Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
182s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
3bN47tt.exe
Resource
win7-20230831-en
General
-
Target
3bN47tt.exe
-
Size
271KB
-
MD5
3c31391d6855b0d3945ee159087562fd
-
SHA1
60fb690fb8e685254f63e838c807557e43ef6c0b
-
SHA256
864bfb33ffe90a6988fc8d05d7341bc01fa4e9469fc297b2dfd6993cd9fa88bd
-
SHA512
9002cb84e87987cdb31b68e69c3445257b5cdb23b0d4aa1bbffea710a427e3085d88f0dd1d8503ec4fce24626c9ccb92d5e33036b4032b724cda167c3b1ef7c7
-
SSDEEP
6144:HDCfTqHz6GV3Dmsiwyf0LvfhYuJAO9rknaQrQS:HDC7QzZV36YLquJnqrQS
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
6012068394_99
https://pastebin.com/raw/8baCJyMF
Extracted
smokeloader
up3
Extracted
stealc
http://5.42.65.39
-
url_path
/bed95ea4798a5204.php
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001705c-67.dat healer behavioral1/files/0x000700000001705c-65.dat healer behavioral1/memory/2460-132-0x0000000000EB0000-0x0000000000EBA000-memory.dmp healer -
Glupteba payload 5 IoCs
resource yara_rule behavioral1/memory/1600-267-0x0000000004FB0000-0x000000000589B000-memory.dmp family_glupteba behavioral1/memory/1600-269-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral1/memory/1600-275-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral1/memory/1600-317-0x0000000004FB0000-0x000000000589B000-memory.dmp family_glupteba behavioral1/memory/1600-327-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5DE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 5DE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5DE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5DE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5DE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5DE.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1756-149-0x00000000001B0000-0x000000000020A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 2632 created 1276 2632 latestX.exe 13 PID 2632 created 1276 2632 latestX.exe 13 PID 2632 created 1276 2632 latestX.exe 13 PID 2632 created 1276 2632 latestX.exe 13 PID 2632 created 1276 2632 latestX.exe 13 PID 2956 created 1276 2956 updater.exe 13 PID 2956 created 1276 2956 updater.exe 13 PID 2956 created 1276 2956 updater.exe 13 PID 2956 created 1276 2956 updater.exe 13 PID 2956 created 1276 2956 updater.exe 13 PID 2956 created 1276 2956 updater.exe 13 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 1252 bcdedit.exe 1852 bcdedit.exe 2724 bcdedit.exe 2784 bcdedit.exe 1608 bcdedit.exe 1036 bcdedit.exe 1720 bcdedit.exe 1492 bcdedit.exe 1612 bcdedit.exe 1992 bcdedit.exe 748 bcdedit.exe 1744 bcdedit.exe 2096 bcdedit.exe 2608 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1748 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 31 IoCs
pid Process 840 148.exe 1544 281.exe 2652 BW5QB7XH.exe 2584 il8ow8mR.exe 2756 551.exe 2460 5DE.exe 2516 Mq5el0Td.exe 3052 6E9.exe 1736 eN0zP9lV.exe 1876 1Mt24Fq6.exe 2008 explothe.exe 1552 42D0.exe 1756 45CE.exe 880 4A03.exe 2220 toolspub2.exe 1600 31839b57a4f11171d6abc8bbc4451ee4.exe 2540 Setup.exe 2964 kos1.exe 2632 latestX.exe 2768 set16.exe 2668 kos.exe 2940 is-5A5VO.tmp 2424 powercfg.exe 1084 powercfg.exe 2428 previewer.exe 2496 31839b57a4f11171d6abc8bbc4451ee4.exe 2956 updater.exe 2332 csrss.exe 2120 explothe.exe 2268 injector.exe 1756 patch.exe -
Loads dropped DLL 64 IoCs
pid Process 840 148.exe 840 148.exe 2652 BW5QB7XH.exe 2652 BW5QB7XH.exe 2584 il8ow8mR.exe 2584 il8ow8mR.exe 2516 Mq5el0Td.exe 2516 Mq5el0Td.exe 1736 eN0zP9lV.exe 2136 WerFault.exe 2136 WerFault.exe 2136 WerFault.exe 1736 eN0zP9lV.exe 1736 eN0zP9lV.exe 1876 1Mt24Fq6.exe 3052 6E9.exe 2136 WerFault.exe 1268 WerFault.exe 1268 WerFault.exe 1268 WerFault.exe 1268 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 1552 Process not Found 1552 Process not Found 1008 WerFault.exe 1008 WerFault.exe 1552 Process not Found 1552 Process not Found 1552 Process not Found 1008 WerFault.exe 1552 Process not Found 1552 Process not Found 2964 kos1.exe 2768 set16.exe 2768 set16.exe 2768 set16.exe 2964 kos1.exe 2768 set16.exe 2940 is-5A5VO.tmp 2940 is-5A5VO.tmp 2940 is-5A5VO.tmp 2940 is-5A5VO.tmp 2940 is-5A5VO.tmp 2424 powercfg.exe 2424 powercfg.exe 2940 is-5A5VO.tmp 2428 previewer.exe 2428 previewer.