Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 09:30
Static task
static1
Behavioral task
behavioral1
Sample
15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe
Resource
win10v2004-20230221-en
General
-
Target
15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe
-
Size
238KB
-
MD5
f95c11cb02aa6d7819834fadceec37fb
-
SHA1
2e3778742ca800e4ba34485d008693b6dbaaa29d
-
SHA256
15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8
-
SHA512
89fe0759d208ee7cf7bb9c5d01177e22a89d806bfc93dbfbcf91b651258edf854789bd2350e9d95da532f465283dbe5b8552529ecc08d05409f6b29de3e31e73
-
SSDEEP
3072:nSie77BSif4tQMU3n8MhP8CiLbYaSRCyK5Xp8XF/Hi:SihigtgLqYTCpwE
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
amadey
3.70
77.73.134.27/n9kdjc3xSf/index.php
Extracted
smokeloader
pub1
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.coty
-
offline_id
O8Ao46dcCReRPC4I1PGMYsRFFc9WI5eOp0O3MFt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-EPBZCVAS8s Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0692JOsie
Extracted
vidar
3.5
bf58e1879f88b222ba2391682babf9d8
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
bf58e1879f88b222ba2391682babf9d8
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral1/memory/1892-472-0x00000000047F0000-0x000000000480C000-memory.dmp family_rhadamanthys behavioral1/memory/1892-484-0x00000000047F0000-0x000000000480C000-memory.dmp family_rhadamanthys -
Detected Djvu ransomware 15 IoCs
resource yara_rule behavioral1/memory/3160-252-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3160-254-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3160-256-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3696-255-0x00000000049A0000-0x0000000004ABB000-memory.dmp family_djvu behavioral1/memory/3160-257-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3160-266-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-277-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-276-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-282-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-283-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-285-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-290-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-292-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-293-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/32-320-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 4304 created 3204 4304 XandETC.exe 12 PID 4304 created 3204 4304 XandETC.exe 12 PID 4304 created 3204 4304 XandETC.exe 12 PID 4304 created 3204 4304 XandETC.exe 12 PID 4304 created 3204 4304 XandETC.exe 12 PID 64 created 3204 64 updater.exe 12 PID 64 created 3204 64 updater.exe 12 PID 64 created 3204 64 updater.exe 12 PID 64 created 3204 64 updater.exe 12 PID 64 created 3204 64 updater.exe 12 PID 64 created 3204 64 updater.exe 12 PID 1844 created 3204 1844 conhost.exe 12 PID 64 created 3204 64 updater.exe 12 -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/620-562-0x00007FF7985A0000-0x00007FF798D94000-memory.dmp xmrig behavioral1/memory/620-567-0x00007FF7985A0000-0x00007FF798D94000-memory.dmp xmrig -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation D661.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oldplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 390B.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 390B.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation build2.exe -
Executes dropped EXE 25 IoCs
pid Process 224 C009.exe 2980 D661.exe 2716 DA88.exe 536 ss31.exe 3852 oldplayer.exe 4304 XandETC.exe 5060 oneetx.exe 5092 FF57.exe 3652 534.exe 5052 oneetx.exe 4540 1C47.exe 3452 210B.exe 740 332D.exe 380 3764.exe 3696 390B.exe 3160 390B.exe 1652 390B.exe 32 390B.exe 824 build2.exe 4484 build2.exe 1132 build3.exe 64 updater.exe 1892 98C0.exe 5052 oneetx.exe 4948 mstsca.exe -
Loads dropped DLL 2 IoCs
