Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-04-2023 12:36

General

  • Target

    ee1d3bd36f1250281f24f8e64e17f2c1a2282ef6f797ff6b56592e1a26401abf.exe

  • Size

    351KB

  • MD5

    87ce142d5a9fe06fccfca0390a39f8dc

  • SHA1

    11238c8a0b4be3849b04be1ba0cb7d9f42011e27

  • SHA256

    ee1d3bd36f1250281f24f8e64e17f2c1a2282ef6f797ff6b56592e1a26401abf

  • SHA512

    97b1ac9f7d81978b453752d9ccfcbd70a4d223fe26e40035a77724e9a3898495c25e5f5882e8ffeb41d435b1d20002097f5b85356b03102f7dd4a8005c6f20fc

  • SSDEEP

    6144:06tv8CcjfWl/nVHaLmk/6neTrbXUA4RCY5LfCV+:0618CEWl/nV6LH/keTrbEzRfCV

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

djvu

C2

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .boty

  • offline_id

    A5whrmSMRYQPLIwxS6XFix1PGn8lJ9uXUaipSat1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-eneUZ5ccES Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0688UIuhd

rsa_pubkey.plain

Extracted

Family

amadey

Version

3.70

C2

77.73.134.27/n9kdjc3xSf/index.php

Extracted

Family

redline

Botnet

ROBER

C2

138.201.195.134:15564

Attributes
  • auth_value

    de311ede2b43457816afc0d9989c5255

Extracted

Family

vidar

Version

3.4

Botnet

623db25256a5734d1207787d269d05b2

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    623db25256a5734d1207787d269d05b2