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2076 taskeng.exe 2496 31839b57a4f11171d6abc8bbc4451ee4.exe 2496 31839b57a4f11171d6abc8bbc4451ee4.exe 2332 csrss.exe 824 Process not Found 1756 patch.exe 1756 patch.exe 1756 patch.exe 1756 patch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0006000000012194-599.dat upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.159.66.125 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 5DE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 5DE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" il8ow8mR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Mq5el0Td.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" eN0zP9lV.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 148.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" BW5QB7XH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1692 set thread context of 2092 1692 3bN47tt.exe 28 PID 2540 set thread context of 320 2540 Setup.exe 83 PID 2956 set thread context of 2876 2956 updater.exe 144 PID 2956 set thread context of 2704 2956 updater.exe 145 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files (x86)\PA Previewer\unins000.dat is-5A5VO.tmp File created C:\Program Files (x86)\PA Previewer\is-EN9PM.tmp is-5A5VO.tmp File created C:\Program Files (x86)\PA Previewer\is-HT12S.tmp is-5A5VO.tmp File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-5A5VO.tmp File created C:\Program Files (x86)\PA Previewer\is-UEA34.tmp is-5A5VO.tmp File created C:\Program Files (x86)\PA Previewer\is-N65VI.tmp is-5A5VO.tmp File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-5A5VO.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\Logs\CBS\CbsPersist_20231010050223.cab makecab.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2624 sc.exe 2392 sc.exe 1212 sc.exe 1596 sc.exe 2016 sc.exe 1704 sc.exe 1248 sc.exe 2388 sc.exe 1092 sc.exe 2976 sc.exe 2932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2336 1692 WerFault.exe 27 2136 1544 WerFault.exe 33 1268 2756 WerFault.exe 38 2716 1876 WerFault.exe 44 1008 880 WerFault.exe 63 1628 320 WerFault.exe 83 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 292 schtasks.exe 1852 schtasks.exe 1072 schtasks.exe 2440 schtasks.exe 536 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-581 = "North Asia East Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-552 = "North Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 AppLaunch.exe 2092 AppLaunch.exe 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2092 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 2460 5DE.exe Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 2424 powercfg.exe Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 1756 45CE.exe Token: SeDebugPrivilege 2668 kos.exe Token: SeDebugPrivilege 2540 Setup.exe Token: SeDebugPrivilege 2428 previewer.exe Token: SeShutdownPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 2224 powershell.exe Token: SeDebugPrivilege 1600 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1600 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 472 powershell.exe Token: SeShutdownPrivilege 1084 powercfg.exe Token: SeShutdownPrivilege 2424 powercfg.exe Token: SeShutdownPrivilege 1332 powercfg.exe Token: SeShutdownPrivilege 1664 powercfg.exe Token: SeSystemEnvironmentPrivilege 2332 csrss.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeShutdownPrivilege 1996 powercfg.