pid Process 4484 build2.exe 4484 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2304 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/620-562-0x00007FF7985A0000-0x00007FF798D94000-memory.dmp upx behavioral1/memory/620-567-0x00007FF7985A0000-0x00007FF798D94000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\098eb0f2-9f38-46e6-8110-60d91027ed12\\390B.exe\" --AutoStart" 390B.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 73 api.2ip.ua 61 api.2ip.ua 62 api.2ip.ua -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3696 set thread context of 3160 3696 390B.exe 114 PID 1652 set thread context of 32 1652 390B.exe 119 PID 824 set thread context of 4484 824 build2.exe 122 PID 64 set thread context of 1844 64 updater.exe 185 PID 64 set thread context of 620 64 updater.exe 191 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Notepad\Chrome\updater.exe XandETC.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 228 sc.exe 1736 sc.exe 4528 sc.exe 1928 sc.exe 220 sc.exe 616 sc.exe 2904 sc.exe 1952 sc.exe 2544 sc.exe 3888 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2660 5092 WerFault.exe 98 860 4540 WerFault.exe 103 4104 740 WerFault.exe 107 636 380 WerFault.exe 110 4828 224 WerFault.exe 88 3220 1892 WerFault.exe 155 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA88.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA88.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 534.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 534.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 210B.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 210B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 534.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 210B.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4996 schtasks.exe 3344 schtasks.exe 3652 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1492 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4936 15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe 4936 15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE 3204 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3204 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4936 15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe 2716 DA88.exe 3652 534.exe 3452 210B.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeDebugPrivilege 4860 powershell.exe Token: SeShutdownPrivilege 4344 powercfg.exe Token: SeCreatePagefilePrivilege 4344 powercfg.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeShutdownPrivilege 3428 powercfg.exe Token: SeCreatePagefilePrivilege 3428 powercfg.exe Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 3204 Explorer.EXE Token: SeCreatePagefilePrivilege 3204 Explorer.EXE Token: SeShutdownPrivilege 2148 powercfg.exe Token: SeCreatePagefilePrivilege 2148 powercfg.exe Token: SeShutdownPrivilege 380 powercfg.exe Token: SeCreatePagefilePrivilege 380 powercfg.exe Token: SeIncreaseQuotaPrivilege 1824 powershell.exe Token: SeSecurityPrivilege 1824 powershell.exe Token: SeTakeOwnershipPrivilege 1824 powershell.exe Token: SeLoadDriverPrivilege 1824 powershell.exe Token: SeSystemProfilePrivilege 1824 powershell.exe Token: SeSystemtimePrivilege 1824 powershell.exe Token: SeProfSingleProcessPrivilege 1824 powershell.exe Token: SeIncBasePriorityPrivilege 1824 powershell.exe Token: SeCreatePagefilePrivilege 1824 powershell.exe Token: SeBackupPrivilege 1824 powershell.exe Token: SeRestorePrivilege 1824 powershell.exe Token: SeShutdownPrivilege 1824 powershell.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeSystemEnvironmentPrivilege 1824 powershell.exe Token: SeRemoteShutdownPrivilege 1824 powershell.exe Token: SeUndockPrivilege 1824 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3852 oldplayer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 224 3204 Explorer.EXE 88 PID 3204 wrote to memory of 224 3204 Explorer.EXE 88 PID 3204 wrote to memory of 224 3204 Explorer.EXE 88 PID 3204 wrote to memory of 2980 3204 Explorer.EXE 90 PID 3204 wrote to memory of 2980 3204 Explorer.EXE 90 PID 3204 wrote to memory of 2980 3204 Explorer.EXE 90 PID 3204 wrote to memory of 2716 3204 Explorer.EXE 91 PID 3204 wrote to memory of 2716 3204 Explorer.EXE 91 PID 3204 wrote to memory of 2716 3204 Explorer.EXE 91 PID 2980 wrote to memory of 536 2980 D661.exe 92 PID 2980 wrote to memory of 536 2980 D661.exe 92 PID 2980 wrote to memory of 3852 2980 D661.exe 93 PID 2980 wrote to memory of 3852 2980 D661.exe 93 PID 2980 wrote to memory of 3852 2980 D661.exe 93 PID 2980 wrote to memory of 4304 2980 D661.exe 94 PID 2980 wrote to memory of 4304 2980 D661.exe 94 PID 3852 wrote to memory of 5060 3852 oldplayer.exe 95 PID 3852 wrote to memory of 5060 3852 oldplayer.exe 95 PID 3852 wrote to memory of 5060 3852 oldplayer.exe 95 PID 5060 wrote to memory of 4996 5060 oneetx.exe 96 PID 5060 wrote