2808 |
| SHA1 | f9288d052b20a9f4527e5a0f87f4249f5e4440f7 |
| SHA256 | 31c10320edb2de22f37faee36611558db83b78a9c3c71ea0ed13c8dce25bf711 |
| SHA512 | 6a40f4629ddae102d8737e921328e95717274cea16eb5f23bff6a6627c6047d7f27e7f6eb5cb52f53152e326e53b6ee44d9a9ee8eca7534a2f62fa457ac3d4e3 |
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE
| MD5 | 28f7305b74e1d71409fec722d940d17a |
| SHA1 | 4c64e1ceb723f90da09e1a11e677d01fc8118677 |
| SHA256 | 706db4d832abdf4907a1386b917e553315660a59bfb4c180e38215b4a606d896 |
| SHA512 | 117de88d0bc437023ca2f1f54b1f2cf03b00c8cb52e4b728cabcb3140659c67cdb6d2c203d3ca13767312831c6308622dfa65d6c5361ec28aaf4ec0870f9ba6e |
memory/2980-233-0x0000000000400000-0x000000000041B000-memory.dmp
memory/592-234-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2744-235-0x000007FEF51F3000-0x000007FEF51F4000-memory.dmp
memory/2980-236-0x0000000000400000-0x000000000041B000-memory.dmp
memory/592-237-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2980-238-0x0000000000400000-0x000000000041B000-memory.dmp
memory/592-239-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2980-240-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2980-242-0x0000000000400000-0x000000000041B000-memory.dmp
memory/592-244-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Windows\directx.sys
| MD5 | c0b10143454d77739a368e04e0f35df5 |
| SHA1 | f3af68a474210444d81d85902d20e1b358dee3cf |
| SHA256 | 2917e6960136a725e02b583e48084f2d01e6f067b0e0c48a903cb9e87cbcc084 |
| SHA512 | d7a195e2a204bb8735770e8b69ecaadd209b59f0f80548f19294301cc11b7f4e8b818d0fe4075faed3cc6012654afb0447057867bb4d2e96311bc9474ed6c01b |
memory/1300-250-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1588-256-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2864-262-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U8S7MUEUDYACI3GNDGV8.temp
| MD5 | 9a225a1f37e694527d06960b781dc74d |
| SHA1 | fe20974981225cd9d562fce404bcf0ad36a90b6f |
| SHA256 | 0a15d2798ca4f47c5e6503ff93b19df728ddc7874910853e65524b1c95c468c2 |
| SHA512 | 0a95815bf0b444f58bc0cf91924ff9c2d691f59672269126f9ad6c2f37ea1175bfe709cc65535c2bcd48b8ce88a0e375abc1e3d53ef8958c4d9c7be4e13c44d0 |
C:\Windows\directx.sys
| MD5 | 0c990affde0d001b607d6fe0983ac629 |
| SHA1 | 64c90738879adf86e38214c153b2eb56ff0a72b3 |
| SHA256 | d9c9ab1b0a993b6953ce5da366d72578d9e643603a161684cb1b9a7187c1c519 |
| SHA512 | 1dc49b832463dde3cbe19067a0041e919e4206a6d0fe7ac30a525a0746c8dcddcc1fb5df585e083f963a7e877985e33d893b89fc064be7f33ba5de99b73d9813 |
memory/2836-283-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2744-285-0x000000001D3C0000-0x000000001D710000-memory.dmp
memory/2492-286-0x00000000013D0000-0x00000000013E8000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-27 08:08
Reported
2024-05-27 08:11
Platform
win10v2004-20240226-en
Max time kernel
60s
Max time network
156s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Xworm
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\kdmapper.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation | C:\ProgramData\kdmapper.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\kdmapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\BHO\ie_to_edge_stub.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\msedge.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\msedgewebview2.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13185~1.17\MICROS~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\setup_wm.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmpconfig.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmprph.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ielowutil.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\iexplore.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\identity_helper.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmpconfig.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ExtExport.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{FB050~1\WINDOW~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{17316~1\WINDOW~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\notification_click_helper.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\notification_helper.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~2\wab.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ieinstal.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{FB050~1\WINDOW~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\msedge.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI391D~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\WINDOW~4\wmpshare.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\msedge_pwa_launcher.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\INTERN~1\ExtExport.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13185~1.17\MICROS~1.EXE | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\notification_click_helper.exe | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings | C:\ProgramData\kdmapper.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\ProgramData\kdmapper.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\PROGRA~1\MOZILL~1\firefox.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\kdmapper.exe
"C:\Users\Admin\AppData\Local\Temp\kdmapper.exe"
C:\ProgramData\kdmapper.exe
"C:\ProgramData\kdmapper.exe"
C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe
"C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\kdmapper.exe'
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\kdmapper.exe'
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1044 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\PROGRA~1\MOZILL~1\firefox.exe"