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • Detected Djvu ransomware 21 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies security service 2 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\ee1d3bd36f1250281f24f8e64e17f2c1a2282ef6f797ff6b56592e1a26401abf.exe
      "C:\Users\Admin\AppData\Local\Temp\ee1d3bd36f1250281f24f8e64e17f2c1a2282ef6f797ff6b56592e1a26401abf.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4456
    • C:\Users\Admin\AppData\Local\Temp\BAC9.exe
      C:\Users\Admin\AppData\Local\Temp\BAC9.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2116
    • C:\Users\Admin\AppData\Local\Temp\BC8F.exe
      C:\Users\Admin\AppData\Local\Temp\BC8F.exe
      2⤵
      • Executes dropped EXE
      PID:4752
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 484
        3⤵
        • Program crash
        PID:3704
    • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
      C:\Users\Admin\AppData\Local\Temp\BEC3.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
        C:\Users\Admin\AppData\Local\Temp\BEC3.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3504
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\49038370-a3f9-4da6-8cfa-d61010ba2f17" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          4⤵
          • Modifies file permissions
          PID:1180
        • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
          "C:\Users\Admin\AppData\Local\Temp\BEC3.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
            "C:\Users\Admin\AppData\Local\Temp\BEC3.exe" --Admin IsNotAutoStart IsNotTask
            5⤵
            • Executes dropped EXE
            PID:4360
            • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe
              "C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:164
              • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe
                "C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:3792
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 1764
                  8⤵
                  • Program crash
                  PID:4972
            • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build3.exe
              "C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build3.exe"
              6⤵
              • Executes dropped EXE
              PID:2700
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:4060
    • C:\Users\Admin\AppData\Local\Temp\D847.exe
      C:\Users\Admin\AppData\Local\Temp\D847.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
        "C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5104
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4300
      • C:\Users\Admin\AppData\Local\Temp\ss31.exe
        "C:\Users\Admin\AppData\Local\Temp\ss31.exe"
        3⤵
        • Executes dropped EXE
        PID:3164
      • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
        "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
        3⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:3356
    • C:\Users\Admin\AppData\Local\Temp\E3C1.exe
      C:\Users\Admin\AppData\Local\Temp\E3C1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
        "C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
        3⤵
        • Executes dropped EXE
        PID:1152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 1440
        3⤵
        • Program crash
        PID:684
    • C:\Users\Admin\AppData\Local\Temp\E633.exe
      C:\Users\Admin\AppData\Local\Temp\E633.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3044
    • C:\Users\Admin\AppData\Local\Temp\E848.exe
      C:\Users\Admin\AppData\Local\Temp\E848.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Users\Admin\AppData\Local\Temp\E848.exe
        C:\Users\Admin\AppData\Local\Temp\E848.exe
        3⤵
        • Executes dropped EXE
        PID:1800
        • C:\Users\Admin\AppData\Local\Temp\E848.exe
          "C:\Users\Admin\AppData\Local\Temp\E848.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:956
          • C:\Users\Admin\AppData\Local\Temp\E848.exe
            "C:\Users\Admin\AppData\Local\Temp\E848.exe" --Admin IsNotAutoStart IsNotTask
            5⤵
            • Executes dropped EXE
            PID:3636
            • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe
              "C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1320
              • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe
                "C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe"
                7⤵
                • Executes dropped EXE
                PID:5048
            • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build3.exe
              "C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build3.exe"
              6⤵
              • Executes dropped EXE
              PID:4756
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:4716
    • C:\Users\Admin\AppData\Local\Temp\F827.exe
      C:\Users\Admin\AppData\Local\Temp\F827.exe
      2⤵
      • Executes dropped EXE
      PID:2836
      • C:\Windows\System32\wbem\WmiPrvSE.exe
        C:\Windows\System32\wbem\WmiPrvSE.exe
        3⤵
          PID:3604
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
      • C:\Users\Admin\AppData\Local\Temp\84B9.exe
        C:\Users\Admin\AppData\Local\Temp\84B9.exe
        2⤵
        • Executes dropped EXE
        PID:5100
        • C:\Windows\system32\dllhost.exe
          "C:\Windows\system32\dllhost.exe"
          3⤵
          • Accesses Microsoft Outlook profiles
          • Checks processor information in registry
          • outlook_office_path
          • outlook_win_path
          PID:4276
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
        2⤵
          PID:3996
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:664
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:3960
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:3916
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:1780
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:2248
          • C:\Windows\System32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
            3⤵
              PID:1100
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
              3⤵
                PID:2132
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                3⤵
                • Modifies security service
                PID:320
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                3⤵
                  PID:4112
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                  3⤵
                    PID:2580
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  2⤵
                    PID:3168
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1252
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-dc 0
                      3⤵
                        PID:2108
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -standby-timeout-ac 0
                        3⤵
                          PID:292
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-dc 0
                          3⤵
                            PID:2220
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
                          2⤵
                            PID:1860
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }
                            2⤵
                              PID:2628
                              • C:\Windows\system32\schtasks.exe
                                "C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC
                                3⤵
                                  PID:4792
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                2⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                PID:292
                              • C:\Windows\System32\cmd.exe
                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                2⤵
                                  PID:3580
                                  • C:\Windows\System32\sc.exe
                                    sc stop UsoSvc
                                    3⤵
                                    • Launches sc.exe
                                    PID:4344
                                  • C:\Windows\System32\sc.exe
                                    sc stop WaaSMedicSvc
                                    3⤵
                                    • Launches sc.exe
                                    PID:3772
                                  • C:\Windows\System32\sc.exe
                                    sc stop wuauserv
                                    3⤵
                                    • Launches sc.exe
                                    PID:4272
                                  • C:\Windows\System32\sc.exe
                                    sc stop bits
                                    3⤵
                                    • Launches sc.exe
                                    PID:4588
                                  • C:\Windows\System32\sc.exe
                                    sc stop dosvc
                                    3⤵
                                    • Launches sc.exe
                                    PID:5008
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                    3⤵
                                      PID:4308
                                    • C:\Windows\System32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                      3⤵
                                        PID:4704
                                      • C:\Windows\System32\reg.exe
                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                        3⤵
                                          PID:436
                                        • C:\Windows\System32\reg.exe
                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                          3⤵
                                            PID:4428
                                          • C:\Windows\System32\reg.exe
                                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                            3⤵
                                              PID:1176
                                          • C:\Windows\System32\cmd.exe
                                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                            2⤵
                                              PID:3648
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -hibernate-timeout-ac 0
                                                3⤵
                                                  PID:4964
                                                • C:\Windows\System32\powercfg.exe
                                                  powercfg /x -hibernate-timeout-dc 0
                                                  3⤵
                                                    PID:3212
                                                  • C:\Windows\System32\powercfg.exe
                                                    powercfg /x -standby-timeout-ac 0
                                                    3⤵
                                                      PID:4420
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -standby-timeout-dc 0
                                                      3⤵
                                                        PID:4916
                                                    • C:\Windows\System32\conhost.exe
                                                      C:\Windows\System32\conhost.exe zuhwtyqtfkk
                                                      2⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      PID:2852
                                                    • C:\Windows\System32\cmd.exe
                                                      C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                      2⤵
                                                      • Drops file in Program Files directory
                                                      PID:1796
                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                        wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                        3⤵
                                                          PID:1596
                                                      • C:\Windows\System32\cmd.exe
                                                        C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                        2⤵
                                                        • Drops file in Program Files directory
                                                        PID:320
                                                      • C:\Windows\System32\conhost.exe
                                                        C:\Windows\System32\conhost.exe ozascextlcafxrlv 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
                                                        2⤵
                                                        • Modifies data under HKEY_USERS
                                                        PID:404
                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:396
                                                    • C:\Program Files\Notepad\Chrome\updater.exe
                                                      "C:\Program Files\Notepad\Chrome\updater.exe"
                                                      1⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Program Files directory
                                                      PID:2104
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
                                                        2⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:648
                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:5000
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:4664
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                        2⤵
                                                        • Creates scheduled task(s)
                                                        PID:5024

