Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 01:45

General

  • Target

    073997d20ef564e271ffb2b4d86773dbf7eddfb7e9f4811b0deb798b4505e2ce.exe

  • Size

    800KB

  • MD5

    7198fa10a50ea9aaf6ae5c2a05af2104

  • SHA1

    c35a2a73313e3c5ad08136e3bc583bb9bc26964c

  • SHA256

    073997d20ef564e271ffb2b4d86773dbf7eddfb7e9f4811b0deb798b4505e2ce

  • SHA512

    56db894671d6b5e093ef2de88ba785f1d9159e2b206593886ad540d336c5dfa79cd5ea7b6b29fbdd39d3a2355bcc01d90f5fff64e97fcbda383e38df79353acf

  • SSDEEP

    12288:naMgC/rJdxLDMVVV/1EIEm6l6O6+26AFxKxg0YZbs7Ql:naMgGfxLDmVwoV+26YcY+0

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:26848

23.ip.gl.ply.gg:26848

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    Windows Security Host.exe

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 30 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\073997d20ef564e271ffb2b4d86773dbf7eddfb7e9f4811b0deb798b4505e2ce.exe
    "C:\Users\Admin\AppData\Local\Temp\073997d20ef564e271ffb2b4d86773dbf7eddfb7e9f4811b0deb798b4505e2ce.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Users\Admin\AppData\Local\Temp\Injector.exe
      "C:\Users\Admin\AppData\Local\Temp\Injector.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:512
      • C:\Windows\SYSTEM32\attrib.exe
        "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Injector.exe"
        3⤵
        • Views/modifies file attributes
        PID:1768
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Injector.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5076
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4868
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3376
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
          PID:4012
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
            PID:3300
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:3248
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic" path win32_VideoController get name
            3⤵
            • Detects videocard installed
            PID:3136
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Injector.exe" && pause
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:4972
            • C:\Windows\system32\PING.EXE
              ping localhost
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:4464
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Host.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Host.exe"
          2⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1272
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Windows Security Host.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security Host.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5020
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Windows Security Host.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3192
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security Host.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:540
        • C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.23.exe
          "C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.23.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1452
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd" /c ipconfig /all
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Windows\system32\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:800
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2884
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
              4⤵
                PID:5096
            • C:\Windows\System32\msiexec.exe
              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn
              3⤵
                PID:1152
              • C:\ProgramData\Solara\Solara.exe
                "C:\ProgramData\Solara\Solara.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:3124
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Blocklisted process makes network request
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4472
            • C:\Windows\System32\MsiExec.exe
              C:\Windows\System32\MsiExec.exe -Embedding 83D89D952FA593F366F12EA25B83A237
              2⤵
              • Loads dropped DLL
              PID:1200
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding 1066D4C9A7B23EAD0A4B0A2641999595
              2⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:4428
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding AA0CBE596A2D2748515010144D539F16 E Global\MSI0000
              2⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4780
              • C:\Windows\SysWOW64\wevtutil.exe
                "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4844
                • C:\Windows\System32\wevtutil.exe
                  "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow64
                  4⤵
                    PID:2024

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Config.Msi\e57ea44.rbs

              Filesize

              1.0MB

              MD5

              9c6e0a2b5852ac9a0b930eb4289a062d

              SHA1

              01c176498f622afe8aed291176ec1d59b910e4f0

              SHA256

              ed7672967c583629bb628af2ced25dcd56c084bed23e000cda46b8ff6e8cc859

              SHA512

              eb2ccd678086a65982b2a169fba01314e4b8fccd15c2bc880332d2c88ead74465635bebf95b77c9934ba6a07cc068050d487ec27c143ecfea36c268be98378b0

            • C:\Program Files\nodejs\node_etw_provider.man

              Filesize

              10KB

              MD5

              1d51e18a7247f47245b0751f16119498

              SHA1

              78f5d95dd07c0fcee43c6d4feab12d802d194d95

              SHA256

              1975aa34c1050b8364491394cebf6e668e2337c3107712e3eeca311262c7c46f

              SHA512

              1eccbe4ddae3d941b36616a202e5bd1b21d8e181810430a1c390513060ae9e3f12cd23f5b66ae0630fd6496b3139e2cc313381b5506465040e5a7a3543444e76