C:\PROGRA~1\MOZILL~1\firefox.exe
C:\PROGRA~1\MOZILL~1\firefox.exe
C:\PROGRA~1\MOZILL~1\firefox.exe
C:\PROGRA~1\MOZILL~1\firefox.exe
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.0.255991882\2127461366" -parentBuildID 20221007134813 -prefsHandle 1748 -prefMapHandle 1736 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\PROGRA~1\MOZILL~1\browser" - {c7e8b1ab-ddf5-4074-bd49-c41ac306a6dc} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 1840 2112a4d6c58 gpu
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.1.1700625511\590663014" -parentBuildID 20221007134813 -prefsHandle 2288 -prefMapHandle 2284 -prefsLen 20843 -prefMapSize 233444 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {53d8a2d9-6743-41f1-a62c-5f1ea4b3f1c8} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 2300 21117771858 socket
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.2.1701788378\2094492103" -childID 1 -isForBrowser -prefsHandle 2924 -prefMapHandle 2920 -prefsLen 20881 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {373c7a75-140d-4646-b653-b058927921de} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 3028 2112e0b5d58 tab
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe"
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd379d9758,0x7ffd379d9768,0x7ffd379d9778
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.3.1449844411\1355515066" -childID 2 -isForBrowser -prefsHandle 3724 -prefMapHandle 3720 -prefsLen 26124 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {5252d300-3292-4354-a8cc-e484a7c8e2b8} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 3736 2111775fd58 tab
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.4.1499587364\1967015519" -childID 3 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 26124 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {504c4fbf-c80b-4ecc-801f-ac7d665ba413} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 4012 2112fa77358 tab
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1956,i,9041691410585586773,7230608052510680048,131072 /prefetch:2
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1884 --field-trial-handle=1956,i,9041691410585586773,7230608052510680048,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1956,i,9041691410585586773,7230608052510680048,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1956,i,9041691410585586773,7230608052510680048,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1956,i,9041691410585586773,7230608052510680048,131072 /prefetch:1
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.5.628664560\1385367138" -childID 4 -isForBrowser -prefsHandle 2632 -prefMapHandle 4744 -prefsLen 26638 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {6750cf93-e68b-4fc7-bf6d-3b900bf7790f} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 3680 21117763458 tab
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.6.1466962419\1313968049" -childID 5 -isForBrowser -prefsHandle 5192 -prefMapHandle 1268 -prefsLen 26638 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {34c61646-a6ba-4385-8b6d-998e0c858033} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 5144 21117764058 tab
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.7.2147300418\1225378441" -childID 6 -isForBrowser -prefsHandle 5368 -prefMapHandle 5144 -prefsLen 26638 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {d9efe4d7-4768-4671-815d-51d98c32b1c0} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 5360 2112d064758 tab
C:\PROGRA~1\MOZILL~1\firefox.exe
"C:\PROGRA~1\MOZILL~1\firefox.exe" -contentproc --channel="4508.8.1275670088\1744670531" -childID 7 -isForBrowser -prefsHandle 5336 -prefMapHandle 5340 -prefsLen 26638 -prefMapSize 233444 -jsInitHandle 1184 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\PROGRA~1\MOZILL~1\browser" - {a90c5e0d-7b71-4d12-bded-ceb37a817940} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" 5560 2112e1ace58 tab
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe"
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xa4,0x108,0x7ffd379d9758,0x7ffd379d9768,0x7ffd379d9778
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:2
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4392 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4404 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4712 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5056 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4376 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4676 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:8
C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe
"C:\PROGRA~1\Google\Chrome\APPLIC~1\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5336 --field-trial-handle=2000,i,16385817578952851518,202468111676015540,131072 /prefetch:1
Network
| Country | Destination | Domain | Proto |
| GB | 142.250.187.234:443 | tcp | |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | keyauth.win | udp |
| US | 172.67.72.57:443 | keyauth.win | tcp |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | 57.72.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.112.95.208.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 13.107.253.64:443 | tcp | |
| N/A | 127.0.0.1:50117 | tcp | |
| US | 8.8.8.8:53 | contile.services.mozilla.com | udp |
| US | 34.117.188.166:443 | contile.services.mozilla.com | tcp |
| US | 8.8.8.8:53 | contile.services.mozilla.com | udp |
| US | 8.8.8.8:53 | contile.services.mozilla.com | udp |
| US | 8.8.8.8:53 | content-signature-2.cdn.mozilla.net | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 34.117.188.166:443 | contile.services.mozilla.com | udp |