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                    Execution

                                                    Scheduled Task

                                                    1
                                                    T1053

                                                    Persistence

                                                    Modify Existing Service

                                                    2
                                                    T1031

                                                    Registry Run Keys / Startup Folder

                                                    1
                                                    T1060

                                                    Scheduled Task

                                                    1
                                                    T1053

                                                    Privilege Escalation

                                                    Scheduled Task

                                                    1
                                                    T1053

                                                    Defense Evasion

                                                    Modify Registry

                                                    2
                                                    T1112

                                                    Impair Defenses

                                                    1
                                                    T1562

                                                    File Permissions Modification

                                                    1
                                                    T1222

                                                    Credential Access

                                                    Credentials in Files

                                                    3
                                                    T1081

                                                    Discovery

                                                    Query Registry

                                                    4
                                                    T1012

                                                    System Information Discovery

                                                    3
                                                    T1082

                                                    Peripheral Device Discovery

                                                    1
                                                    T1120

                                                    Collection

                                                    Data from Local System

                                                    3
                                                    T1005

                                                    Email Collection

                                                    1
                                                    T1114

                                                    Command and Control

                                                    Web Service

                                                    1
                                                    T1102

                                                    Impact

                                                    Service Stop

                                                    1
                                                    T1489

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files\Notepad\Chrome\updater.exe
                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Program Files\Notepad\Chrome\updater.exe
                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\SystemID\PersonalID.txt
                                                      Filesize

                                                      42B

                                                      MD5

                                                      aef10f8bf103c67c948df59052ce1d23

                                                      SHA1

                                                      588b64e0d2a721ee9bb65eca97660782e8aaf8f3

                                                      SHA256

                                                      c453a97f8161b47466603bf8b979c4be8523a8e98acdcc9a9c9bd8d52f24f96f

                                                      SHA512

                                                      07512bde11aba3076183008b1df4f93699e01b8500732b80d10ba551dee55419c2111cc6e36e7ab164d6a725b126ebe73e85fc2b4c6b279a7ed1ad7d24615888

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                                                      Filesize

                                                      2KB

                                                      MD5

                                                      533e20bca1918dfd408e4d352bc1a7fc

                                                      SHA1

                                                      f4729dbdd3d744fa9e5234cdc675f6277e340ddc

                                                      SHA256

                                                      4f2fa4cc4c0dd07599eb2f5ba1c54327f09b44e6c4984b3d5c065a1ab7929c54

                                                      SHA512

                                                      e58792f093d0288838cbe541dc3a11950ce66432c56aebb8981c056d5175a9b64ddb239c250cdac31cb46b797ec13d99e8efeca555024d380b4fa3e5af45500f

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                                                      Filesize

                                                      1KB

                                                      MD5

                                                      f568c03259a003758875155901cf0e6a

                                                      SHA1

                                                      bac1805db675256b0b6a0be08da6dcfb68fdeaa2

                                                      SHA256

                                                      d629106136587bdb11db5b28773bc51ade283785c45200bd84243a457df8a88a

                                                      SHA512

                                                      dd388d73e17f20fe1db08d806e110c1e30f6faa04dd12cdeb134d0021e1ccb4a64975f2afea4abb8b6a402e75b1954946f7588ab90d85764ab0a0b0f67a05fa3

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                                                      Filesize

                                                      488B

                                                      MD5

                                                      2f5df16be5538b4eed3cc8953e92f8b8

                                                      SHA1

                                                      ffa23c156e7bff0109a4a274fc888ff40e7f47ca

                                                      SHA256

                                                      8dc143bbda0cfdc43461221601ea1b5817ca7d01054b3eb4edee642fcfe6053a

                                                      SHA512

                                                      d7004c23297d49e6c494623e0baeb534bfb513159c31c1a50445f082abca8c1d7f45bd03444ae67084cde71fb14a1cccf0d4be9f670023abf7dda652f852983c

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                                                      Filesize

                                                      482B

                                                      MD5

                                                      6a532c9b7dea368d7a018bdf16cd9df6

                                                      SHA1

                                                      805d606f0fd40f2259b3fed4912706c9c3142385

                                                      SHA256

                                                      bf56b33ae8364902c44413dd46c7f41004f3e4071a3526182cc8a733a142dc40

                                                      SHA512

                                                      68ac4d8d90abac46500d042c030d1e31548c84ae0ccd0341369ce6be909954714c6966b30e977a66d52f1fb5e8be2c2f8033678b5f6038d2bc5d27f736e9aba8

                                                    • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build3.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Local\056471b2-4b85-4c2e-9caf-a6f0e69a9481\build3.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build2.exe
                                                      Filesize