            • C:\Program Files\nodejs\node_etw_provider.man

              Filesize

              8KB

              MD5

              d3bc164e23e694c644e0b1ce3e3f9910

              SHA1

              1849f8b1326111b5d4d93febc2bafb3856e601bb

              SHA256

              1185aaa5af804c6bc6925f5202e68bb2254016509847cd382a015907440d86b4

              SHA512

              91ebff613f4c35c625bb9b450726167fb77b035666ed635acf75ca992c4846d952655a2513b4ecb8ca6f19640d57555f2a4af3538b676c3bd2ea1094c4992854

            • C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\LICENSE.md

              Filesize

              818B

              MD5

              2916d8b51a5cc0a350d64389bc07aef6

              SHA1

              c9d5ac416c1dd7945651bee712dbed4d158d09e1

              SHA256

              733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04

              SHA512

              508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74

            • C:\Program Files\nodejs\node_modules\npm\node_modules\aggregate-error\license

              Filesize

              1KB

              MD5

              5ad87d95c13094fa67f25442ff521efd

              SHA1

              01f1438a98e1b796e05a74131e6bb9d66c9e8542

              SHA256

              67292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec

              SHA512

              7187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3

            • C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSE

              Filesize

              754B

              MD5

              d2cf52aa43e18fdc87562d4c1303f46a

              SHA1

              58fb4a65fffb438630351e7cafd322579817e5e1

              SHA256

              45e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0

              SHA512

              54e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16

            • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmhook\LICENSE.md

              Filesize

              771B

              MD5

              e9dc66f98e5f7ff720bf603fff36ebc5

              SHA1

              f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b

              SHA256

              b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79

              SHA512

              8027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b

            • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmorg\LICENSE

              Filesize

              730B

              MD5

              072ac9ab0c4667f8f876becedfe10ee0

              SHA1

              0227492dcdc7fb8de1d14f9d3421c333230cf8fe

              SHA256

              2ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013

              SHA512

              f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013

            • C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json

              Filesize

              1KB

              MD5

              d116a360376e31950428ed26eae9ffd4

              SHA1

              192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b

              SHA256

              c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5

              SHA512

              5221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a

            • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSE

              Filesize

              802B

              MD5

              d7c8fab641cd22d2cd30d2999cc77040

              SHA1

              d293601583b1454ad5415260e4378217d569538e

              SHA256

              04400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be

              SHA512

              278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764

            • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.js

              Filesize

              16KB

              MD5

              bc0c0eeede037aa152345ab1f9774e92

              SHA1

              56e0f71900f0ef8294e46757ec14c0c11ed31d4e

              SHA256

              7a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5

              SHA512

              5f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3

            • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\LICENSE

              Filesize

              780B

              MD5

              b020de8f88eacc104c21d6e6cacc636d

              SHA1

              20b35e641e3a5ea25f012e13d69fab37e3d68d6b

              SHA256

              3f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706

              SHA512

              4220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38

            • C:\Program Files\nodejs\node_modules\npm\node_modules\promise-all-reject-late\LICENSE