| US | 34.160.144.191:443 | prod.content-signature-chains.prod.webservices.mozgcp.net | tcp |
| US | 8.8.8.8:53 | shavar.services.mozilla.com | udp |
| US | 44.237.98.207:443 | shavar.services.mozilla.com | tcp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | 166.188.117.34.in-addr.arpa | udp |
| US | 8.8.8.8:53 | push.services.mozilla.com | udp |
| US | 8.8.8.8:53 | autopush.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | autopush.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | 207.98.237.44.in-addr.arpa | udp |
| US | 34.107.243.93:443 | autopush.prod.mozaws.net | tcp |
| US | 8.8.8.8:53 | firefox.settings.services.mozilla.com | udp |
| US | 34.149.100.209:443 | firefox.settings.services.mozilla.com | tcp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| US | 8.8.8.8:53 | 131.178.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| FR | 172.217.20.196:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | 196.20.217.172.in-addr.arpa | udp |
| FR | 172.217.20.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 18.24.18.2.in-addr.arpa | udp |
| FR | 172.217.20.196:443 | www.google.com | tcp |
| FR | 172.217.20.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 163.214.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | apis.google.com | udp |
| FR | 142.250.178.142:443 | apis.google.com | tcp |
| US | 8.8.8.8:53 | play.google.com | udp |
| FR | 172.217.20.174:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | 142.178.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.214.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 174.20.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | encrypted-tbn2.gstatic.com | udp |
| FR | 172.217.20.206:443 | encrypted-tbn2.gstatic.com | tcp |
| US | 8.8.8.8:53 | 206.20.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | x64dbg.com | udp |
| US | 185.199.108.153:443 | x64dbg.com | tcp |
| US | 185.199.108.153:443 | x64dbg.com | tcp |
| US | 8.8.8.8:53 | cdnjs.cloudflare.com | udp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | tcp |
| US | 8.8.8.8:53 | 153.108.199.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ajax.googleapis.com | udp |
| FR | 142.250.74.234:443 | ajax.googleapis.com | tcp |
| US | 8.8.8.8:53 | 14.25.17.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.74.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 42.215.58.216.in-addr.arpa | udp |
| FR | 172.217.20.174:443 | play.google.com | udp |
| N/A | 127.0.0.1:50385 | tcp | |
| US | 8.8.8.8:53 | snapshots.x64dbg.com | udp |
| US | 172.67.132.116:443 | snapshots.x64dbg.com | tcp |
| US | 172.67.132.116:443 | snapshots.x64dbg.com | tcp |
| US | 8.8.8.8:53 | 116.132.67.172.in-addr.arpa | udp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | udp |
| US | 8.8.8.8:53 | img.shields.io | udp |
| US | 172.67.173.89:443 | img.shields.io | tcp |
| US | 172.67.173.89:443 | img.shields.io | tcp |
| US | 172.67.173.89:443 | img.shields.io | tcp |
| US | 172.67.173.89:443 | img.shields.io | tcp |
| US | 172.67.173.89:443 | img.shields.io | tcp |
| US | 172.67.173.89:443 | img.shields.io | tcp |
| US | 8.8.8.8:53 | sourceforge.net | udp |
| US | 104.18.13.149:80 | sourceforge.net | tcp |
| US | 104.18.13.149:443 | sourceforge.net | tcp |
| US | 8.8.8.8:53 | 89.173.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.214.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.13.18.104.in-addr.arpa | udp |
| US | 104.18.13.149:443 | sourceforge.net | udp |
| US | 8.8.8.8:53 | a.fsdn.com | udp |
| US | 104.18.16.56:443 | a.fsdn.com | tcp |
| US | 104.18.16.56:443 | a.fsdn.com | tcp |
| US | 104.18.16.56:443 | a.fsdn.com | tcp |
| US | 104.18.16.56:443 | a.fsdn.com | tcp |
| US | 104.18.16.56:443 | a.fsdn.com | tcp |
| US | 104.18.16.56:443 | a.fsdn.com | tcp |
| US | 8.8.8.8:53 | 56.16.18.104.in-addr.arpa | udp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | udp |
| US | 8.8.8.8:53 | 238.75.250.142.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 104.18.16.56:443 | a.fsdn.com | udp |
| US | 8.8.8.8:53 | c.sf-syn.com | udp |
| US | 104.18.5.227:443 | c.sf-syn.com | tcp |
| US | 8.8.8.8:53 | 227.5.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.173.189.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | d.delivery.consentmanager.net | udp |
| US | 8.8.8.8:53 | cdn.consentmanager.net | udp |
| DE | 87.230.98.76:443 | d.delivery.consentmanager.net | tcp |
| GB | 195.181.164.20:443 | cdn.consentmanager.net | tcp |
| US | 8.8.8.8:53 | 76.98.230.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.164.181.195.in-addr.arpa | udp |
| US | 8.8.8.8:53 | content-autofill.googleapis.com | udp |
| FR | 172.217.18.202:443 | content-autofill.googleapis.com | tcp |
| US | 8.8.8.8:53 | 202.18.217.172.in-addr.arpa | udp |
Files
memory/4656-0-0x0000000074CA2000-0x0000000074CA3000-memory.dmp
memory/4656-1-0x0000000074CA0000-0x0000000075251000-memory.dmp
memory/4656-2-0x0000000074CA0000-0x0000000075251000-memory.dmp
C:\ProgramData\kdmapper.exe
| MD5 | 1fb060973127af435a948361cba03b9e |
| SHA1 | f861149e155e9bb3ef1f2f748874e884cde54cee |
| SHA256 | 194bee6ca7df1015b6b5c5296d04f711128a4ec2970bdab1bf621af758251949 |
| SHA512 | 8d22e67d3200ab028822985e35c6314051b1dc0cab612e6917e326f0c75ad9d9a97af7f8146f70468026b5efcc5d09d4d1d9f89f34191cfed3179db1285e5eba |
memory/2892-15-0x00007FFD3FBD3000-0x00007FFD3FBD5000-memory.dmp
memory/2892-16-0x00000000003E0000-0x00000000003F8000-memory.dmp
C:\Users\Admin\AppData\Roaming\Keyauth-console-loader.exe
