Analysis

  • max time kernel
    78s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 17:05

General

  • Target

    https://tn3270.myabilitynetwork.com/activex/ab3270.application?sesHost=stream.ses.visionshareinc.com&sesPort=443&sesConnectionId=connection-629&connectTimeout=60&readTimeout=30&model=IBM-3278-4-E&authToken=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImhKaWl0TzFheHpmN3dTa0hfel9LTUF5MDF4USJ9.eyJpc3MiOiJBYmlsaXR5TmV0d29yayIsImF1ZCI6Imh0dHA6Ly9hYmlsaXR5bmV0d29yay5jb20iLCJleHAiOjE3MTg5MDI0ODYsIm5iZiI6MTcxODkwMTg4NiwiQ3JtQWNjb3VudE51bWJlciI6IjE1OTQxIiwiQ29ycmVsYXRpb25JZCI6IjRiODU2MTRiLTcxNzUtNDA4NS05NjY4LTJjYjcyNmVlOTEyMCIsImxhdW5jaFR5cGUiOiIyIiwic3ViIjoic29rbGVuZy5uYXdhekBoc2MudXRhaC5lZHUiLCJVc2VySWQiOiI0MjJkNzk2Ni00NzFhLTQ1MTctOGQ1OC02OTI0MjkzYzI0YjEiLCJMb2dpblR5cGUiOiJEaXJlY3QifQ.I4t85J2lSh2bidk2SK_TfEVMfTsatBhJng3SnHsIeUzmwZAmaMcH6R4rVaDuV7sOsxcWZfiuK0YDRmewN4wZEcrUkGBilqyGIK4QTWX7YlbOWMNo5OuZdrSbX9DXOglWae4ejCniGM-xP8nmHffPLhvnskE2nlgznbxfxQ3U_A6Vh2hPVPW-18BWqV8hAbXQgbcPaOe9jjM-BElbihb4RICuErXHggIyul4bLmDp4Cay5u8_O7AO7fSDFbmfKLBQSny1GUtEkcvrmf3cr-BL5rmb0NeFgyYEocAtet2U2spfqAyCuauDMcll8J3NMjJ_SzzRxOXNIV5jbeNAbijawQ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tn3270.myabilitynetwork.com/activex/ab3270.application?sesHost=stream.ses.visionshareinc.com&sesPort=443&sesConnectionId=connection-629&connectTimeout=60&readTimeout=30&model=IBM-3278-4-E&authToken=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImhKaWl0TzFheHpmN3dTa0hfel9LTUF5MDF4USJ9.eyJpc3MiOiJBYmlsaXR5TmV0d29yayIsImF1ZCI6Imh0dHA6Ly9hYmlsaXR5bmV0d29yay5jb20iLCJleHAiOjE3MTg5MDI0ODYsIm5iZiI6MTcxODkwMTg4NiwiQ3JtQWNjb3VudE51bWJlciI6IjE1OTQxIiwiQ29ycmVsYXRpb25JZCI6IjRiODU2MTRiLTcxNzUtNDA4NS05NjY4LTJjYjcyNmVlOTEyMCIsImxhdW5jaFR5cGUiOiIyIiwic3ViIjoic29rbGVuZy5uYXdhekBoc2MudXRhaC5lZHUiLCJVc2VySWQiOiI0MjJkNzk2Ni00NzFhLTQ1MTctOGQ1OC02OTI0MjkzYzI0YjEiLCJMb2dpblR5cGUiOiJEaXJlY3QifQ.I4t85J2lSh2bidk2SK_TfEVMfTsatBhJng3SnHsIeUzmwZAmaMcH6R4rVaDuV7sOsxcWZfiuK0YDRmewN4wZEcrUkGBilqyGIK4QTWX7YlbOWMNo5OuZdrSbX9DXOglWae4ejCniGM-xP8nmHffPLhvnskE2nlgznbxfxQ3U_A6Vh2hPVPW-18BWqV8hAbXQgbcPaOe9jjM-BElbihb4RICuErXHggIyul4bLmDp4Cay5u8_O7AO7fSDFbmfKLBQSny1GUtEkcvrmf3cr-BL5rmb0NeFgyYEocAtet2U2spfqAyCuauDMcll8J3NMjJ_SzzRxOXNIV5jbeNAbijawQ
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffee9746f8,0x7fffee974708,0x7fffee974718
      2⤵
        PID:2912
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
        2⤵
          PID:1368
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4792
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
          2⤵
            PID:4136
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:4608
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
              2⤵