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeShutdownPrivilege 2400 powercfg.exe Token: SeShutdownPrivilege 2828 powercfg.exe Token: SeShutdownPrivilege 2288 powercfg.exe Token: SeDebugPrivilege 2956 updater.exe Token: SeLockMemoryPrivilege 2704 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2092 1692 3bN47tt.exe 28 PID 1692 wrote to memory of 2336 1692 3bN47tt.exe 29 PID 1692 wrote to memory of 2336 1692 3bN47tt.exe 29 PID 1692 wrote to memory of 2336 1692 3bN47tt.exe 29 PID 1692 wrote to memory of 2336 1692 3bN47tt.exe 29 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 840 1276 Explorer.EXE 32 PID 1276 wrote to memory of 1544 1276 Explorer.EXE 33 PID 1276 wrote to memory of 1544 1276 Explorer.EXE 33 PID 1276 wrote to memory of 1544 1276 Explorer.EXE 33 PID 1276 wrote to memory of 1544 1276 Explorer.EXE 33 PID 840 wrote to memory of 2652 840 148.exe 34 PID 840 wrote to memory of 2652 840 148.exe 34 PID 840 wrote to memory of 2652 840 148.exe 34 PID 840 wrote to memory of 2652 840 148.exe 34 PID 840 wrote to memory of 2652 840 148.exe 34 PID 840 wrote to memory of 2652 840 148.exe 34 PID 840 wrote to memory of 2652 840 148.exe 34 PID 1276 wrote to memory of 2280 1276 Explorer.EXE 36 PID 1276 wrote to memory of 2280 1276 Explorer.EXE 36 PID 1276 wrote to memory of 2280 1276 Explorer.EXE 36 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 2652 wrote to memory of 2584 2652 BW5QB7XH.exe 35 PID 1276 wrote to memory of 2756 1276 Explorer.EXE 38 PID 1276 wrote to memory of 2756 1276 Explorer.EXE 38 PID 1276 wrote to memory of 2756 1276 Explorer.EXE 38 PID 1276 wrote to memory of 2756 1276 Explorer.EXE 38 PID 1276 wrote to memory of 2460 1276 Explorer.EXE 39 PID 1276 wrote to memory of 2460 1276 Explorer.EXE 39 PID 1276 wrote to memory of 2460 1276 Explorer.EXE 39 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 2584 wrote to memory of 2516 2584 il8ow8mR.exe 40 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 41 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 41 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 41 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 41 PID 2516 wrote to memory of 1736 2516 Mq5el0Td.exe 43 PID 2516 wrote to memory of 1736 2516 Mq5el0Td.exe 43 PID 2516 wrote to memory of 1736 2516 Mq5el0Td.exe 43 PID 2516 wrote to memory of 1736 2516 Mq5el0Td.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\3bN47tt.exe"C:\Users\Admin\AppData\Local\Temp\3bN47tt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 1363⤵
- Program crash
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\148.exeC:\Users\Admin\AppData\Local\Temp\148.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BW5QB7XH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BW5QB7XH.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\il8ow8mR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\il8ow8mR.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Mq5el0Td.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Mq5el0Td.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\eN0zP9lV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\eN0zP9lV.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Mt24Fq6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Mt24Fq6.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 2808⤵
- Loads dropped DLL
- Program crash
PID:2716
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\281.exeC:\Users\Admin\AppData\Local\Temp\281.exe2⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 1323⤵
- Loads dropped DLL
- Program crash
PID:2136
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\39B.bat" "2⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\551.exeC:\Users\Admin\AppData\Local\Temp\551.exe2⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 1323⤵
- Loads dropped DLL
- Program crash
PID:1268
-
-
-
C:\Users\Admin\AppData\Local\Temp\5DE.exeC:\Users\Admin\AppData\Local\Temp\5DE.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\6E9.exeC:\Users\Admin\AppData\Local\Temp\6E9.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"3⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F4⤵
- Creates scheduled task(s)
PID:292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit4⤵PID:1752
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"5⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E5⤵PID:2520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"5⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E5⤵PID:1392