              Filesize

              763B

              MD5

              7428aa9f83c500c4a434f8848ee23851

              SHA1

              166b3e1c1b7d7cb7b070108876492529f546219f

              SHA256

              1fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7

              SHA512

              c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce

            • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts

              Filesize

              4KB

              MD5

              f0bd53316e08991d94586331f9c11d97

              SHA1

              f5a7a6dc0da46c3e077764cfb3e928c4a75d383e

              SHA256

              dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef

              SHA512

              fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839

            • C:\Program Files\nodejs\node_modules\npm\node_modules\treeverse\LICENSE

              Filesize

              771B

              MD5

              1d7c74bcd1904d125f6aff37749dc069

              SHA1

              21e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab

              SHA256

              24b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9

              SHA512

              b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778

            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.url

              Filesize

              168B

              MD5

              db7dbbc86e432573e54dedbcc02cb4a1

              SHA1

              cff9cfb98cff2d86b35dc680b405e8036bbbda47

              SHA256

              7cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9

              SHA512

              8f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec

            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.url

              Filesize

              133B

              MD5

              35b86e177ab52108bd9fed7425a9e34a

              SHA1

              76a1f47a10e3ab829f676838147875d75022c70c

              SHA256

              afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319

              SHA512

              3c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62

            • C:\ProgramData\Solara\Newtonsoft.Json.dll

              Filesize

              695KB

              MD5

              195ffb7167db3219b217c4fd439eedd6

              SHA1

              1e76e6099570ede620b76ed47cf8d03a936d49f8

              SHA256

              e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

              SHA512

              56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

            • C:\ProgramData\Solara\Solara.exe

              Filesize

              133KB

              MD5

              c6f770cbb24248537558c1f06f7ff855

              SHA1

              fdc2aaae292c32a58ea4d9974a31ece26628fdd7

              SHA256

              d1e4a542fa75f6a6fb636b5de6f7616e2827a79556d3d9a4afc3ecb47f0beb2b

              SHA512

              cac56c58bd01341ec3ff102fe04fdb66625baad1d3dd7127907cd8453d2c6e2226ad41033e16ba20413a509fc7c826e4fdc0c0d553175eb6f164c2fc0906614a

            • C:\ProgramData\Solara\Wpf.Ui.dll

              Filesize

              5.2MB

              MD5

              aead90ab96e2853f59be27c4ec1e4853

              SHA1

              43cdedde26488d3209e17efff9a51e1f944eb35f

              SHA256

              46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

              SHA512

              f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              993af531f0b57e8128ec273731c3a8e2

              SHA1

              a42ea55876f4f390837dd2c95fb7ff2344b6e9e1

              SHA256

              fff934d70d813381536d272c5b8ac6ad70acd054267b13592da767c9bd1dda62

              SHA512

              bdf5970ff2ee314dc297fce5c0f44765e77acbf269cd9ad9e7448a391d5f80d66a0c5426f99bc3480851e8763413aa180b3b3b6b22ef0e86a365450cb8c334e4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              89b490e3a4d669251ee3f7a61553a7d7

              SHA1

              234f2dc7ffd8f047b1e3fdc59f4795525c04f8ed

              SHA256

              31f4b00d3187eaaeac172e7b875e19e3c121210fef7a3b9584eb8c35267ace65

              SHA512

              13a5d6c9e7724d268e7feed07b33250f0c88ea4c53a05b854ee5ebdf7735078751918df6a73cea4d13f3dd90c05e13811b8fb7cbbc211314edee95ea25a190b0

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              e60eb305a7b2d9907488068b7065abd3

              SHA1

              1643dd7f915ac50c75bc01c53d68c5dafb9ce28d

              SHA256

              ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135

              SHA512

              95c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              77d622bb1a5b250869a3238b9bc1402b

              SHA1

              d47f4003c2554b9dfc4c16f22460b331886b191b

              SHA256

              f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

              SHA512

              d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              948B

              MD5

              7d938922c60b82c232e1dc1d2cb172d6

              SHA1

              8c5546fbca478815e77f5dff30fe00e5e5fd6a9a

              SHA256

              463e9ebf5171ef9ead61019e5fa863ecd958d4390e88079394a98c050ad32a1f

              SHA512

              479ac4d43bcaea8059ff4ae9023e35f81e2d04eba16b3bec76c1b198891b2b8ea27a03e3862ca73dbe2e98dae5538b007df8418f10c2e3f52c93bcbbae10f105

            • C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.23.exe

              Filesize

              800KB

              MD5

              02c70d9d6696950c198db93b7f6a835e

              SHA1

              30231a467a49cc37768eea0f55f4bea1cbfb48e2

              SHA256

              8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

              SHA512

              431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

            • C:\Users\Admin\AppData\Local\Temp\Injector.exe

              Filesize

              229KB

              MD5

              3882cfe50e35985982e9ef0c01b99c47

              SHA1

              6e09c71ae230b839163628c9179b3a3aac58c1a3

              SHA256

              da73db144e8035dd81ab4578b7f856131351ec33119c9ce0c46d852499621636

              SHA512

              a539767dc599b8a6103c413b4a42c83c7ce09d3171c45890f2630ad000166854c5ac220f78ab966ea90c55c1d6361ce70ea5ab3671fc2913445e8009126a534e