                                                      308KB

                                                      MD5

                                                      aa24958e84ca0a33c313d61d8d43a62d

                                                      SHA1

                                                      55aa402c9909828172adf99aef35ddaf25f016f5

                                                      SHA256

                                                      1cc37720fb14545fac7749d5da5a4cd975b0395bd48b376bc059d3af7c2155ea

                                                      SHA512

                                                      00612a24416fd76e77a3e1f24e55903043c12f8e58e833b2bf63d63be63a33064ae3fffab036b16b00099e085efb255b82a3449f79a077b7537120c253c35a66

                                                    • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build3.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Local\0ee0b181-bece-4172-8a4e-148a32e83a59\build3.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Local\49038370-a3f9-4da6-8cfa-d61010ba2f17\BEC3.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                      Filesize

                                                      3KB

                                                      MD5

                                                      ad5cd538ca58cb28ede39c108acb5785

                                                      SHA1

                                                      1ae910026f3dbe90ed025e9e96ead2b5399be877

                                                      SHA256

                                                      c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                                      SHA512

                                                      c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                      Filesize

                                                      1KB

                                                      MD5

                                                      62c8561f755430780a652d626c597227

                                                      SHA1

                                                      c30910319267f5bd2942d20334f29f8117788a2f

                                                      SHA256

                                                      e2ef29f0c46e5e534cf2e39c70f9be50ba0fc248b009015c1d768a7892c6b75b

                                                      SHA512

                                                      12e52c18417f2b77db9d34f9b043cc962c3806ecf7ddd2f915280d173a0803e6a880cf5f6243bbd65cbe377a52d335f704d0b0cb38f48d2defe6752aaf72d3b8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                      Filesize

                                                      1KB

                                                      MD5

                                                      4428074b3e5b1e55ff488da2ab78c248

                                                      SHA1

                                                      1e440241ab5dad1b8bc06f46695f1581d5112c28

                                                      SHA256

                                                      56548aba2c086e0a9a445d10ad37f16b426b7dfa1cd3c887d9d027ae24a7559a

                                                      SHA512

                                                      e70a0a4e479588ddc0930502b27bdb11809cfe5d8d9bd1e31f20158ac3bfdaf844e3eb75e9a18d60bcf3afd3d8f7e7b35b97b3e9fed62e657dfd2e9c2089e057

                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\84B9.exe
                                                      Filesize

                                                      422KB

                                                      MD5

                                                      554ac3b7d182523087fb04ebb90bc5aa

                                                      SHA1

                                                      859841a105a389ac7ed65c6fb8dae6c943c01d40

                                                      SHA256

                                                      62f1580d7a1adbfab07deade96c4baa89e2940f888ae338811f8b21240d3d778

                                                      SHA512

                                                      5d5cef7863b3aee892d4531deda4e3986cf5af34def4b71eee1aac43e6f3a9e299cfa33cbcdf8910e263ad69a009064913c9d2ece562aa080cb7328296f3a6f4

                                                    • C:\Users\Admin\AppData\Local\Temp\84B9.exe
                                                      Filesize

                                                      422KB

                                                      MD5

                                                      554ac3b7d182523087fb04ebb90bc5aa

                                                      SHA1

                                                      859841a105a389ac7ed65c6fb8dae6c943c01d40

                                                      SHA256

                                                      62f1580d7a1adbfab07deade96c4baa89e2940f888ae338811f8b21240d3d778

                                                      SHA512

                                                      5d5cef7863b3aee892d4531deda4e3986cf5af34def4b71eee1aac43e6f3a9e299cfa33cbcdf8910e263ad69a009064913c9d2ece562aa080cb7328296f3a6f4

                                                    • C:\Users\Admin\AppData\Local\Temp\BAC9.exe
                                                      Filesize

                                                      350KB

                                                      MD5

                                                      4d61a431ffdd3e64be0e00d07eb33373

                                                      SHA1

                                                      8ab795a779ff83c66a7a4c9ae5ebd5f35fdc970d

                                                      SHA256

                                                      be3e0aa6ff54225e4cf77c15b8ff4f067ca0919b8d0ff907fd416e5167aa891f

                                                      SHA512

                                                      069775250445d52ab73c72af16398214cf7f073a1f291794a4c652f4c8ed861617580920f683c8e6cc8148022c33d1d9926c0e360b800683cda8fbfe11fadb79

                                                    • C:\Users\Admin\AppData\Local\Temp\BAC9.exe
                                                      Filesize

                                                      350KB

                                                      MD5

                                                      4d61a431ffdd3e64be0e00d07eb33373

                                                      SHA1

                                                      8ab795a779ff83c66a7a4c9ae5ebd5f35fdc970d

                                                      SHA256

                                                      be3e0aa6ff54225e4cf77c15b8ff4f067ca0919b8d0ff907fd416e5167aa891f

                                                      SHA512

                                                      069775250445d52ab73c72af16398214cf7f073a1f291794a4c652f4c8ed861617580920f683c8e6cc8148022c33d1d9926c0e360b800683cda8fbfe11fadb79