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\42D0.exeC:\Users\Admin\AppData\Local\Temp\42D0.exe2⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2496 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:916
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1748
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1072
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1756 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER7⤵
- Modifies boot configuration data using bcdedit
PID:1252
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:1852
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:7⤵
- Modifies boot configuration data using bcdedit
PID:2724
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows7⤵
- Modifies boot configuration data using bcdedit
PID:2784
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe7⤵
- Modifies boot configuration data using bcdedit
PID:1608
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe7⤵
- Modifies boot configuration data using bcdedit
PID:1036
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 07⤵
- Modifies boot configuration data using bcdedit
PID:1720
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn7⤵
- Modifies boot configuration data using bcdedit
PID:1492
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 17⤵
- Modifies boot configuration data using bcdedit
PID:1612
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}7⤵
- Modifies boot configuration data using bcdedit
PID:1992
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast7⤵
- Modifies boot configuration data using bcdedit
PID:748
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 07⤵
- Modifies boot configuration data using bcdedit
PID:1744
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}7⤵
- Modifies boot configuration data using bcdedit
PID:2096
-
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v6⤵
- Modifies boot configuration data using bcdedit
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe6⤵PID:1996
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:536
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2180
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:2016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe6⤵PID:1040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:1988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 445⤵
- Program crash
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\is-BH4TD.tmp\is-5A5VO.tmp"C:\Users\Admin\AppData\Local\Temp\is-BH4TD.tmp\is-5A5VO.tmp" /SL4 $30200 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2940 -
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i6⤵PID:2424
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 86⤵PID:2392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 87⤵PID:1388
-
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:2632
-
-
-
C:\Users\Admin\AppData\Local\Temp\45CE.exeC:\Users\Admin\AppData\Local\Temp\45CE.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\4A03.exeC:\Users\Admin\AppData\Local\Temp\4A03.exe2⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 5083⤵
- Loads dropped DLL
- Program crash
PID:1008
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2580
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1248
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2624
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1092
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2392
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1852
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:748
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:2440
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2180
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1636
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2876
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FD949D36-3E96-4B56-9184-091C750D6D04} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵PID:3028
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231010050223.log C:\Windows\Logs\CBS\CbsPersist_20231010050223.cab1⤵