| MD5 | accad9cf663d5819ab171725c62de978 |
| SHA1 | 6abf132629ebd01588f95e6e87422142145d2c21 |
| SHA256 | 48ef492c2a7daed9b5fd95cbe3b567a6f75e123ae4d9afeafb0fa1d3784a9c0b |
| SHA512 | 4fc791d57b89c4792dba0820af337cea924747efa102952f46afa9ba25f42360836146a9cd7285104657bb4756dfba77856f71e20290cf2f6202a1032ac416da |
memory/4656-26-0x0000000074CA0000-0x0000000075251000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3582-490\Keyauth-console-loader.exe
| MD5 | c6468039d2d2d29d67da192c4b93fbce |
| SHA1 | 6c295a9bff97d20fd8d1e7bd0306047965c03c27 |
| SHA256 | 574ffc78000ac5e306858cead0d0669ecc3c0bd2541001bab1d2f5c46e9d74e7 |
| SHA512 | 5777425adec2b763f3535dce5963422b986fb2ec25517f326b99956ffe5970a477f05cb1009f1fd54da2890ab26e79687bcf05efacb8f8a06a2bc0400b228be9 |
memory/3944-39-0x0000000000920000-0x000000000093C000-memory.dmp
memory/3944-40-0x0000000002DC0000-0x0000000002DD2000-memory.dmp
memory/2892-41-0x00007FFD3FBD0000-0x00007FFD40691000-memory.dmp
C:\Windows\svchost.com
| MD5 | c23ae27db3868ed615e2fb10aad9c430 |
| SHA1 | 2ae4f18703f36e3e484da9a14cf557a2f2c83d8d |
| SHA256 | a61dd97cf9eed6d01cd393a00f9cecc33368bd5a04ccbbb74ddcb37b984ebcec |
| SHA512 | 4504277050aec35a50476148de71c88fbb1b520bd8c2e8c79e30e7dd6b1f5d41889b9f35adc9bf3c4fdbcba0652e02a4deb9fba608874a3f5d8c0637cbb8adef |
C:\odt\OFFICE~1.EXE
| MD5 | 02c3d242fe142b0eabec69211b34bc55 |
| SHA1 | ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e |
| SHA256 | 2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842 |
| SHA512 | 0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099 |
memory/3944-50-0x0000000005BA0000-0x0000000005BDC000-memory.dmp
memory/1704-53-0x0000000005520000-0x0000000005556000-memory.dmp
memory/1704-54-0x0000000005D00000-0x0000000006328000-memory.dmp
memory/1704-55-0x0000000005A40000-0x0000000005A62000-memory.dmp
memory/1704-56-0x0000000005AE0000-0x0000000005B46000-memory.dmp
memory/1704-57-0x0000000005B50000-0x0000000005BB6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5uvosb4k.zin.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1704-67-0x0000000006330000-0x0000000006684000-memory.dmp
memory/1704-68-0x0000000006970000-0x000000000698E000-memory.dmp
memory/1704-69-0x0000000006EB0000-0x0000000006EFC000-memory.dmp
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe
| MD5 | 576410de51e63c3b5442540c8fdacbee |
| SHA1 | 8de673b679e0fee6e460cbf4f21ab728e41e0973 |
| SHA256 | 3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe |
| SHA512 | f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db |
memory/1504-91-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1704-92-0x0000000007B40000-0x0000000007B72000-memory.dmp
memory/1704-93-0x000000006F6D0000-0x000000006F71C000-memory.dmp
memory/1704-103-0x0000000006F00000-0x0000000006F1E000-memory.dmp
memory/1704-104-0x0000000007B80000-0x0000000007C23000-memory.dmp
memory/1704-105-0x00000000082F0000-0x000000000896A000-memory.dmp
memory/1704-106-0x0000000007C90000-0x0000000007CAA000-memory.dmp
memory/1704-107-0x0000000007D00000-0x0000000007D0A000-memory.dmp
memory/1196-110-0x0000000000400000-0x000000000041B000-memory.dmp
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE
| MD5 | 3ad3461ef1d630f38ed3749838bbedc3 |
| SHA1 | 8d85b0b392ae75c5d0b004ee9cf5a7b80b1b79e6 |
| SHA256 | 32be2bca2b848da78c02140a288f1bb771cb66757f90d20126b1bcfd5bb40e62 |
| SHA512 | 0e95e5181eab14d5820a3a4952018ac9b290fa3b17add8a5e13d893052f1d2a90a2323c62843f6a9e9af00f27e00108b60e0bce2f848e0a4d8ce0cce153db1ba |
memory/1704-119-0x0000000007F00000-0x0000000007F96000-memory.dmp
C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe
| MD5 | fbbde1cc9128fff8bdffd792e6ea8cce |
| SHA1 | 480368754e21ff97ded1f55f736c1427bb388ca3 |
| SHA256 | c26681e4c77fac521ec4ba461e34bbe17bdf566af7c004c96e30b8fc785af73c |
| SHA512 | 2ecb93ddb1f58e0f3b845e80c76b706b0adc4ab30220eda837cdf13723a730f725e97f81d2f76ef8e0148703ba8e0d4dd57a03f303d09fee78bed0bd5a0ff274 |
C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe
| MD5 | 2fbf8e73fc690c57c64459cb4c349ddb |
| SHA1 | 1038053aff4e542a8dbb77fc4d100fe083493e50 |
| SHA256 | 408ad7354171bc8d51846bbe8238e8fbd6a5bf9b0b12b3f55b43f61e03371bf2 |
| SHA512 | 7e29b6ae75865dc9e7004665f6c90513e5b8f593509cbd209f523ea5602ea9e242ef1fee867f8d293781a51fa816d502456bbe97414de2e7ecbc6f6f640a49fc |
C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe
| MD5 | 927c75ca98552179273baebb2038b44e |
| SHA1 | e85f3a6b2f25c344a76306579a488ee3a757a1cf |
| SHA256 | 625a894f316118bcb6b291fcfe0d35b3bf0204285999885eb5b489bf1bd8581f |
| SHA512 | 55b0498c69568b3ef45a5ea22dbccb582b45e969678339b66264ab2186416ff373a3cef4c13b4ec06fe18dca575e7d54ba20a0645c3c54816882fd3d51c48bfc |
memory/1704-133-0x0000000007E80000-0x0000000007E91000-memory.dmp
C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE
| MD5 | 25e165d6a9c6c0c77ee1f94c9e58754b |
| SHA1 | 9b614c1280c75d058508bba2a468f376444b10c1 |
| SHA256 | 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217 |
| SHA512 | 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf |
C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE
| MD5 | 7f95b64464c4f07e1e8b7d88caf978e8 |
| SHA1 | 3204fa9f8595fbc2cfbc5ef9a50fdaa96ef4e4bd |
| SHA256 | b4cd6fbeea92190d5bc778d2614a0eee43ac046a8f076ea516ebb91b90ada7b8 |
| SHA512 | 7efb1ac2fab724dfb77f1bf47f3cf44bb239f337f19caebe417daa04bbea2b9d34e3903194696183ee87fa3575f7d8a40a017a0139a8c3bee377abdc55690d13 |
C:\PROGRA~2\Google\Update\DISABL~1.EXE
| MD5 | 6a57dc8a285dc9738c88e78fba506d22 |
| SHA1 | 6c7fbb72d162b60ae27df884aa379c9e41ecbf9d |
| SHA256 | b3c0c2c2eba96fb385979636c2593d7322ef3d72a6d67cad4bb9ef64f7eb4699 |