to memory of 4996 5060 oneetx.exe 96 PID 5060 wrote to memory of 4996 5060 oneetx.exe 96 PID 3204 wrote to memory of 5092 3204 Explorer.EXE 98 PID 3204 wrote to memory of 5092 3204 Explorer.EXE 98 PID 3204 wrote to memory of 5092 3204 Explorer.EXE 98 PID 3204 wrote to memory of 3652 3204 Explorer.EXE 101 PID 3204 wrote to memory of 3652 3204 Explorer.EXE 101 PID 3204 wrote to memory of 3652 3204 Explorer.EXE 101 PID 3204 wrote to memory of 4540 3204 Explorer.EXE 103 PID 3204 wrote to memory of 4540 3204 Explorer.EXE 103 PID 3204 wrote to memory of 4540 3204 Explorer.EXE 103 PID 3204 wrote to memory of 3452 3204 Explorer.EXE 106 PID 3204 wrote to memory of 3452 3204 Explorer.EXE 106 PID 3204 wrote to memory of 3452 3204 Explorer.EXE 106 PID 3204 wrote to memory of 740 3204 Explorer.EXE 107 PID 3204 wrote to memory of 740 3204 Explorer.EXE 107 PID 3204 wrote to memory of 740 3204 Explorer.EXE 107 PID 3204 wrote to memory of 380 3204 Explorer.EXE 110 PID 3204 wrote to memory of 380 3204 Explorer.EXE 110 PID 3204 wrote to memory of 380 3204 Explorer.EXE 110 PID 3204 wrote to memory of 3696 3204 Explorer.EXE 111 PID 3204 wrote to memory of 3696 3204 Explorer.EXE 111 PID 3204 wrote to memory of 3696 3204 Explorer.EXE 111 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3696 wrote to memory of 3160 3696 390B.exe 114 PID 3160 wrote to memory of 2304 3160 390B.exe 115 PID 3160 wrote to memory of 2304 3160 390B.exe 115 PID 3160 wrote to memory of 2304 3160 390B.exe 115 PID 3160 wrote to memory of 1652 3160 390B.exe 116 PID 3160 wrote to memory of 1652 3160 390B.exe 116 PID 3160 wrote to memory of 1652 3160 390B.exe 116 PID 1652 wrote to memory of 32 1652 390B.exe 119 PID 1652 wrote to memory of 32 1652 390B.exe 119 PID 1652 wrote to memory of 32 1652 390B.exe 119 PID 1652 wrote to memory of 32 1652 390B.exe 119 PID 1652 wrote to memory of 32 1652 390B.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe"C:\Users\Admin\AppData\Local\Temp\15e7c02825a6c2c4c3a1f0f682ca2f52b886f0c81b22e9ed3e0bec3fde3643a8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\C009.exeC:\Users\Admin\AppData\Local\Temp\C009.exe2⤵
- Executes dropped EXE
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10603⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\D661.exeC:\Users\Admin\AppData\Local\Temp\D661.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
PID:4304
-
-
-
C:\Users\Admin\AppData\Local\Temp\DA88.exeC:\Users\Admin\AppData\Local\Temp\DA88.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\FF57.exeC:\Users\Admin\AppData\Local\Temp\FF57.exe2⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 8123⤵
- Program crash
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\534.exeC:\Users\Admin\AppData\Local\Temp\534.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\1C47.exeC:\Users\Admin\AppData\Local\Temp\1C47.exe2⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8123⤵
- Program crash
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\210B.exeC:\Users\Admin\AppData\Local\Temp\210B.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\332D.exeC:\Users\Admin\AppData\Local\Temp\332D.exe2⤵
- Executes dropped EXE
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 8123⤵
- Program crash
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\3764.exeC:\Users\Admin\AppData\Local\Temp\3764.exe2⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 3443⤵
- Program crash
PID:636
-
-
-
C:\Users\Admin\AppData\Local\Temp\390B.exeC:\Users\Admin\AppData\Local\Temp\390B.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\390B.exeC:\Users\Admin\AppData\Local\Temp\390B.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\098eb0f2-9f38-46e6-8110-60d91027ed12" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\390B.exe"C:\Users\Admin\AppData\Local\Temp\390B.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\390B.exe"C:\Users\Admin\AppData\Local\Temp\390B.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
PID:32 -
C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build2.exe"C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:824 -
C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build2.exe"C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build2.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build2.exe" & exit8⤵PID:1896
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:1492