                PID:3188
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:8
                2⤵
                  PID:4616
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:636
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                  2⤵
                    PID:3572
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1
                    2⤵
                      PID:3684
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                      2⤵
                        PID:1684
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3904007548315292722,13668650539658941226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                        2⤵
                          PID:1508
                        • C:\Windows\System32\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\dfshim.dll",ShOpenVerbApplication https://tn3270.myabilitynetwork.com/activex/ab3270.application?sesHost=stream.ses.visionshareinc.com&sesPort=443&sesConnectionId=connection-629&connectTimeout=60&readTimeout=30&model=IBM-3278-4-E&authToken=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImhKaWl0TzFheHpmN3dTa0hfel9LTUF5MDF4USJ9.eyJpc3MiOiJBYmlsaXR5TmV0d29yayIsImF1ZCI6Imh0dHA6Ly9hYmlsaXR5bmV0d29yay5jb20iLCJleHAiOjE3MTg5MDI0ODYsIm5iZiI6MTcxODkwMTg4NiwiQ3JtQWNjb3VudE51bWJlciI6IjE1OTQxIiwiQ29ycmVsYXRpb25JZCI6IjRiODU2MTRiLTcxNzUtNDA4NS05NjY4LTJjYjcyNmVlOTEyMCIsImxhdW5jaFR5cGUiOiIyIiwic3ViIjoic29rbGVuZy5uYXdhekBoc2MudXRhaC5lZHUiLCJVc2VySWQiOiI0MjJkNzk2Ni00NzFhLTQ1MTctOGQ1OC02OTI0MjkzYzI0YjEiLCJMb2dpblR5cGUiOiJEaXJlY3QifQ.I4t85J2lSh2bidk2SK_TfEVMfTsatBhJng3SnHsIeUzmwZAmaMcH6R4rVaDuV7sOsxcWZfiuK0YDRmewN4wZEcrUkGBilqyGIK4QTWX7YlbOWMNo5OuZdrSbX9DXOglWae4ejCniGM-xP8nmHffPLhvnskE2nlgznbxfxQ3U_A6Vh2hPVPW-18BWqV8hAbXQgbcPaOe9jjM-BElbihb4RICuErXHggIyul4bLmDp4Cay5u8_O7AO7fSDFbmfKLBQSny1GUtEkcvrmf3cr-BL5rmb0NeFgyYEocAtet2U2spfqAyCuauDMcll8J3NMjJ_SzzRxOXNIV5jbeNAbijawQ
                          2⤵
                            PID:3344
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
                              3⤵
                              • Modifies registry class
                              • NTFS ADS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5068
                              • C:\Users\Admin\AppData\Local\Apps\2.0\G5T9CR58.WRG\K8YT8M6P.GJE\ab32..tion_37cb4a4445f31ed1_0005.0005_b81175bcbe1585be\AB3270.exe
                                "C:\Users\Admin\AppData\Local\Apps\2.0\G5T9CR58.WRG\K8YT8M6P.GJE\ab32..tion_37cb4a4445f31ed1_0005.0005_b81175bcbe1585be\AB3270.exe"
                                4⤵
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1564
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1924
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4008