| SHA512 | 4d559ded8758ce92b4f2bb7ad819873aa6fcb4f351e1aec820d49ba87cb840a593f9c6dca6f5244bbe4748b9f1c623e981ba0e77ad57e1364a1876f6fc3a88f1 |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\identity_helper.exe
| MD5 | a4c554903ffddf2c66eca876c614a75d |
| SHA1 | cc789ac39fea72c579a5ec64970d2b6cc9daeac1 |
| SHA256 | 09f2820a2ee73dc9ee5288fd25b3cde313e400f99f730464a31b71cfdbbd7f31 |
| SHA512 | d1feb67afcbacc1cb8c76c8774687546ab9ac6c0962ca62a8059a2b04b7332e9a0d8575ef37f9887a367b3f4f47b4bd5ea9010f754fdf0049498a58ba9fee088 |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\INSTAL~1\setup.exe
| MD5 | 1cae3b29628f35e661eab78f1c8b4a99 |
| SHA1 | 97fb011f97340a0687204a2f35e0e7e85112c97f |
| SHA256 | 643df72069bacb87065bfa4a0b552c97655c9497aeadea96e48e3d5df10cf3b0 |
| SHA512 | 30924f452425afe598f4f21d59433c05c4bd217bf313363c22be4e9d23e712f96cef905a2411cdbf23da08b3f8d61e20f127fd4d2ab3aab35483f46b4e32759b |
C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\msedge_pwa_launcher.exe
| MD5 | 037eb09ec7455bed1c2cc12ead01b246 |
| SHA1 | 821ca5516402d68a0e6aa8d807abb2f3e2a78554 |
| SHA256 | fe404e589880c9a7065f3e2cfcfa4675953dccc5250f26715f29986d7580d924 |
| SHA512 | bfae4a3f1ef8a8036e5c3c7700796bb2e5b534fd602a2ed9f209e0974b111ace42f7f82683388f2fdefbf7939bc504b57901af0cc881b2e06c74036bf802760b |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\COOKIE~1.EXE
| MD5 | fe0269e24575d8a8590185540f7b4f6c |
| SHA1 | e133f0f269ac97b93caf93fe6f7ecf55e929cef1 |
| SHA256 | 1b3d321b505dd2f13e8b669f554b31e6e00f5a5ab4f98160a8f7a0dd96c3b9fa |
| SHA512 | b30ce7aad664d2ad7ad9ff046e16a80bbf13caa70c981c12ee164f45f570b7e2013dacb630d6341ee67d4821519a9c33277f2801ad87521329b984e66873e6c0 |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\ELEVAT~1.EXE
| MD5 | f31b25bb1e8bd429892a63eaac0bce5d |
| SHA1 | f007774635ef84623a7b4e0c892a8ee14c4b6221 |
| SHA256 | 35e16cb335e2e73dc5a8ea0117598cebc98aa2e3550b32a4fb2b3d1f60be17d9 |
| SHA512 | f9515824dc4de6968903471bcc842e97acc30489d2054357c61098af190aae30ec7027c5e99aa9da1f527d53cddc209dd793db937e69f316ba1c9206884dff0a |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\BHO\IE_TO_~1.EXE
| MD5 | 46bda7f4ac4ec1457af4aceec4b0951e |
| SHA1 | 9038a90a2b4f6363fd20dc45984405e1d1e2a2d6 |
| SHA256 | 5eb1cd925ce4a5c5dd035a0de64bb7249303e53d1efff96ea510b0930470524f |
| SHA512 | 36e917760e250ad7550b73b20471c5c8264a6ab12984e95d4bba1f3f15602aa8ac1acbb0af3fa8fbd9aba80f002eeb444d1fb49a6d64b720e5368a7a8ce58465 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI9C33~1.EXE
| MD5 | 147b5ade315673b925bdd21eba5d9732 |
| SHA1 | 212b9882f166b187ef578298ee4bfdd174529115 |
| SHA256 | d49c72831f1b505b1846b23c3bf836219e27ea69e8fd43e8e4ca3ead7601252b |
| SHA512 | 7bb8186c67a20471d54fd37f3db55edaf86cdb34861359df092e1251ccadb80e2a71197304d192ccb5df0111676017be6823fd85617fefcb366ac405878caab0 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MIA062~1.EXE
| MD5 | 9cb564e5c608e17b8586921f4039d2b5 |
| SHA1 | b3299501284574831e929c689b28fa1a2eaf2918 |
| SHA256 | 9695a654513e4054bcc4304ca1143f4a443ad29927a9a93850cd9bfdae00a23e |
| SHA512 | 0c2c833afa033e13fd7d6e77df4ad0ccf81d39501e68efca8425130a69e310de3f5adf5298cb0c4b78c6ee2bdf711270f7d29ff8eaf212cfcad05ea39c2d7323 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~2.EXE
| MD5 | 0f087e158950e3f1d665448e3336bf19 |
| SHA1 | 0e2ce75f02bbfe87b0837651e3e027075190be34 |
| SHA256 | 32de49b2fe1b519af7ab9b31986f3fab62718e2235c4e50d60be83b6ac25b9fb |
| SHA512 | 5fce7ac2e152e110eab3ee775e077f85b21f55681934c5a86fe35c765882ad8309a494ca541efc7f3cfd4f6f565420626319521e3a96df489568727d2117ce10 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~3.EXE
| MD5 | 4cffb68680511742ad8a15d3c261387c |
| SHA1 | 754153050f13c2e54713b7be3c939a0d04cc87e2 |
| SHA256 | 9700b052d9424d6397e8c0da2274b5bdd9c49a5b6943def938481a0b9a05aa60 |
| SHA512 | edeaa427cdc0c2a18c679ced0cc6ddfcd6e619fbe344b86486ea6ad8f3b93cf874a1055b9260159108a9698acdaa11ea82e6fac91938886f670c66dad6f52981 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI391D~1.EXE
| MD5 | 9a91d53f0dc073ae102fcb107e1cab49 |
| SHA1 | 081d577751e2ef831cae482a2dfcb071b8d33121 |
| SHA256 | a0aa8127c0c49516d7229f55e26e20269127e2b6bcfcf8d39b067c96208f61ba |
| SHA512 | 44bd2eac46a1b19a5df0c8df4c1d9b12f591eb0f556df6f0ac872e2b87f4176af65c6954805c65021b8668d567b940d47060064d4ba38983840f9f06b2e5df14 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~1.EXE
| MD5 | 247348036dbe419034c3289f577ec6ea |
| SHA1 | 6adfd450bd84a629c612c7a2f8b2a613afb49245 |
| SHA256 | 29af76a6a5c935cae799cba744b4604da06d69f30e272a873f15ecfd57043b1d |
| SHA512 | 1c8c636f9a1c3c0e4f92ef026f9509fd29d696823bb1c7086b877f6f32663c2c42a83ea51c9751192cae331ad25733b417030dba81654fd747903cc3eae11025 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~4.EXE
| MD5 | 9a4c4a24d3fb6b6c731cd3b4d750336c |
| SHA1 | cf2c5968b62ce3afb3c5cc56b0e1f6b9982590e4 |
| SHA256 | 7e08ef2506ca12f42eb5c640a3b69d096e8a91be924f4c81f2841c2532640d65 |
| SHA512 | 616fdf320f979c4b34f6790e4aa6228e29e7f1bf0e232597e81c57252b5b2aefa4664cf59f0f2cfefdd281ee5846f5f465b9cc81ff9c14c665e03cfbc7536726 |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\PWAHEL~1.EXE
| MD5 | 6aa892c7d9621d5388526f832195fc0f |
| SHA1 | 9f77f2fe1166734a4eda02222b5ec080091b68c9 |
| SHA256 | e5f38ea31c0d27d3d0435d4f19e3da0e023a9fa94bf611d5d522b72d9a2b3b66 |
| SHA512 | 6bf56ce59afcf84265cd757ff99b8d664361f0f23d521386b0092b1574d34eb619184c6f8925b57fa0b94f5edf30453d6cec3b39273f8735cfe1835961ac0e3c |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\NOTIFI~1.EXE
| MD5 | 9265ab18f47b9624d04a7bcc4794cd89 |