-
-
-
-
-
C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build3.exe"C:\Users\Admin\AppData\Local\81d02b6a-30da-4f50-9d90-d57b33b79a85\build3.exe"6⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:3344
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3504
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:3884
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3888
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4528
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:220
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:616
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:2188
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4932
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1340
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:4792
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:2152
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵PID:224
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\98C0.exeC:\Users\Admin\AppData\Local\Temp\98C0.exe2⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 6963⤵
- Program crash
PID:3220
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4124
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:4720
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1928
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:228
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2904
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1736
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:3732
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:1884
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:4956
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:112
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:2312
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2148
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3276
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4228
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1340
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1032
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2808
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe zuhwtyqtfkk2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:1844
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:4460 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:3504
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:440
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ozascextlcafxrlv 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2⤵
- Modifies data under HKEY_USERS
PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5092 -ip 50921⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4540 -ip 45401⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 740 -ip 7401⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 380 -ip 3801⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 224 -ip 2241⤵PID:3104
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1892 -ip 18921⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
PID:5052
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:3652
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5fa233b45db82551f99dbef0228a3230e
SHA1d1282ccc021ce2016499fd755c71d49f2f353b6c
SHA256f7b9fa61ba5a068a693c957b733c79279406494b069b1adef21a8ec2d22c6b2e
SHA512398582cef2d630a75c9c0611c0dc376c667f551b8712c8dfeabf6b6eecef5ab33027fac59b1963ed44d82584dd171b3b832d389b043fd56368545418eaf05c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5b7263b275d39b35a30dc1c997259591b
SHA122ff18c6f51280d4b41361fbc36c8cc8134bd70c
SHA256f9bf7b98d683c868daf9015ff946510adef6cdbe093bf3b30004bc3db0d5963a
SHA512251cbce9f5dc25f83cf4c6542e87dbe232b740667b48b5eec5903fb0c3a6c4442841bd8021dc949bc719a874055cbffff0bb522635aae8c8e24817ee83a91506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD589feb47f97a9fd4ab34c4e8c8d065660
SHA197a22c374ae50775f2702a8ab610ba1b7825b513
SHA256ebf659c02bc8c243556e49acd3d174629983a0815c3b1359bea9b94e091d83c6
SHA5123e7c86d99aa4753600834bbe1ddf02732508df73ae2d95f1beb092a79724a92aa5420c04bd581265e0603852d4411430053871fbf158c3a5f922d091f07f6ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5326502b58649e45edda038b9567c4220
SHA18458c6fafd4e9dc3f6c60a371d97eb77625ce4fb
SHA25651f86b96149e8647c2de93dd6eb1f2e80a9e190e5309d44bcc99a349d2ae304a