                                                    • C:\Users\Admin\AppData\Local\Temp\BC8F.exe
                                                      Filesize

                                                      350KB

                                                      MD5

                                                      4e14992cb33f43e68c31840d5f438304

                                                      SHA1

                                                      00299504d5dd522337b8aface9e8dd3193883f4f

                                                      SHA256

                                                      9a559ade81ba6102d2af3fbd8feb32ef8980e269cee614b88621d0dcb61d7a8a

                                                      SHA512

                                                      91de1b0fe0d5daf239e2267e42c3fa7d779a7732a1cbfd78489a6a6f1149eed8c4578c8ec88886a1db0a52bedca5ed91f27badc2e36b3356ed943a790f7985a7

                                                    • C:\Users\Admin\AppData\Local\Temp\BC8F.exe
                                                      Filesize

                                                      350KB

                                                      MD5

                                                      4e14992cb33f43e68c31840d5f438304

                                                      SHA1

                                                      00299504d5dd522337b8aface9e8dd3193883f4f

                                                      SHA256

                                                      9a559ade81ba6102d2af3fbd8feb32ef8980e269cee614b88621d0dcb61d7a8a

                                                      SHA512

                                                      91de1b0fe0d5daf239e2267e42c3fa7d779a7732a1cbfd78489a6a6f1149eed8c4578c8ec88886a1db0a52bedca5ed91f27badc2e36b3356ed943a790f7985a7

                                                    • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\BEC3.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\D847.exe
                                                      Filesize

                                                      4.4MB

                                                      MD5

                                                      9f910aaa4912177ae9a8397c6c857c40

                                                      SHA1

                                                      c06f17a5d0d6643b2a9ff2a42b0934c4426b5ffb

                                                      SHA256

                                                      14a15bfcc44f3ea384a3bc148ccc1b3751da6b713b31aa9725558845bdcc18e3

                                                      SHA512

                                                      de5721f02528f32e441f8ed874af02684af41dd8c0d68c52fff908294e253cce02bd69d3210566106be0da2568c45078130f66b3cf2570ada614d6666aea4738

                                                    • C:\Users\Admin\AppData\Local\Temp\D847.exe
                                                      Filesize

                                                      4.4MB

                                                      MD5

                                                      9f910aaa4912177ae9a8397c6c857c40

                                                      SHA1

                                                      c06f17a5d0d6643b2a9ff2a42b0934c4426b5ffb

                                                      SHA256

                                                      14a15bfcc44f3ea384a3bc148ccc1b3751da6b713b31aa9725558845bdcc18e3

                                                      SHA512

                                                      de5721f02528f32e441f8ed874af02684af41dd8c0d68c52fff908294e253cce02bd69d3210566106be0da2568c45078130f66b3cf2570ada614d6666aea4738

                                                    • C:\Users\Admin\AppData\Local\Temp\E3C1.exe
                                                      Filesize

                                                      4.4MB

                                                      MD5

                                                      9f910aaa4912177ae9a8397c6c857c40

                                                      SHA1

                                                      c06f17a5d0d6643b2a9ff2a42b0934c4426b5ffb

                                                      SHA256

                                                      14a15bfcc44f3ea384a3bc148ccc1b3751da6b713b31aa9725558845bdcc18e3

                                                      SHA512

                                                      de5721f02528f32e441f8ed874af02684af41dd8c0d68c52fff908294e253cce02bd69d3210566106be0da2568c45078130f66b3cf2570ada614d6666aea4738

                                                    • C:\Users\Admin\AppData\Local\Temp\E3C1.exe
                                                      Filesize

                                                      4.4MB

                                                      MD5

                                                      9f910aaa4912177ae9a8397c6c857c40

                                                      SHA1

                                                      c06f17a5d0d6643b2a9ff2a42b0934c4426b5ffb

                                                      SHA256

                                                      14a15bfcc44f3ea384a3bc148ccc1b3751da6b713b31aa9725558845bdcc18e3

                                                      SHA512

                                                      de5721f02528f32e441f8ed874af02684af41dd8c0d68c52fff908294e253cce02bd69d3210566106be0da2568c45078130f66b3cf2570ada614d6666aea4738

                                                    • C:\Users\Admin\AppData\Local\Temp\E633.exe
                                                      Filesize

                                                      457KB

                                                      MD5

                                                      ba0ef2f1ddcaa54005fa89b305f35ef3

                                                      SHA1

                                                      5e88980547f79ec7c22f9e20059923a54a747cb9

                                                      SHA256

                                                      a306674fa9051b2994fd2dfea7425d5aba1b82e90870ab6e8b98d2c321cb6642

                                                      SHA512

                                                      4d9eb609b4806e0546f10355f4a870d4af978311eed4be6cd3b74c8b7ee58a5aa2d2a94183c29f65c93d926cbbfecffb1e1375ac852a6d70311fd87d43da7fb6