| SHA1 | 4589d080807701f5a4813326a1b72d62e71d2880 |
| SHA256 | 0cb11ab79f1810b4589f2a28a12dee99c8c913428b6c6e497123800e2134ec3c |
| SHA512 | aa7870c60af1a278e78569c487950f6b9868b4941a25783fad63ea4bc07ba2959a8bb1b2242fc492a2ec85df610dcfcda08013501a2dd9fd9b8dcd728c0d5ead |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\MSEDGE~2.EXE
| MD5 | 7f88f3f90ac64568f91d7886f56ff0b6 |
| SHA1 | 2ef4a4496c09928a09da0af641e3c092ade4f03b |
| SHA256 | 1dc1ebb5939a050cd9eff7b7011afbf877cb33f21950fff127d7481f3e9d38b2 |
| SHA512 | 412345a84eeffd2ddd1bd66230d4eef5fa29e35891a4b5f329626f4b557fb2fc972f05f131b8c4c94c8296c774545b288da7ba2fda93e6654733a03d247f33e3 |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\MSEDGE~1.EXE
| MD5 | a4b214a072e3b243c4ebc478e6eb36a7 |
| SHA1 | 03d0e04d345971141a1cd5f56e31e7f8480974f7 |
| SHA256 | 77411e2933273fb7b04fd0dec90ea0a620b2293b6fbdbd5c29afa0cd7536fa51 |
| SHA512 | e32edd286477a52cbeaea9a0d20c49328bf78e86698620cee8c6900b672c0cc7feed5d2a5426770e9c2c70fe2a339814db4468d9fc960070e61e928ca3866a8d |
C:\PROGRA~2\MICROS~1\EdgeCore\122023~1.52\msedge.exe
| MD5 | 5d756a0168c787760258a53087193fcd |
| SHA1 | 3a1190370ec84df9cbc2d0b8dc2c3c040268e667 |
| SHA256 | 4dcb3cc3b7e87ea4fdfe524d5d24a32eab1f87f1d477620879edbf8ac99c25d8 |
| SHA512 | 213c39edbce4602f5e2882ba39d59ab51552b5e1c384c5e274addf3ddaafecd50fd9763a888fac7b406f136dcca63ca29a696ba407ae5e1e0446bee95ad24af4 |
C:\PROGRA~3\PACKAG~1\{17316~1\WINDOW~1.EXE
| MD5 | 82ff4ff2a82092323145a1e2681ec337 |
| SHA1 | 26c4d69e0cfba7e972b693b9f60adad8ef8f72a3 |
| SHA256 | 10b0b2097e86b216f43d1747fa3390ca5bf1e219dfc5a3d777f2347056684dfd |
| SHA512 | ed95243cac1c090fc5ebbe290f0b1a08353500f4a129e63523e27f3d2fab1ed9ac2aec7a9af442b8124ce1fcd045a327a85e324659af1e9d2a41323790f5461f |
C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE
| MD5 | f34835c1f458f93cd9041bfa7d01ee7d |
| SHA1 | 283ac4059492a22e10f7fcef219e52e0400a8926 |
| SHA256 | afc5cc567db1a3318c89dd0efad2ca60a353290bc25d98bbbba8e6f1492e23b1 |
| SHA512 | d5cc2244f1b6492dd9e66c6e917c2dfaa11376d4a8d1dea2c241cd35ce947ad919e47d1a78dea0c1f6cd6fa1e74426f806ddcf9ed3e8f25a9ae7c370b09e6857 |
memory/1504-224-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILESY~1.EXE
| MD5 | f3228c24035b3f54f78bb4fd11c36aeb |
| SHA1 | 2fe73d1f64575bc4abf1d47a9dddfe7e2d9c9cbb |
| SHA256 | d2767c9c52835f19f6695c604081bf03cdd772a3731cd2e320d9db5e477d8af7 |
| SHA512 | b526c63338d9167060bc40ffa1d13a8c2e871f46680cd4a0efc2333d9f15bf21ae75af45f8932de857678c5bf785011a28862ce7879f4bffdb9753c8bc2c19b5 |
C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\OneDrive.exe
| MD5 | e25ffbddf046809226ea738583fd29f9 |
| SHA1 | ebda60d1f49cd1c2559d6c0f0a760dac7f38ce98 |
| SHA256 | 91630469f3d18ebf1be43522b6dcb6547c3b67ab7a17a246e1b2122628dfcd80 |
| SHA512 | 4417cba81c77c2a60e448b69dc615574ed4862fd97af014ebdf3ffbdde8a6c9bc32aca4881f59037f908a67b674d9e49b817fc1e6865e8f08e374f36baade101 |
C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe
| MD5 | 05bdfd8a3128ab14d96818f43ebe9c0e |
| SHA1 | 495cbbd020391e05d11c52aa23bdae7b89532eb7 |
| SHA256 | 7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb |
| SHA512 | 8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da |
C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
| MD5 | 63dc05e27a0b43bf25f151751b481b8c |
| SHA1 | b20321483dac62bce0aa0cef1d193d247747e189 |
| SHA256 | 7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce |
| SHA512 | 374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3 |
C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
| MD5 | 9597098cfbc45fae685d9480d135ed13 |
| SHA1 | 84401f03a7942a7e4fcd26e4414b227edd9b0f09 |
| SHA256 | 45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c |
| SHA512 | 16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164 |
C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
| MD5 | 91490c78c45cbd686ac759b6a252e898 |
| SHA1 | 51bb6c5aa14cf478b0b6fa0329c7366d1f6fb480 |
| SHA256 | 47f3331b4f35012d38bc11cdeae0ff7b4ae1186d4e916e3e48a9440438296821 |
| SHA512 | f7d44cd6df2c0c492731c14ca27e26605e8cddb9cb9287bf083fe1e43f753cafa11c341f0915510ad1d189466e92bb3f4e219b3599e9df72878bde14518bee35 |
C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
| MD5 | f6636e7fd493f59a5511f08894bba153 |
| SHA1 | 3618061817fdf1155acc0c99b7639b30e3b6936c |
| SHA256 | 61720d294189141b74631299911d91874aa02e67096a47cfaf56ef03f568bd33 |
| SHA512 | bd2ae751a37b4c065f0d7f7f7ec19785c1552dfaa4818fdb213fffcf90b7951886131a2b5d7aad843f714be418383fcf09ba1d9548bdbf38fa3d304a092a33d1 |
C:\Users\ALLUSE~1\PACKAG~1\{FB050~1\WINDOW~1.EXE
| MD5 | 443cfb6389cc0462180c83a6c84e2f50 |
| SHA1 | 1be84e7fedb5b094808cf186d87d0128b6841cbc |
| SHA256 | c640e656f0f715391b77c9c14cb60042daae6dbd8a22ddd0952c5d91a556c292 |
| SHA512 | 18423c27e5e229e288ce8dd6e96bd33921c503ca491a20a6d81cd1b124ce7c0d56957e029ed9ba2c97042300353f37c7b78ac262c55697c556608ba1e2426896 |
C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
| MD5 | 015caa1588f703bd73bc7cfe9386ffe4 |
| SHA1 | 747bec0876a67c0242ff657d47d7c383254ea857 |
| SHA256 | e5c6463292e3013ef2eb211dad0dfa716671241affbd8bed5802a94f03950141 |
| SHA512 | 1fb3b2fa422d635c71a8e7865714516b7de1c32e6286f8b975be71b17a9186fcac78852e9467b4751b4eab69cb6af30140772858a758596596d09d767d170aab |
C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
| MD5 | 413ec51a9880e79324c712c0548674c1 |
| SHA1 | 032d114c78c8df6d98186eeffd9cba24589e93bb |
| SHA256 | 80eee8d364db4b281b1643a1a52a5dd1c334b4f20c2519c5e0ba7aa9a49c2bd7 |
| SHA512 | 4a1f74751793c32729ebe1e01b8b79ffe1a812e6972a21c17a688f52ea828c9d179151026597cae202b3cc46ecd0909d78b47cba5b3e2dc954832cd378657555 |