            • C:\Users\Admin\AppData\Local\Temp\Windows Security Host.exe

              Filesize

              79KB

              MD5

              c7ba63ce2ed6d0aab93ad839e0eddd68

              SHA1

              087ffd969b37a73b349a81af18bb51191eb42cbd

              SHA256

              84be55fb4b514ebdb999b5caf4e0837c521b5e7a4f85f636e4593daf09eedae9

              SHA512

              9f63cfdb94af23cebc85ffd491364c1a90ab90736fc8da0fe16ebf2fb18e9a6eb8fea4dfca87d8353565ba684b0c8f461371588aac72101b355886619bf672f6

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zz4murl1.oo5.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi

              Filesize

              30.1MB

              MD5

              0e4e9aa41d24221b29b19ba96c1a64d0

              SHA1

              231ade3d5a586c0eb4441c8dbfe9007dc26b2872

              SHA256

              5bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d

              SHA512

              e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913

            • C:\Windows\Installer\MSI5BC.tmp

              Filesize

              297KB

              MD5

              7a86ce1a899262dd3c1df656bff3fb2c

              SHA1

              33dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541

              SHA256

              b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c

              SHA512

              421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec

            • C:\Windows\Installer\MSIF165.tmp

              Filesize

              122KB

              MD5

              9fe9b0ecaea0324ad99036a91db03ebb

              SHA1

              144068c64ec06fc08eadfcca0a014a44b95bb908

              SHA256

              e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9

              SHA512

              906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176

            • C:\Windows\Installer\MSIF270.tmp

              Filesize

              211KB

              MD5

              a3ae5d86ecf38db9427359ea37a5f646

              SHA1

              eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

              SHA256

              c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

              SHA512

              96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

            • memory/972-22-0x00000235CFAF0000-0x00000235CFB30000-memory.dmp

              Filesize

              256KB

            • memory/972-38-0x00007FFC71850000-0x00007FFC71A45000-memory.dmp

              Filesize

              2.0MB

            • memory/972-129-0x00000235EA020000-0x00000235EA032000-memory.dmp

              Filesize

              72KB

            • memory/972-71-0x00000235EA000000-0x00000235EA01E000-memory.dmp

              Filesize

              120KB

            • memory/972-70-0x00000235E9FB0000-0x00000235EA000000-memory.dmp

              Filesize

              320KB

            • memory/972-69-0x00000235EA2D0000-0x00000235EA346000-memory.dmp

              Filesize

              472KB

            • memory/972-128-0x00000235D18B0000-0x00000235D18BA000-memory.dmp

              Filesize

              40KB

            • memory/972-26-0x00007FFC71850000-0x00007FFC71A45000-memory.dmp

              Filesize

              2.0MB

            • memory/972-178-0x00007FFC71850000-0x00007FFC71A45000-memory.dmp

              Filesize

              2.0MB

            • memory/1272-40-0x0000000000AF0000-0x0000000000B0A000-memory.dmp

              Filesize

              104KB

            • memory/1452-42-0x0000027429BD0000-0x0000027429C9E000-memory.dmp

              Filesize

              824KB

            • memory/2160-48-0x00000283F90F0000-0x00000283F9112000-memory.dmp

              Filesize

              136KB

            • memory/3124-2971-0x0000021E0ECB0000-0x0000021E0ECD4000-memory.dmp

              Filesize

              144KB

            • memory/3124-2973-0x0000021E29680000-0x0000021E29BBC000-memory.dmp

              Filesize

              5.2MB

            • memory/3124-2975-0x0000021E29430000-0x0000021E294EA000-memory.dmp

              Filesize

              744KB

            • memory/3124-2977-0x0000021E294F0000-0x0000021E295A2000-memory.dmp

              Filesize

              712KB

            • memory/4056-0-0x00007FFC71850000-0x00007FFC71A45000-memory.dmp

              Filesize

              2.0MB

            • memory/4056-39-0x00007FFC71850000-0x00007FFC71A45000-memory.dmp

              Filesize

              2.0MB

            • memory/4056-3-0x00007FFC71850000-0x00007FFC71A45000-memory.dmp

              Filesize

              2.0MB

            • memory/4056-1-0x0000000000240000-0x00000000002B2000-memory.dmp

              Filesize

              456KB