- Drops file in Windows directory
PID:1648
-
C:\Windows\system32\taskeng.exetaskeng.exe {9B663FA9-76D4-4DA7-B995-A4C6E2150308} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:2076 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\sc.exesc stop UsoSvc1⤵
- Launches sc.exe
PID:2976
-
C:\Windows\System32\sc.exesc stop wuauserv1⤵
- Launches sc.exe
PID:1212
-
C:\Windows\System32\sc.exesc stop dosvc1⤵
- Launches sc.exe
PID:2932
-
C:\Windows\System32\sc.exesc stop bits1⤵
- Launches sc.exe
PID:1596
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc1⤵
- Launches sc.exe
PID:1704
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.2MB
MD557a1cd858be25dccd19cd55c0a92f578
SHA10398bc0b603b96f3afccd58284b55f7db420c024
SHA2569352f1778db67883630eb5a917a0245c8775b9fc677e3c9eab2521caa63b47ad
SHA512db1f6e59421e4b6d227fcc5937c8ee837585c186f5b9f82dc5e301f46255e5343a7048516153e3ca25a33a458de8fca27fe82dd07771d333cea0a342ef1f6984
-
Filesize
1.2MB
MD557a1cd858be25dccd19cd55c0a92f578
SHA10398bc0b603b96f3afccd58284b55f7db420c024
SHA2569352f1778db67883630eb5a917a0245c8775b9fc677e3c9eab2521caa63b47ad
SHA512db1f6e59421e4b6d227fcc5937c8ee837585c186f5b9f82dc5e301f46255e5343a7048516153e3ca25a33a458de8fca27fe82dd07771d333cea0a342ef1f6984
-
Filesize
422KB
MD54b3f4901b7c9a71e34bddd605ef3cd1b
SHA12785827befe85b1c008869344c19b340035b0f44
SHA2561b6862fa5568269a3b78c9ee15b55885e7f93a2715154e8a124d4687d38b661e
SHA5124dbf264c496d3d87721701a4382261d0e57117bcbef86c03a7e9f33295841aa956003174b26574f6ae489c05ceac5edaeebac4d8693de6bb2b390de0f2faf2cc
-
Filesize
422KB
MD54b3f4901b7c9a71e34bddd605ef3cd1b
SHA12785827befe85b1c008869344c19b340035b0f44
SHA2561b6862fa5568269a3b78c9ee15b55885e7f93a2715154e8a124d4687d38b661e
SHA5124dbf264c496d3d87721701a4382261d0e57117bcbef86c03a7e9f33295841aa956003174b26574f6ae489c05ceac5edaeebac4d8693de6bb2b390de0f2faf2cc
-
Filesize
4.1MB
MD59066252ec48e20ddd82d2ec928cb7867
SHA1222cbf0415a3166b1f55ff1ba293c4f8b5b840c8
SHA25697501b83431f3b3f369d96c268ef1de99d588e74f0b28d7b853ff3ebf259f96c
SHA5124be0962e8cfdb2e723b87a76c9b43c5d3bb5e432e7ef3f28146056ec0cb854256a0a67c44fd9fabfbb66e5f150047890b76bab3d5bf86175a94e33d9d6f4e7f2
-
Filesize
4.1MB
MD59066252ec48e20ddd82d2ec928cb7867
SHA1222cbf0415a3166b1f55ff1ba293c4f8b5b840c8
SHA25697501b83431f3b3f369d96c268ef1de99d588e74f0b28d7b853ff3ebf259f96c
SHA5124be0962e8cfdb2e723b87a76c9b43c5d3bb5e432e7ef3f28146056ec0cb854256a0a67c44fd9fabfbb66e5f150047890b76bab3d5bf86175a94e33d9d6f4e7f2
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
13.3MB
MD5cb1613f1381febe4f0162c729e31cb0c
SHA1ee046e2bae76d2f775c0edbf6cfdfa57311c2efa
SHA25628c7a1e748b19f24cbd60e3391636e66c29243bec0414c4a839183b8ed439425
SHA51296bf3587b174010395a3df84c9a7321ee627838103b187ade7a24d65a0f3f2bcd571d614f3e3a108f1999e6e1881134e99d5b9142204aa0e2169dc3bced9a7a4
-
Filesize
13.3MB
MD5cb1613f1381febe4f0162c729e31cb0c
SHA1ee046e2bae76d2f775c0edbf6cfdfa57311c2efa
SHA25628c7a1e748b19f24cbd60e3391636e66c29243bec0414c4a839183b8ed439425
SHA51296bf3587b174010395a3df84c9a7321ee627838103b187ade7a24d65a0f3f2bcd571d614f3e3a108f1999e6e1881134e99d5b9142204aa0e2169dc3bced9a7a4
-
Filesize
425KB
MD5b4ab71c94f4b9841809a227f27581608
SHA1fcdbe3d9dced5531855bd067948d16eb1897521f
SHA256e72fe26531f2cd68a38a8f6dacbd333b0b24fa8d72a38098201241df1a6fcec0
SHA512496a034479382fae373e5f992d7fb605da18e6027d8d3ed509dc9e19a54a8e78f4d7fc0acfa0d1a3face494a6f486ed67df81914a71d14dfe81484c0bb3f1108
-
Filesize
425KB
MD5b4ab71c94f4b9841809a227f27581608
SHA1fcdbe3d9dced5531855bd067948d16eb1897521f
SHA256e72fe26531f2cd68a38a8f6dacbd333b0b24fa8d72a38098201241df1a6fcec0
SHA512496a034479382fae373e5f992d7fb605da18e6027d8d3ed509dc9e19a54a8e78f4d7fc0acfa0d1a3face494a6f486ed67df81914a71d14dfe81484c0bb3f1108
-
Filesize
425KB
MD5b4ab71c94f4b9841809a227f27581608
SHA1fcdbe3d9dced5531855bd067948d16eb1897521f
SHA256e72fe26531f2cd68a38a8f6dacbd333b0b24fa8d72a38098201241df1a6fcec0
SHA512496a034479382fae373e5f992d7fb605da18e6027d8d3ed509dc9e19a54a8e78f4d7fc0acfa0d1a3face494a6f486ed67df81914a71d14dfe81484c0bb3f1108
-
Filesize
180KB