memory/1196-246-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1504-247-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2892-248-0x00007FFD3FBD0000-0x00007FFD40691000-memory.dmp
C:\Windows\directx.sys
| MD5 | a04be9518db0884f6ef234537a09d182 |
| SHA1 | 4fb9bff6b1711f333e0f17bf31628eaa3a5578b3 |
| SHA256 | b33200e2c157ba1d66f336dcc9cfb6afbeab553554f955aac5f9f522d69418f7 |
| SHA512 | 230d35a520ab70a3c4e6b80d8d98b7dbd40fdd1573c5a5a34afa6800875594e56a2fdb4fb551299d6d4d5861fd044e9aa1c44c4a476f011404ed1d6217cbb108 |
memory/1196-260-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4508-262-0x0000021119420000-0x000002111A420000-memory.dmp
memory/3204-453-0x0000000000400000-0x000000000041B000-memory.dmp
memory/2140-452-0x000001F6F7FA0000-0x000001F6F8FA0000-memory.dmp
memory/2752-510-0x0000021C99E00000-0x0000021C9AE00000-memory.dmp
memory/1504-552-0x0000000000400000-0x000000000041B000-memory.dmp
memory/3672-648-0x0000023C59900000-0x0000023C5A900000-memory.dmp
C:\Windows\directx.sys
| MD5 | 4f4d924d2584d145b5b6b9b4bad44fdb |
| SHA1 | 9ada6b02192a14219601e5f9d862dee7779083a4 |
| SHA256 | 7293d0a3c14173bb9ca7f33ca33387b2e774980aadf6865ab315bc756d1f9432 |
| SHA512 | e0fb71d6c2f0d6cfa2647ebc3ba3aa7777c1a6f398da4d670a0853f26b0942590c00bd49f647a4ee6403b42fbba87f603dc12c047ab37b66dcecb40e39b08abf |
memory/640-821-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\prefs.js
| MD5 | 5f6e3d40d1c89cedd26ca73e78f6f04f |
| SHA1 | 9a91072d677f98c70d25acdac5cbdf3083bfab34 |
| SHA256 | 0ca46bb37a14bbbfc758ff9f5d79efb7a14439a5d3bc05c29d09e333efe63042 |
| SHA512 | 3c35e407fd1142ed5a2267989fae4f7ce0a559bcedaa9e22785555def1e2520f89be0f9f22e05bca1f3b4011937e4c207d3d9c8a148aa7b53c9eae839c0547bf |
memory/5404-793-0x000001840EF10000-0x000001840FF10000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\prefs-1.js
| MD5 | 124a90b41f19ef3674a2d0d10883840f |
| SHA1 | 406e8691a59684e29aad1a1a00076bd4654869c1 |
| SHA256 | dbc86d92ae3d2a4ef97cd8c2aa9ec79393b7a775d72d82e317ce2746f91f52ea |
| SHA512 | 4dc1e57f4608293d4b76e0b941301ebcc661a0be3dfd2d82d9bcb4f585f345bf7aa2aebb0b1749801df8398d9ccc8fd29243419021c14a33642957c98b3362c0 |
memory/5592-951-0x000002796A340000-0x000002796B340000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\pending_pings\0294b89a-2e7f-467d-abc1-d5c7c61f6423
| MD5 | 458a6d7cae5beea50782b5f0e3c02bd3 |
| SHA1 | e6dfb736d9090625ecc96e165e7c247f66f2e873 |
| SHA256 | 4df5dfb8caeba04f49ddd374284af37b6e344ddb8fc3adf33d32f5e96c8b493f |
| SHA512 | bbb157c91b534d07399bdf076a2ec1ef47b1050a81590f613eaf95a9cda360e6fad0b792355f95c831320a399b51ae8679f2c06d70f223e7511368d68ec71d13 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\pending_pings\867fbad5-f802-458c-baf1-088e4366e334
| MD5 | bd029f860a087ff9cf6109b9e849b80d |
| SHA1 | 364794adcc01e8dfb4eab1f459f7b0967dfcb624 |
| SHA256 | 6136c01793eec0e74f6c7bf067a63b62bd0c35fc9b930ae15cfab8f16a6456d3 |
| SHA512 | eb010318dd4ff0d8c56490b45dd36a3f953d00eea8338ed5b99597a9be21f6de1a78560411cc916349a4f6193e12a53c0202c790a3cd5f46e9fd55a0966742e3 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\db\data.safe.bin
| MD5 | 404afdf964d3a751b14b16ef5b9a497b |
| SHA1 | 277fd4f7bec55a4400a18c2d427f6a7b336107ad |
| SHA256 | 86a4d9681327aecf8769ba8298742d1816a1b8720ac5518c66b7da8248daff7e |
| SHA512 | 2c9ea8d4d9c464ede48e33ba2f707c0df7d1044cf16be1220a36cb4f905b744bfa60c810bd4e64ebc8e3791d580e186d6ced8e4ed9cc851e40b0d3bc54c7a861 |
\??\pipe\crashpad_1980_GZGQZEGTWLDSMFSK
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/6000-1486-0x00007FFD5D630000-0x00007FFD5D631000-memory.dmp
memory/1504-1591-0x0000000000400000-0x000000000041B000-memory.dmp
memory/4508-1600-0x0000021119420000-0x00000211194D3000-memory.dmp
memory/1196-1599-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 7adfee93f396a1fd530e878296b5f35f |
| SHA1 | 47cbab876304eedea26ee95ead4094058dc5f7d9 |
| SHA256 | 672feb142b99821400b10beac7bc424e791ae9364446189895ae7135d06045bb |
| SHA512 | 854d2c4c220c9435b2636eb4c28174cc68b80e10ef05a5878f55681a0fa198c978e253f8c8c9c6801fb2d53ec6ae86d41aec396f04a0594b20b07f00954ceba6 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore-backups\recovery.jsonlz4
| MD5 | c7c6e24899b73ba9bd29391a913e9c65 |
| SHA1 | 89c21c0901aae6778dd6e3af16354e3fdfa3252f |
| SHA256 | 2ced1aef6b3cdd7021ccaa3a38bc844b5ac0aa966619d7c8e8d23176fcdac5ff |
| SHA512 | b1fafcdeccc99e14ba4b3e26f619b975d84866ed499744153090f9f710f1e661b6ae511343ffa73c24bec7a2310dafaf536dcdbfbe84cbfe71a90d1dc02564d7 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
| MD5 | 03994b88bdc9e598d88f9273dfec8e0e |
| SHA1 | 9c4d73dc30e024c6884167494d36edc072a59cc6 |
| SHA256 | 51f2123c825c0e1071fa87a6d9e6cf057b9829be2092ba1277681ce095dd270e |
| SHA512 | 17741d2e38e8a695c7b10ad67bf390d5ce515136ccf2e7445aa705d427c2f05213ce83cfa333651971759e49bebd2d70b3fd3535b17008328f69cf3a04c407a0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 9aaf4e4f4844bc39899336ced44b5593 |
| SHA1 | 4edbfc7e11a26ae6c2c50930eaab8be6bc4a432e |
| SHA256 | 6ab79a7fe1caaf609704e1167b8e17358b9e5ec8933a8353648661440745fe57 |
| SHA512 | 31957eb48592fb94733bbbecc7af26e2df2ef7b71dd7e1ba45c23771a4efb6b0090ddad5d8c7f75fc6324257f6eecf1f85046d703b96f22db5f91eb134ab0f17 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\prefs.js
| MD5 | 6a89b6ff8d3017a245c322892ede83d0 |
| SHA1 | b9c1da8b64bc143b4f837536f4ccb8fe4d8be4e5 |
| SHA256 | d0b3fb95c608086e374834bae772be676c8e2d1b5b2a26db050830570dfb49b6 |