                                                    • C:\Users\Admin\AppData\Local\Temp\E633.exe
                                                      Filesize

                                                      457KB

                                                      MD5

                                                      ba0ef2f1ddcaa54005fa89b305f35ef3

                                                      SHA1

                                                      5e88980547f79ec7c22f9e20059923a54a747cb9

                                                      SHA256

                                                      a306674fa9051b2994fd2dfea7425d5aba1b82e90870ab6e8b98d2c321cb6642

                                                      SHA512

                                                      4d9eb609b4806e0546f10355f4a870d4af978311eed4be6cd3b74c8b7ee58a5aa2d2a94183c29f65c93d926cbbfecffb1e1375ac852a6d70311fd87d43da7fb6

                                                    • C:\Users\Admin\AppData\Local\Temp\E848.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\E848.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\E848.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\E848.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\E848.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\E848.exe
                                                      Filesize

                                                      859KB

                                                      MD5

                                                      ab199a25195863734dcef5e266fd83ff

                                                      SHA1

                                                      93c20d2379ee118083073a9b2577442d20b0d510

                                                      SHA256

                                                      ebd5f37ee07bdf61026e5b0f8f1cb4d067a3544bcf2020154f20a222370f018b

                                                      SHA512

                                                      6dae1f8c6bddb629d873ba389a237e9c974c9b843daa25af0dcd4f0f4d3bcaef0fde493d0bc547c2651f60ea494364a1bce5e4929475635b4a1e49f1fc66f256

                                                    • C:\Users\Admin\AppData\Local\Temp\F827.exe
                                                      Filesize

                                                      7.1MB

                                                      MD5

                                                      75591010c123398a3f72dd57868998aa

                                                      SHA1

                                                      f58b11fcd583d6c7677560244616dd8d33acc837

                                                      SHA256

                                                      3c4889c3248529f90b068c7aca59351738d1534f928d82f66844b68774c06a06

                                                      SHA512

                                                      78019903f429c678690fd01f0732f11145a5b959122207c22cdf4b6abab4e38c6f7bbe241b414c6f7fa68d8d8f708ffa0d1d7668807bfb8a8ec9cc9bc1ad7f7f

                                                    • C:\Users\Admin\AppData\Local\Temp\F827.exe
                                                      Filesize

                                                      7.1MB

                                                      MD5

                                                      75591010c123398a3f72dd57868998aa

                                                      SHA1

                                                      f58b11fcd583d6c7677560244616dd8d33acc837

                                                      SHA256

                                                      3c4889c3248529f90b068c7aca59351738d1534f928d82f66844b68774c06a06

                                                      SHA512

                                                      78019903f429c678690fd01f0732f11145a5b959122207c22cdf4b6abab4e38c6f7bbe241b414c6f7fa68d8d8f708ffa0d1d7668807bfb8a8ec9cc9bc1ad7f7f

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_22dke1g4.s3k.ps1
                                                      Filesize

                                                      1B

                                                      MD5

                                                      c4ca4238a0b923820dcc509a6f75849b

                                                      SHA1

                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                      SHA256

                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                      SHA512

                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                    • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
                                                      Filesize

                                                      220KB

                                                      MD5

                                                      0f59853fb3b3a252e267e204024390c2

                                                      SHA1

                                                      e692c9d78613e7cac791559f4c8e1f7dd5c74c37

                                                      SHA256

                                                      dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2

                                                      SHA512

                                                      1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c

                                                    • C:\Users\Admin\AppData\Local\Temp\ss31.exe
                                                      Filesize

                                                      476KB

                                                      MD5

                                                      62dac89fc5186ec80dd7d94bc30a58df

                                                      SHA1

                                                      95b2bccda593625d7c0793edf188f2eb50812ae7

                                                      SHA256

                                                      5cd091037646120aac05a55a689268f47dbeac29752e50fa4fe1115bf94d3626

                                                      SHA512

                                                      772ac74df898595dfd7cbfcf1e89389101ca64bfd98ea43f9b43486da0a495c3cb90048baf01012ea0f61a26df479fa18b5db37aa766594bb48e4d6ee25d1996

                                                    • C:\Users\Admin\AppData\Local\Temp\ss31.exe
                                                      Filesize

                                                      476KB

                                                      MD5

                                                      62dac89fc5186ec80dd7d94bc30a58df

                                                      SHA1

                                                      95b2bccda593625d7c0793edf188f2eb50812ae7

                                                      SHA256

                                                      5cd091037646120aac05a55a689268f47dbeac29752e50fa4fe1115bf94d3626

                                                      SHA512

                                                      772ac74df898595dfd7cbfcf1e89389101ca64bfd98ea43f9b43486da0a495c3cb90048baf01012ea0f61a26df479fa18b5db37aa766594bb48e4d6ee25d1996