SHA51203ad3b5bd609665ff4554b0b3734106af98b597cf68f3d2ccf2a1179c6f503e70155ca02be05d36fd3f5fdb77158f810d0061eb39da90f9f1a9a9e0883f08cb9
-
Filesize
756KB
MD5927d51618691ca625869ddb9dcc6c871
SHA17af773ec808a98a20c2507b833b8cc80763b5de2
SHA256632c034396dfd05a803990e40396e94b778cd7df76af84d6debaaf86dff2dcaf
SHA512905ddc8256d4e8f13bd7246f88202999688bce156779479d321b0a2550b988e670ba1736cb7ee687992f749aeb8d36790291fd2eaee645ecaafa7be6e179e58c
-
Filesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
Filesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
Filesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
Filesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
1KB
MD5775c82c7bbad0e74b85d6b2950ba2f20
SHA123ba14921e5978ffd3b80af8725991ab51151302
SHA256969845b6739e4f301a1cc65ec34ef7980ee95ea9bf43813ba92a6ba97dc3d2cb
SHA51228154fba13ae93922d754c8bdeb18159c978b3851ada57f3e4722bc5541a14acdbc2099138dccaca6debe832f21a5ee1a5c4ac076f156e4b2207037fc4f0a887
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
756KB
MD5927d51618691ca625869ddb9dcc6c871
SHA17af773ec808a98a20c2507b833b8cc80763b5de2
SHA256632c034396dfd05a803990e40396e94b778cd7df76af84d6debaaf86dff2dcaf
SHA512905ddc8256d4e8f13bd7246f88202999688bce156779479d321b0a2550b988e670ba1736cb7ee687992f749aeb8d36790291fd2eaee645ecaafa7be6e179e58c
-
Filesize
756KB
MD5927d51618691ca625869ddb9dcc6c871
SHA17af773ec808a98a20c2507b833b8cc80763b5de2
SHA256632c034396dfd05a803990e40396e94b778cd7df76af84d6debaaf86dff2dcaf
SHA512905ddc8256d4e8f13bd7246f88202999688bce156779479d321b0a2550b988e670ba1736cb7ee687992f749aeb8d36790291fd2eaee645ecaafa7be6e179e58c
-
Filesize
756KB
MD5927d51618691ca625869ddb9dcc6c871
SHA17af773ec808a98a20c2507b833b8cc80763b5de2
SHA256632c034396dfd05a803990e40396e94b778cd7df76af84d6debaaf86dff2dcaf
SHA512905ddc8256d4e8f13bd7246f88202999688bce156779479d321b0a2550b988e670ba1736cb7ee687992f749aeb8d36790291fd2eaee645ecaafa7be6e179e58c
-
Filesize
756KB
MD5927d51618691ca625869ddb9dcc6c871
SHA17af773ec808a98a20c2507b833b8cc80763b5de2
SHA256632c034396dfd05a803990e40396e94b778cd7df76af84d6debaaf86dff2dcaf
SHA512905ddc8256d4e8f13bd7246f88202999688bce156779479d321b0a2550b988e670ba1736cb7ee687992f749aeb8d36790291fd2eaee645ecaafa7be6e179e58c
-
Filesize
756KB
MD5927d51618691ca625869ddb9dcc6c871
SHA17af773ec808a98a20c2507b833b8cc80763b5de2
SHA256632c034396dfd05a803990e40396e94b778cd7df76af84d6debaaf86dff2dcaf
SHA512905ddc8256d4e8f13bd7246f88202999688bce156779479d321b0a2550b988e670ba1736cb7ee687992f749aeb8d36790291fd2eaee645ecaafa7be6e179e58c
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
300KB
MD557db81e99f22a72daee318149bb07148
SHA1a4662d5311c1b8b8500013c03ca37756a0c477be
SHA256588b15199215295b47222d35b24add68f17639823fc58f7661474e0f4ead30ee
SHA512779743bf93ce2bdbb4d66bfff630ce8de0155f31300b19d5d4275477ff20d91b25aab162caa67c6032331b1cd7a5d351d2a6cebbae5aaac71745106ca423afbe
-
Filesize
300KB
MD557db81e99f22a72daee318149bb07148
SHA1a4662d5311c1b8b8500013c03ca37756a0c477be
SHA256588b15199215295b47222d35b24add68f17639823fc58f7661474e0f4ead30ee
SHA512779743bf93ce2bdbb4d66bfff630ce8de0155f31300b19d5d4275477ff20d91b25aab162caa67c6032331b1cd7a5d351d2a6cebbae5aaac71745106ca423afbe
-
Filesize
389KB
MD5b45bb200e43a3cbd98917a2ef0bc035a
SHA1307b0c7b318da84d475c5c5104c4ff7534bdd1c7
SHA2560915dfba50d58a72979d7209230e2f1fd90c8c66a702512b24a15b73141c803a
SHA512dd0a0ab5ef423eb1aed6831df948d53f2cbb3dc3b0566dc8c91123aaad7f2d58971cd9ce4a9be92bfc362ef7f64576b9fc3cec6036ac42ac3fb7b4204d4b1dbc
-
Filesize
389KB
MD5b45bb200e43a3cbd98917a2ef0bc035a
SHA1307b0c7b318da84d475c5c5104c4ff7534bdd1c7
SHA2560915dfba50d58a72979d7209230e2f1fd90c8c66a702512b24a15b73141c803a
SHA512dd0a0ab5ef423eb1aed6831df948d53f2cbb3dc3b0566dc8c91123aaad7f2d58971cd9ce4a9be92bfc362ef7f64576b9fc3cec6036ac42ac3fb7b4204d4b1dbc
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
237KB
MD56c0fbf8ad735b7147fed66198aefc346
SHA1ec7093036b495ac20fb76585d9bfb1491219da76
SHA2560c37d1e7b35ef5528d7c35555b33d60099eead6fea5d5a9ffe8e85f11f8d639b
SHA512a58876f4a99510b6edf7111ddd578b2a7feb1d57c7fad2d9ac3d72f5d0fea8b04b514f8a0deea85c564b10890a3a665182c37aa740fb9be8cf80e5bed935433d
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
Filesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
Filesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
Filesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5