| SHA512 | dd68b67daf133e538a686ba81b431ae94e4585224f56d9ab1c0953e301059fa32299c8ef2d88792c173d3c6796ff673cc3f851d10f5cf721b84a1f68fee0954a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | a0f436b26953fcb2c38b3e51a92a4b4e |
| SHA1 | 6bbbb38209016034c6308fac8fc4273ae686de1f |
| SHA256 | 48820801c21832c7cd444be2e90e7d4ce1bbae99179b43be02c52d49e35bebea |
| SHA512 | 87629c7ae8a12870b836934993a3ab7551a6f2786f24c51045e52cd152a3549b03e04d7a07d0d1cd9ec1f072c2866ffec08cae17cfb857328ac9c4a0b543b6bd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | e04b32b3bd0c2ffdaa70cf4fc3aa5908 |
| SHA1 | 811d1eee8b34fcfbe7f257dbdc4363d1eaf798c1 |
| SHA256 | b0201c45f574d21ff40d3ca4ef9838071716aa47f4b966d52d493417e9a3ca82 |
| SHA512 | cdd11fe2324c54956dc0a5e9efb03b5cc4cb9a738ae0d0138b5aa36f2fd41b32f4df0484633f25718e988ef0d8cb8a69427fff8af72d8f9d6578f1f45a66d53b |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\prefs-1.js
| MD5 | 04b33b2ce03682b42a75bf7f96c9e8ab |
| SHA1 | 561f195079fef2ce5ae93354dfdb6f5da06f7714 |
| SHA256 | fc7e253b0d019f3fc6a5a1b4068d32086b39e20a41f1bc108014f25236e9f472 |
| SHA512 | 8e366fccdf6b7813b3b8d58b00c06b55a4b1964ac5f68cd5b7fdf7da68ce55cf20f3037227d75e6adb332a50c0e70a2587f5813b91591ce05b23a4ab60f2bbc3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | ed029ee239009794ed71a1ae4112754a |
| SHA1 | 1eb17c1a5930a6e5875299790b639e5dab011ee4 |
| SHA256 | bb6ff9d9acfd1f173c9dfa835ba61a0c3b9d2de1e6b3c025e1719ff47d8929e1 |
| SHA512 | a62a269000cbfbeaef8ef249516e8e6b55cb468b1c4fa9f18383e6ddf02fd0491021261688bf2ebe429363e84faf7d2c07bea28913510c36037573b7eb1c8030 |
memory/5220-2102-0x00000226D3270000-0x00000226D339A000-memory.dmp
memory/1776-2397-0x000001E176140000-0x000001E177140000-memory.dmp
memory/6708-2422-0x0000028857E00000-0x0000028858E00000-memory.dmp
memory/4664-2423-0x000001F2F2C80000-0x000001F2F3C80000-memory.dmp
memory/6964-2407-0x000002074CFB0000-0x000002074DFB0000-memory.dmp
memory/6000-2461-0x000002A7E7710000-0x000002A7E783A000-memory.dmp
memory/6076-2468-0x0000011C732A0000-0x0000011C733CA000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore.jsonlz4
| MD5 | 4e82816a83b96f4b5546ee956cfcb888 |
| SHA1 | 08f45b96449b134a68aee2dc1d177ada55e352b5 |
| SHA256 | 2db8814ae8a8ead3a05d289201334bfc235752d46e89d0417c8d99df0629c429 |
| SHA512 | 45c0ad149255c7ac1fc8cb4b5fd81d92e924a72d29c8d16a8f532ed47d899b1ca01723a7fb398f792d7df17fb71edd04bd8343c927ce7a13364d03a74a848f83 |
memory/5180-2775-0x00000248D4490000-0x00000248D45BA000-memory.dmp
memory/1504-2802-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1196-2803-0x0000000000400000-0x000000000041B000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
| MD5 | 85cfc13b6779a099d53221876df3b9e0 |
| SHA1 | 08becf601c986c2e9f979f9143bbbcb7b48540ed |
| SHA256 | bd34434d117b9572216229cb2ab703b5e98d588f5f6dfe072188bd3d6b3022f3 |
| SHA512 | b248162930702450893a112987e96ea70569ac35e14ef5eb6973238e426428272d1c930ce30552f19dd2d8d7754dc1f7f667ecd18f2c857b165b7873f4c03a48 |
memory/6432-2889-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1504-2906-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1196-2907-0x0000000000400000-0x000000000041B000-memory.dmp
memory/5192-2915-0x00007FFD5F210000-0x00007FFD5F211000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\f5e083d0-4be9-4c6f-af14-e662354795af.tmp
| MD5 | 5641e7f9f9ce011b9cfb38ed79fac8d2 |
| SHA1 | ec992eb38072b8c7ff1fc6828401dcf1a546a28b |
| SHA256 | 4b22acd1d88465534b84efdeaa35656e252f889c6f2677747948f6d16e1d8e81 |
| SHA512 | 2d65333a444545bcb568c365c198d78f9873fccde2f4c614aef6f3ac9d56710685b39bde8b157fa46d6ea2ce5f38ead0897ad97fff02e864a78a29d93091cf2a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | a91cab05fa4cfe79558b23ecfaf0071e |
| SHA1 | f4fcf662e6025d8c6078ce6ebd231fe3848068f2 |
| SHA256 | 2088bb234884b40c012997352079c5f553a427dcce3520b4ce2361adc7472722 |
| SHA512 | fc34a0c494ddf8442cb0d1956a28e87bf98179febfa7e895cea306755b4a231fa59ed405acfff2f66c81fe0fa774836d97d55c996a692f293cf3b64bb485a4bc |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | e0d7774bb6c6a741aa3525197de3282c |
| SHA1 | 3ff32ef4f92b64988a03c6b711f72783c46bff06 |
| SHA256 | 348e9038e90f60c48cd264312cb3b2ea667d12c9743b2d2f1ba880079f07c337 |
| SHA512 | 11733cb15a26f8a091ddc9db65a0976019c4c953e400a0faef6f80d4792667b2c2fde21df7a8bab3e816111f47f3bb985f7161f3b68804bc73b0da264ee1d6f8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | f21f4d3701aae5ba5b8229a45fc32f08 |
| SHA1 | 4f16b0edb6bd5e3b62d6ba72704c4a6def90713b |
| SHA256 | 23932cff248b01c9ad6e99d9e0747a879280efb2ac25f36ff4a439bb111fa75f |
| SHA512 | 919d0e326de09aabf7ddcb0cd27c1c158ec8e6d097448148103647b9b66e8ce5a47a3001b6c20c99c3f0ba9c7997c51c6b42b74092cb1c16440a6647489d08a5 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 33097fbbd0e02115deca09faf6e3bd9c |
| SHA1 | bdaee6ad725b28ea171353bfdd3e21c010c7ccf9 |
| SHA256 | d698c20bd641f2e0d7fe2b154d1846919e67a09236c16aba1bda1180433abba0 |
| SHA512 | f6374caaaba799d3da1435a46fc06d2ce982fb6d3ce47575e297bbda8a2b60996cd3736156b85f045a91e81c238b35f302ed524ab800d2b7f6cd6cb589be8f7b |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
| MD5 | 99914b932bd37a50b983c5e7c90ae93b |
| SHA1 | bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f |
| SHA256 | 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a |
| SHA512 | 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 3b263ee5c77d9ee994bad2aa7f25b635 |
| SHA1 | 077d5240859c00838c749bb234cc0b5d43fbce88 |
| SHA256 | d087948ef5677d83c21c588d6ec48d074b9146bcfc96b033cc338d1731c12a11 |
| SHA512 | 4b1471007a925884d14fee53a433f4e523e58e854e463982f6924d3c7cfd1bef0f260ef842e2fa9d30583ef661937e6e61aa9a96aaeb791521f36a610914b43e |