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Apps\2.0\G5T9CR58.WRG\K8YT8M6P.GJE\ab32..tion_37cb4a4445f31ed1_0005.0005_b81175bcbe1585be\AB3270.exe:Zone.Identifier

                              Filesize

                              26B

                              MD5

                              fbccf14d504b7b2dbcb5a5bda75bd93b

                              SHA1

                              d59fc84cdd5217c6cf74785703655f78da6b582b

                              SHA256

                              eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                              SHA512

                              aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                            • C:\Users\Admin\AppData\Local\Apps\2.0\G5T9CR58.WRG\K8YT8M6P.GJE\ab3270.exe_37cb4a4445f31ed1_0005.0005_none_0042527bbae5203b\DDE-icon.ico

                              Filesize

                              1KB

                              MD5

                              6f548589b67690bdcc9c7346526ef12e

                              SHA1

                              2e389bc43b6b1df71b4680a8643502e547063f79

                              SHA256

                              487ebcc2b1bcab90b6cb99566063a2f3dc85caebb7594780505b331115a08bd0

                              SHA512

                              fc332802fe20053d001222c4cc335943409073d03e72b4e39408e8fcc76290c4245a6f128190d9b149c8a9d452ec8d76a23149322dbcdba5b15226eed805ba0e

                            • C:\Users\Admin\AppData\Local\Apps\2.0\G5T9CR58.WRG\K8YT8M6P.GJE\manifests\ab32..tion_37cb4a4445f31ed1_0005.0005_none_44909a904238c218.cdf-ms

                              Filesize

                              14KB

                              MD5

                              b08e60c0f9446c937c9adbe10a86bb54

                              SHA1

                              2724be01e5c844c3b23aa29ba138b96b5ede714c

                              SHA256

                              8ab6e87fde29a953122182ccbc4a79dc49ca156adebb2488fb629103726f2c85

                              SHA512

                              62617210fc9bafe5a503d782ac28b756b7392e032a49ecf0e48361fbfaed06d08e3c4fe878f27a0d3a8e6cf1f8c7c73558dfde84b91cfb268a324ad108f0ee6a

                            • C:\Users\Admin\AppData\Local\Apps\2.0\G5T9CR58.WRG\K8YT8M6P.GJE\manifests\ab3270.exe_37cb4a4445f31ed1_0005.0005_none_0042527bbae5203b.cdf-ms

                              Filesize

                              18KB

                              MD5

                              f590f630246dcb352908138ae0f11b2e

                              SHA1

                              16ca7e27ddfbe0d6624a530a41fec2606df79ae4

                              SHA256

                              bb75df82bd0a07250c3d6c66828fc3527a19819c1cadd021e2c4e8bb654ef5e9

                              SHA512

                              39aa4c4139be5e230d9a76741f019797b5fd4610cfd43179b722fb9ac32eaaadd1cf665a1aa242af9c5cff9c904d6921e0e4e7a5cdb05ef46d490a6a5c824e8f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              477462b6ad8eaaf8d38f5e3a4daf17b0

                              SHA1

                              86174e670c44767c08a39cc2a53c09c318326201

                              SHA256

                              e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d

                              SHA512

                              a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              b704c9ca0493bd4548ac9c69dc4a4f27

                              SHA1

                              a3e5e54e630dabe55ca18a798d9f5681e0620ba7

                              SHA256

                              2ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411

                              SHA512

                              69c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              c3ea23ea0ad5de0c63ca675807596684

                              SHA1

                              3e86090d5339f886fe96f3bb68d4db698882a72f

                              SHA256

                              c1b9193e4f81539937fd762c3437bc4ddc57a6a54af83b378bea1dd3767f05f3

                              SHA512

                              1e26c047797d4f28d6507e288f93751732a0b22667016a740b4a0080605e4e698c8c3b6893414388da2c0e6674538d1364b3d42760d39316c8f72aa01eeb30ea

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              32706902365de3e85ef50d8f1b1852d2

                              SHA1

                              3ce47bd9f429ff4a13e9217bf7e48ffb86d8bb64

                              SHA256

                              ec59bf0c2d8b2313ef01bd279c3ba00924ec16d41566b1e02ea5e93e5617bc78

                              SHA512

                              f31f4560f6f9e07068931a47c2eb31621ed48b0eb81f1e698d1d8fabb48eb84dc35150082751f1a5b389badb67cfbc09f0310694a5ddb0012b2103fa1e0a5da6

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              c23f1a87baeeeb397509ed57a81db261

                              SHA1

                              6902a90a86f0d11db33409d3acce0f63a9c346bb

                              SHA256

                              ff91bba3ff92daa4955c728a67bc9d2d1589a9586bfc67fa2db9d013a1118e8e

                              SHA512

                              9a72c91b9d4d23c3998b5d9b140e9c3ad43b62f95bcbcead9b3a80388f7191e4957bc18ba1f7329b3c1dd941c7c2e15b76fd0b317487b50a6173cc78566d9e88

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              454cb67026d3c8b7b41dcfa5f8037a84

                              SHA1

                              03ebb6986bd4f925ad30137ecc276da5c60e0e89

                              SHA256

                              b0b710086bb5ddf9b1e563dbc031c05f85df9aa8e68f63be3d774fbf56559d2a

                              SHA512

                              4ed90d1c8bbdae405865874715e728ef574c20b014a65859654521c3afab907036bfa028379e58ac3cf9321c1fee6392ced7929a089c48dd51354057c019773d