MD5109da216e61cf349221bd2455d2170d4
SHA1ea6983b8581b8bb57e47c8492783256313c19480
SHA256a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26
-
Filesize
180KB
MD5109da216e61cf349221bd2455d2170d4
SHA1ea6983b8581b8bb57e47c8492783256313c19480
SHA256a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26
-
Filesize
461KB
MD590bf4c88fc026f9f87b9b4450de312f7
SHA10a5c6523834e78e71cd95a5192311eebced5678d
SHA256fe0caa403b99e102a35932bb849289d20a0febda59c0f64bcb3234693356d2e4
SHA512b581bda6b0c695a3a24589dfa814e9d8e53664521107e62d6dd2424ce5491dd55cf3e928c233961c1f9a8ae009090123789d18e3de5c13a2496dfbc838ee6d9a
-
Filesize
461KB
MD590bf4c88fc026f9f87b9b4450de312f7
SHA10a5c6523834e78e71cd95a5192311eebced5678d
SHA256fe0caa403b99e102a35932bb849289d20a0febda59c0f64bcb3234693356d2e4
SHA512b581bda6b0c695a3a24589dfa814e9d8e53664521107e62d6dd2424ce5491dd55cf3e928c233961c1f9a8ae009090123789d18e3de5c13a2496dfbc838ee6d9a
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
1.1MB
MD5126f20c26c85b936d5037ef92b716345
SHA1d5bc7e819939d6c48a257b9b51cfea6f4c670e2b
SHA2562bf476545025d3cc2a5203c874a657397d3a458dc1f2b2bcc76c417dccf04654
SHA512dc3bcfa7ebc934db0825faa5c58f5780b35a6a46af186687614ee067b8e794ba497636c8f339cb05766693718b3038700667f5825ca8a0ce1b5aaec0370dc4c9
-
Filesize
1.1MB
MD5126f20c26c85b936d5037ef92b716345
SHA1d5bc7e819939d6c48a257b9b51cfea6f4c670e2b
SHA2562bf476545025d3cc2a5203c874a657397d3a458dc1f2b2bcc76c417dccf04654
SHA512dc3bcfa7ebc934db0825faa5c58f5780b35a6a46af186687614ee067b8e794ba497636c8f339cb05766693718b3038700667f5825ca8a0ce1b5aaec0370dc4c9
-
Filesize
934KB
MD52df516e4c43caff1a3685d1d693240bc
SHA1e9ea053f4eeb43aaf370dfa6006c9f40cd0f9a4d
SHA256856344f8a610fd33f49d75cc4a7dc7164c4859da73e799314ad4c913a522e197
SHA512c748e0e54c5caf733c85c66fd81765812fdf7d7cf0ca5d49fbb89220eda334644cf3adaff9f3c039aa1e11d43edfcc01ebb74886a98a187f41b5a0b963f3adf5
-
Filesize
934KB
MD52df516e4c43caff1a3685d1d693240bc
SHA1e9ea053f4eeb43aaf370dfa6006c9f40cd0f9a4d
SHA256856344f8a610fd33f49d75cc4a7dc7164c4859da73e799314ad4c913a522e197
SHA512c748e0e54c5caf733c85c66fd81765812fdf7d7cf0ca5d49fbb89220eda334644cf3adaff9f3c039aa1e11d43edfcc01ebb74886a98a187f41b5a0b963f3adf5
-
Filesize
639KB
MD57ceef82240ac8a06c00c304a91ab88e7
SHA1c2bffc25bc9eec13a2448f97a4fd8a97f934e6bd
SHA256fa1de88c6afb177876d4c3cbd525a0520d5ba57bc317aca686276875c823d0c0
SHA512d93a111726d981fc112619ba43c6dc9c5afaeebf09bb971ea576bf85e9108b420f4d3cc1b24b4e91ff24bd5c013bdc0b6079f3e77d5dc4ebf9e55d7f2ec6a5d7
-
Filesize
639KB
MD57ceef82240ac8a06c00c304a91ab88e7
SHA1c2bffc25bc9eec13a2448f97a4fd8a97f934e6bd
SHA256fa1de88c6afb177876d4c3cbd525a0520d5ba57bc317aca686276875c823d0c0
SHA512d93a111726d981fc112619ba43c6dc9c5afaeebf09bb971ea576bf85e9108b420f4d3cc1b24b4e91ff24bd5c013bdc0b6079f3e77d5dc4ebf9e55d7f2ec6a5d7
-
Filesize
443KB
MD5e5c18d40f8ba057ab5b2e57f262b5759
SHA1c93d0ebb29e959e2f47e215165302707b5bfc01d
SHA256f3e0b5c758f84a5d79034931eb34c5cd6b58f85071db4f0a54cb83c5f3a13e61
SHA5126f8370e7855910aab7b01d4d953e0b8593e2fb4e6f5dc56d757aaf94f978cb9d0f7b9c2e3c3fc611cdcfc4993438d187012270d0ef91511b620d1752d13f3920
-
Filesize
443KB
MD5e5c18d40f8ba057ab5b2e57f262b5759
SHA1c93d0ebb29e959e2f47e215165302707b5bfc01d
SHA256f3e0b5c758f84a5d79034931eb34c5cd6b58f85071db4f0a54cb83c5f3a13e61
SHA5126f8370e7855910aab7b01d4d953e0b8593e2fb4e6f5dc56d757aaf94f978cb9d0f7b9c2e3c3fc611cdcfc4993438d187012270d0ef91511b620d1752d13f3920
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize395KB
MD55da3a881ef991e8010deed799f1a5aaf
SHA1fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA51224fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
216KB
MD5fd134e455dc6caf3b95e7f4dfefb1550
SHA1bc7fef4d1e9bdb19e79b2d4f0b66ef627e977882
SHA256aadebe52d66f6c135cdccbf672ba6e7797097c830bb6ee11d8523d5de169d82f
SHA512a38dada18974648f2291bc08d6c32b8670a86b856e15a51d9836e832e7c4074ebc31e0f78778c65da49c4d91ac23a23c6a686179c82b6a76ed0096c5e1eb83c4
-
Filesize
216KB
MD5fd134e455dc6caf3b95e7f4dfefb1550
SHA1bc7fef4d1e9bdb19e79b2d4f0b66ef627e977882
SHA256aadebe52d66f6c135cdccbf672ba6e7797097c830bb6ee11d8523d5de169d82f