                                                    • C:\Users\Admin\AppData\Local\bowsakkdestx.txt
                                                      Filesize

                                                      560B

                                                      MD5

                                                      65c8b52f8b93dc8376206f059e8e8cd3

                                                      SHA1

                                                      32475161dde2632a21866c537d8f242f9e067355

                                                      SHA256

                                                      03e60406edac3a27ebf3999a74ce1c9a4dc69ed2386313b766a92912629482f4

                                                      SHA512

                                                      fe42cb4d70591a29f47df5605cbad035d8971742403e3f3256952d33229aa7cd79a397c9edbcff72b5e59cbafba602e61d2e16d6c676754a2788fb76e1b7cfce

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Roaming\fhtauui
                                                      Filesize

                                                      350KB

                                                      MD5

                                                      4d61a431ffdd3e64be0e00d07eb33373

                                                      SHA1

                                                      8ab795a779ff83c66a7a4c9ae5ebd5f35fdc970d

                                                      SHA256

                                                      be3e0aa6ff54225e4cf77c15b8ff4f067ca0919b8d0ff907fd416e5167aa891f

                                                      SHA512

                                                      069775250445d52ab73c72af16398214cf7f073a1f291794a4c652f4c8ed861617580920f683c8e6cc8148022c33d1d9926c0e360b800683cda8fbfe11fadb79

                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                      Filesize

                                                      3KB

                                                      MD5

                                                      811d351aabd7b708fef7683cf5e29e15

                                                      SHA1

                                                      06fd89e5a575f45d411cf4b3a2d277e642e73dbb

                                                      SHA256

                                                      0915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18

                                                      SHA512

                                                      702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a

                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                      Filesize

                                                      1KB

                                                      MD5

                                                      302a7c179ef577c237c5418fb770fd27

                                                      SHA1

                                                      343ef00d1357a8d2ff6e1143541a8a29435ed30c

                                                      SHA256

                                                      9e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f

                                                      SHA512

                                                      f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699

                                                    • \ProgramData\mozglue.dll
                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • \ProgramData\nss3.dll
                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • memory/164-318-0x0000000000570000-0x00000000005C7000-memory.dmp
                                                      Filesize

                                                      348KB

                                                    • memory/292-1420-0x000002BEDFCD0000-0x000002BEDFCEC000-memory.dmp
                                                      Filesize

                                                      112KB

                                                    • memory/292-1541-0x000002BEDFD80000-0x000002BEDFD90000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/292-1460-0x000002BEDFCF0000-0x000002BEDFCFA000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/292-1434-0x00007FF772040000-0x00007FF772050000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/292-1402-0x000002BEDFD80000-0x000002BEDFD90000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/292-1426-0x000002BEE0570000-0x000002BEE0629000-memory.dmp
                                                      Filesize

                                                      740KB

                                                    • memory/292-1403-0x000002BEDFD80000-0x000002BEDFD90000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/1800-267-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/1800-243-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/1800-244-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/1800-304-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/1860-1300-0x000001268E950000-0x000001268E960000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/1860-1267-0x000001268E950000-0x000001268E960000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/1860-1266-0x000001268E950000-0x000001268E960000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/2116-164-0x0000000000400000-0x00000000007FC000-memory.dmp
                                                      Filesize

                                                      4.0MB

                                                    • memory/2116-139-0x0000000000810000-0x0000000000819000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/3044-289-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-1184-0x0000000007310000-0x0000000007386000-memory.dmp
                                                      Filesize

                                                      472KB

                                                    • memory/3044-296-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-233-0x0000000002680000-0x00000000026DA000-memory.dmp
                                                      Filesize

                                                      360KB

                                                    • memory/3044-287-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-285-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-283-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-281-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-275-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-272-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-266-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-238-0x0000000002310000-0x0000000002372000-memory.dmp
                                                      Filesize

                                                      392KB

                                                    • memory/3044-265-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-263-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-262-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-260-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-240-0x0000000005360000-0x00000000053B8000-memory.dmp
                                                      Filesize

                                                      352KB

                                                    • memory/3044-1189-0x0000000007BE0000-0x0000000007BFE000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/3044-258-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-256-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-254-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-252-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-293-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-1186-0x0000000007580000-0x0000000007AAC000-memory.dmp
                                                      Filesize

                                                      5.2MB

                                                    • memory/3044-237-0x0000000004E60000-0x000000000535E000-memory.dmp
                                                      Filesize

                                                      5.0MB

                                                    • memory/3044-250-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-248-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-246-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-245-0x0000000005360000-0x00000000053B2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/3044-1110-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-239-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-1173-0x00000000053C0000-0x00000000059C6000-memory.dmp
                                                      Filesize

                                                      6.0MB

                                                    • memory/3044-1174-0x00000000029F0000-0x0000000002A02000-memory.dmp
                                                      Filesize