                            • C:\Users\Admin\AppData\Local\Temp\Deployment\BN9N27GN.X7X\1C77RKJ7.7VH\AB3270.exe

                              Filesize

                              16KB

                              MD5

                              46d9c68da00e60a550afbee2b6a50f9f

                              SHA1

                              3e832b317153c64e1bb88597e362d626155d3b45

                              SHA256

                              ce4a5cbaf7bf6ed3182fe4e72b6edf936ca885cc2c689d150e561993dd292e3e

                              SHA512

                              d8250b3249dd9372e394668213b4e185a2429947b1d7d15bc78c81db41d8da4e1bc435de039a641c157566168c33db963ec80d3f35e8a5eb8639f993534b68d5

                            • C:\Users\Admin\AppData\Local\Temp\Deployment\BN9N27GN.X7X\1C77RKJ7.7VH\AB3270.exe.config

                              Filesize

                              206B

                              MD5

                              c62c0f34809c9b000d0d11935e7d3b0d

                              SHA1

                              be7d83d6fc40b292593c7324368c8fe84e53a4cb

                              SHA256

                              68aad2cd56e70f0209e16c26fc5d75d695e1c88081dd8be08f7f11cf9f13caba

                              SHA512

                              a307254fb5a5314d5973518afcb38caa4b451edf0fa868638cf510b5bb4a42595c8288f0f956f696cbae93e6656db35aeb695e4b51ae5067f01fb49e8f2f2925

                            • C:\Users\Admin\AppData\Local\Temp\Deployment\BN9N27GN.X7X\1C77RKJ7.7VH\AB3270.exe.manifest

                              Filesize

                              15KB

                              MD5

                              e6ced87ae5356dd93140f45b41466729

                              SHA1

                              fabea64c11f8dd8a555013c72b3b4799c3a63e95

                              SHA256

                              ac7a6b00f5f847871ef6442f1cda20290d60ac386c552f6194ff1912e77809b3

                              SHA512

                              3bb27de258c20c711163364078049a7da3419a2c15bd5f4be945930ae130f61bd3118196b65a702957b71df890e801f111a52b79c4b3e4c3571a1e1d1208e5d3

                            • C:\Users\Admin\AppData\Local\Temp\Deployment\BN9N27GN.X7X\1C77RKJ7.7VH\AbilityTN3270E.ActiveX.dll

                              Filesize

                              334KB

                              MD5

                              bd3619beadbe2af3116eb3381ef24e8b

                              SHA1

                              843ad6a0bd1e7e53c409295ed750a69f3df17fca

                              SHA256

                              5ec5aa0032775515e53a7c4e729ad6417298cd50ece66f433dc6cb9ba9eaca3f

                              SHA512

                              699b792f94f32146c556efecdf2a2b03ced730d496e6df7df3c928efcabca883572f47d447502ac953096390b21601da7f6fc4d69543121daafa133add058009

                            • C:\Users\Admin\AppData\Local\Temp\Deployment\CM6BDD4X.3ZA\QWPME0H9.HHO.application

                              Filesize

                              11KB

                              MD5

                              4cb31c9d41f334846dfb0b693218fd23

                              SHA1

                              3fbd36b4c8c1594163540dd265ec72100f51cfa0

                              SHA256

                              1dd4fb6d373eb3c42bf38a99ac5bd9b71d6c166efcbd1dcad7dd9547df50a821

                              SHA512

                              9946edb7bb0ab13e7cc50f35e777ebfb5b7627c5dcb5b000dac471f84c739bffd7c66280f6422a5eb61c2f8e424a2b5b3967ec114fc45c7a2380a8f358af835d

                            • memory/1564-228-0x0000021E83190000-0x0000021E83198000-memory.dmp

                              Filesize

                              32KB

                            • memory/5068-88-0x000002507B2D0000-0x000002507B2D8000-memory.dmp

                              Filesize

                              32KB

                            • memory/5068-81-0x000002507BD10000-0x000002507BD6A000-memory.dmp

                              Filesize

                              360KB

                            • memory/5068-57-0x000002507E0B0000-0x000002507E100000-memory.dmp

                              Filesize

                              320KB

                            • memory/5068-54-0x000002507AE10000-0x000002507AF96000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/5068-53-0x00000250607B0000-0x00000250607B8000-memory.dmp

                              Filesize

                              32KB