SHA512a38dada18974648f2291bc08d6c32b8670a86b856e15a51d9836e832e7c4074ebc31e0f78778c65da49c4d91ac23a23c6a686179c82b6a76ed0096c5e1eb83c4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\06A3DFRNPP18MIP215WJ.temp
Filesize7KB
MD5df2585875f94fc8418321abafedca295
SHA1e5d3f222e01cbb230eb070e91af53be01c1c78ae
SHA25676f23adeebb16947d47efca7fc704ee422304ad9e273db8c69274b73a23aceae
SHA5127461607befb88c53901e3a9b8868dd7dc2352e5d3da8af17c00836179714109b88b09b0e184b1df76b2f5522058df3a99934fa3cd644072be954a9165a143442
-
Filesize
1.2MB
MD557a1cd858be25dccd19cd55c0a92f578
SHA10398bc0b603b96f3afccd58284b55f7db420c024
SHA2569352f1778db67883630eb5a917a0245c8775b9fc677e3c9eab2521caa63b47ad
SHA512db1f6e59421e4b6d227fcc5937c8ee837585c186f5b9f82dc5e301f46255e5343a7048516153e3ca25a33a458de8fca27fe82dd07771d333cea0a342ef1f6984
-
Filesize
422KB
MD54b3f4901b7c9a71e34bddd605ef3cd1b
SHA12785827befe85b1c008869344c19b340035b0f44
SHA2561b6862fa5568269a3b78c9ee15b55885e7f93a2715154e8a124d4687d38b661e
SHA5124dbf264c496d3d87721701a4382261d0e57117bcbef86c03a7e9f33295841aa956003174b26574f6ae489c05ceac5edaeebac4d8693de6bb2b390de0f2faf2cc
-
Filesize
422KB
MD54b3f4901b7c9a71e34bddd605ef3cd1b
SHA12785827befe85b1c008869344c19b340035b0f44
SHA2561b6862fa5568269a3b78c9ee15b55885e7f93a2715154e8a124d4687d38b661e
SHA5124dbf264c496d3d87721701a4382261d0e57117bcbef86c03a7e9f33295841aa956003174b26574f6ae489c05ceac5edaeebac4d8693de6bb2b390de0f2faf2cc
-
Filesize
422KB
MD54b3f4901b7c9a71e34bddd605ef3cd1b
SHA12785827befe85b1c008869344c19b340035b0f44
SHA2561b6862fa5568269a3b78c9ee15b55885e7f93a2715154e8a124d4687d38b661e
SHA5124dbf264c496d3d87721701a4382261d0e57117bcbef86c03a7e9f33295841aa956003174b26574f6ae489c05ceac5edaeebac4d8693de6bb2b390de0f2faf2cc
-
Filesize
422KB
MD54b3f4901b7c9a71e34bddd605ef3cd1b
SHA12785827befe85b1c008869344c19b340035b0f44
SHA2561b6862fa5568269a3b78c9ee15b55885e7f93a2715154e8a124d4687d38b661e
SHA5124dbf264c496d3d87721701a4382261d0e57117bcbef86c03a7e9f33295841aa956003174b26574f6ae489c05ceac5edaeebac4d8693de6bb2b390de0f2faf2cc
-
Filesize
4.1MB
MD59066252ec48e20ddd82d2ec928cb7867
SHA1222cbf0415a3166b1f55ff1ba293c4f8b5b840c8
SHA25697501b83431f3b3f369d96c268ef1de99d588e74f0b28d7b853ff3ebf259f96c
SHA5124be0962e8cfdb2e723b87a76c9b43c5d3bb5e432e7ef3f28146056ec0cb854256a0a67c44fd9fabfbb66e5f150047890b76bab3d5bf86175a94e33d9d6f4e7f2
-
Filesize
4.1MB
MD59066252ec48e20ddd82d2ec928cb7867
SHA1222cbf0415a3166b1f55ff1ba293c4f8b5b840c8
SHA25697501b83431f3b3f369d96c268ef1de99d588e74f0b28d7b853ff3ebf259f96c
SHA5124be0962e8cfdb2e723b87a76c9b43c5d3bb5e432e7ef3f28146056ec0cb854256a0a67c44fd9fabfbb66e5f150047890b76bab3d5bf86175a94e33d9d6f4e7f2
-
Filesize
180KB
MD5109da216e61cf349221bd2455d2170d4
SHA1ea6983b8581b8bb57e47c8492783256313c19480
SHA256a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26
-
Filesize
180KB
MD5109da216e61cf349221bd2455d2170d4
SHA1ea6983b8581b8bb57e47c8492783256313c19480
SHA256a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26
-
Filesize
180KB
MD5109da216e61cf349221bd2455d2170d4
SHA1ea6983b8581b8bb57e47c8492783256313c19480
SHA256a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26
-
Filesize
461KB
MD590bf4c88fc026f9f87b9b4450de312f7
SHA10a5c6523834e78e71cd95a5192311eebced5678d
SHA256fe0caa403b99e102a35932bb849289d20a0febda59c0f64bcb3234693356d2e4
SHA512b581bda6b0c695a3a24589dfa814e9d8e53664521107e62d6dd2424ce5491dd55cf3e928c233961c1f9a8ae009090123789d18e3de5c13a2496dfbc838ee6d9a
-
Filesize
461KB
MD590bf4c88fc026f9f87b9b4450de312f7
SHA10a5c6523834e78e71cd95a5192311eebced5678d
SHA256fe0caa403b99e102a35932bb849289d20a0febda59c0f64bcb3234693356d2e4
SHA512b581bda6b0c695a3a24589dfa814e9d8e53664521107e62d6dd2424ce5491dd55cf3e928c233961c1f9a8ae009090123789d18e3de5c13a2496dfbc838ee6d9a
-
Filesize
461KB
MD590bf4c88fc026f9f87b9b4450de312f7
SHA10a5c6523834e78e71cd95a5192311eebced5678d
SHA256fe0caa403b99e102a35932bb849289d20a0febda59c0f64bcb3234693356d2e4
SHA512b581bda6b0c695a3a24589dfa814e9d8e53664521107e62d6dd2424ce5491dd55cf3e928c233961c1f9a8ae009090123789d18e3de5c13a2496dfbc838ee6d9a