                                                      72KB

                                                    • memory/3044-1175-0x0000000005A20000-0x0000000005B2A000-memory.dmp
                                                      Filesize

                                                      1.0MB

                                                    • memory/3044-1176-0x0000000005B30000-0x0000000005B6E000-memory.dmp
                                                      Filesize

                                                      248KB

                                                    • memory/3044-1177-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-1178-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-1179-0x00000000029B0000-0x00000000029C0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3044-1180-0x0000000005BC0000-0x0000000005C0B000-memory.dmp
                                                      Filesize

                                                      300KB

                                                    • memory/3044-1181-0x0000000005E50000-0x0000000005EB6000-memory.dmp
                                                      Filesize

                                                      408KB

                                                    • memory/3044-1185-0x00000000073B0000-0x0000000007572000-memory.dmp
                                                      Filesize

                                                      1.8MB

                                                    • memory/3044-1183-0x0000000006500000-0x0000000006592000-memory.dmp
                                                      Filesize

                                                      584KB

                                                    • memory/3164-972-0x00000206FD560000-0x00000206FD68D000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3164-234-0x00000206FD3F0000-0x00000206FD55D000-memory.dmp
                                                      Filesize

                                                      1.4MB

                                                    • memory/3164-236-0x00000206FD560000-0x00000206FD68D000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3176-161-0x0000000000F20000-0x0000000000F36000-memory.dmp
                                                      Filesize

                                                      88KB

                                                    • memory/3176-119-0x0000000000D60000-0x0000000000D76000-memory.dmp
                                                      Filesize

                                                      88KB

                                                    • memory/3504-159-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3504-146-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3504-149-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3504-144-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3504-142-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3636-391-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3636-1191-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/3792-1182-0x0000000000400000-0x000000000046C000-memory.dmp
                                                      Filesize

                                                      432KB

                                                    • memory/3792-327-0x0000000000400000-0x000000000046C000-memory.dmp
                                                      Filesize

                                                      432KB

                                                    • memory/4276-1381-0x00007FF615740000-0x00007FF61583A000-memory.dmp
                                                      Filesize

                                                      1000KB

                                                    • memory/4276-1368-0x00007FF615740000-0x00007FF61583A000-memory.dmp
                                                      Filesize

                                                      1000KB

                                                    • memory/4276-1361-0x000001B4C1300000-0x000001B4C1307000-memory.dmp
                                                      Filesize

                                                      28KB

                                                    • memory/4360-200-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-179-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-204-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-202-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-389-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-168-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-169-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-180-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-232-0x0000000000400000-0x0000000000537000-memory.dmp
                                                      Filesize

                                                      1.2MB

                                                    • memory/4384-1209-0x000001E449A60000-0x000001E449AD6000-memory.dmp
                                                      Filesize

                                                      472KB

                                                    • memory/4384-1206-0x000001E4498B0000-0x000001E4498D2000-memory.dmp
                                                      Filesize

                                                      136KB

                                                    • memory/4384-1251-0x000001E4312E0000-0x000001E4312F0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/4384-1223-0x000001E4312E0000-0x000001E4312F0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/4384-1220-0x000001E4312E0000-0x000001E4312F0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/4440-181-0x0000000000AB0000-0x0000000000F1C000-memory.dmp
                                                      Filesize

                                                      4.4MB

                                                    • memory/4456-118-0x0000000000960000-0x0000000000969000-memory.dmp
                                                      Filesize

                                                      36KB

                                                    • memory/4456-120-0x0000000000400000-0x00000000007FC000-memory.dmp
                                                      Filesize

                                                      4.0MB

                                                    • memory/4752-217-0x0000000000400000-0x00000000007FC000-memory.dmp
                                                      Filesize

                                                      4.0MB

                                                    • memory/4792-145-0x0000000002620000-0x000000000273B000-memory.dmp
                                                      Filesize

                                                      1.1MB

                                                    • memory/5048-1197-0x0000000000400000-0x000000000046C000-memory.dmp
                                                      Filesize

                                                      432KB

                                                    • memory/5048-974-0x0000000000400000-0x000000000046C000-memory.dmp
                                                      Filesize

                                                      432KB

                                                    • memory/5100-1276-0x0000000000960000-0x000000000098E000-memory.dmp
                                                      Filesize

                                                      184KB

                                                    • memory/5100-1356-0x0000000000990000-0x00000000009AC000-memory.dmp
                                                      Filesize

                                                      112KB

                                                    • memory/5100-1360-0x00000000001D0000-0x00000000001D3000-memory.dmp
                                                      Filesize

                                                      12KB

                                                    • memory/5100-1357-0x00000000001D0000-0x00000000001D2000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/5100-1370-0x0000000000990000-0x00000000009AC000-memory.dmp
                                                      Filesize

                                                      112KB