-
Filesize
461KB
MD590bf4c88fc026f9f87b9b4450de312f7
SHA10a5c6523834e78e71cd95a5192311eebced5678d
SHA256fe0caa403b99e102a35932bb849289d20a0febda59c0f64bcb3234693356d2e4
SHA512b581bda6b0c695a3a24589dfa814e9d8e53664521107e62d6dd2424ce5491dd55cf3e928c233961c1f9a8ae009090123789d18e3de5c13a2496dfbc838ee6d9a
-
Filesize
1.1MB
MD5126f20c26c85b936d5037ef92b716345
SHA1d5bc7e819939d6c48a257b9b51cfea6f4c670e2b
SHA2562bf476545025d3cc2a5203c874a657397d3a458dc1f2b2bcc76c417dccf04654
SHA512dc3bcfa7ebc934db0825faa5c58f5780b35a6a46af186687614ee067b8e794ba497636c8f339cb05766693718b3038700667f5825ca8a0ce1b5aaec0370dc4c9
-
Filesize
1.1MB
MD5126f20c26c85b936d5037ef92b716345
SHA1d5bc7e819939d6c48a257b9b51cfea6f4c670e2b
SHA2562bf476545025d3cc2a5203c874a657397d3a458dc1f2b2bcc76c417dccf04654
SHA512dc3bcfa7ebc934db0825faa5c58f5780b35a6a46af186687614ee067b8e794ba497636c8f339cb05766693718b3038700667f5825ca8a0ce1b5aaec0370dc4c9
-
Filesize
934KB
MD52df516e4c43caff1a3685d1d693240bc
SHA1e9ea053f4eeb43aaf370dfa6006c9f40cd0f9a4d
SHA256856344f8a610fd33f49d75cc4a7dc7164c4859da73e799314ad4c913a522e197
SHA512c748e0e54c5caf733c85c66fd81765812fdf7d7cf0ca5d49fbb89220eda334644cf3adaff9f3c039aa1e11d43edfcc01ebb74886a98a187f41b5a0b963f3adf5
-
Filesize
934KB
MD52df516e4c43caff1a3685d1d693240bc
SHA1e9ea053f4eeb43aaf370dfa6006c9f40cd0f9a4d
SHA256856344f8a610fd33f49d75cc4a7dc7164c4859da73e799314ad4c913a522e197
SHA512c748e0e54c5caf733c85c66fd81765812fdf7d7cf0ca5d49fbb89220eda334644cf3adaff9f3c039aa1e11d43edfcc01ebb74886a98a187f41b5a0b963f3adf5
-
Filesize
639KB
MD57ceef82240ac8a06c00c304a91ab88e7
SHA1c2bffc25bc9eec13a2448f97a4fd8a97f934e6bd
SHA256fa1de88c6afb177876d4c3cbd525a0520d5ba57bc317aca686276875c823d0c0
SHA512d93a111726d981fc112619ba43c6dc9c5afaeebf09bb971ea576bf85e9108b420f4d3cc1b24b4e91ff24bd5c013bdc0b6079f3e77d5dc4ebf9e55d7f2ec6a5d7
-
Filesize
639KB
MD57ceef82240ac8a06c00c304a91ab88e7
SHA1c2bffc25bc9eec13a2448f97a4fd8a97f934e6bd
SHA256fa1de88c6afb177876d4c3cbd525a0520d5ba57bc317aca686276875c823d0c0
SHA512d93a111726d981fc112619ba43c6dc9c5afaeebf09bb971ea576bf85e9108b420f4d3cc1b24b4e91ff24bd5c013bdc0b6079f3e77d5dc4ebf9e55d7f2ec6a5d7
-
Filesize
443KB
MD5e5c18d40f8ba057ab5b2e57f262b5759
SHA1c93d0ebb29e959e2f47e215165302707b5bfc01d
SHA256f3e0b5c758f84a5d79034931eb34c5cd6b58f85071db4f0a54cb83c5f3a13e61
SHA5126f8370e7855910aab7b01d4d953e0b8593e2fb4e6f5dc56d757aaf94f978cb9d0f7b9c2e3c3fc611cdcfc4993438d187012270d0ef91511b620d1752d13f3920
-
Filesize
443KB
MD5e5c18d40f8ba057ab5b2e57f262b5759
SHA1c93d0ebb29e959e2f47e215165302707b5bfc01d
SHA256f3e0b5c758f84a5d79034931eb34c5cd6b58f85071db4f0a54cb83c5f3a13e61
SHA5126f8370e7855910aab7b01d4d953e0b8593e2fb4e6f5dc56d757aaf94f978cb9d0f7b9c2e3c3fc611cdcfc4993438d187012270d0ef91511b620d1752d13f3920
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
422KB
MD55b0145d5370910f76539bc32884234bd
SHA15219437e6f35c78cf19df6d1a8e7e6082a0aba87
SHA25663f621c741399a2aefaf2f5674dc85e6f4d7d3c2d69d74aa145d68cb501316c7
SHA512d8e3df308b94430a56dc79e77867b15ae02c35442ba816f627868f000ac89921d103e2491a11439f5b45614280b6a207e66a9af61bf7a3e591bd429b5b244b68
-
Filesize
1.9MB
MD54c7efd165af03d720ce4a9d381bfb29a
SHA192b14564856155487a57db57b8a222b7f57a81e9
SHA256f5bbe3fdc27074249c6860b8959a155e6c79571daa86e7a574656a3c5c6326b8
SHA51238a26722e2669e7432b5a068b08ff852988a26ed875e8aa23156ea4bd0e852686ccabe6e685d5b0e888cb5755cbe424189fb8033ada37994417d3549b10637dd
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
216KB
MD5fd134e455dc6caf3b95e7f4dfefb1550
SHA1bc7fef4d1e9bdb19e79b2d4f0b66ef627e977882
SHA256aadebe52d66f6c135cdccbf672ba6e7797097c830bb6ee11d8523d5de169d82f
SHA512a38dada18974648f2291bc08d6c32b8670a86b856e15a51d9836e832e7c4074ebc31e0f78778c65da49c4d91ac23a23c6a686179c82b6a76ed0096c5e1eb83c4
-
Filesize
216KB
MD5fd134e455dc6caf3b95e7f4dfefb1550
SHA1bc7fef4d1e9bdb19e79b2d4f0b66ef627e977882
SHA256aadebe52d66f6c135cdccbf672ba6e7797097c830bb6ee11d8523d5de169d82f
SHA512a38dada18974648f2291bc08d6c32b8670a86b856e15a51d9836e832e7c4074ebc31e0f78778c65da49c4d91ac23a23c6a686179c82b6a76ed0096c5e1eb83c4