Analysis
-
max time kernel
189s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 06:54
Static task
static1
General
-
Target
93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe
-
Size
11.4MB
-
MD5
de48c29c5a332eefd3f957b1e2023dd3
-
SHA1
d66ef2bf888db92e9d2114fca7b535a7c4d22dbf
-
SHA256
93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed
-
SHA512
803f3dce7d7e62f6a00bed77098cec8eb5cfdd1f748015bcd97d0e5113ce37ab08028d25e11421decda02c5ff1773496cca4ad79d7002fc14f11a62e52236a11
-
SSDEEP
196608:W+Vl3y6ZHYgg8K6RrpICQ9UG8k7StZW4S80UehjyKmFyaculAMhxPuZOof:vVZHYaKorptQ9X7SS4fn8aPAQ2Y
Malware Config
Extracted
smokeloader
up3
Signatures
-
Glupteba payload 14 IoCs
resource yara_rule behavioral1/memory/968-39-0x0000000004780000-0x000000000506B000-memory.dmp family_glupteba behavioral1/memory/968-46-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/968-73-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/968-117-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/968-140-0x0000000004780000-0x000000000506B000-memory.dmp family_glupteba behavioral1/memory/968-201-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/968-239-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1136-276-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1136-287-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1136-350-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1136-467-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1696-499-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1696-545-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba behavioral1/memory/1696-561-0x0000000000400000-0x0000000002663000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 2600 created 3136 2600 latestX.exe 72 PID 2600 created 3136 2600 latestX.exe 72 PID 2600 created 3136 2600 latestX.exe 72 PID 2600 created 3136 2600 latestX.exe 72 PID 2600 created 3136 2600 latestX.exe 72 PID 4904 created 3136 4904 updater.exe 72 PID 4904 created 3136 4904 updater.exe 72 PID 4904 created 3136 4904 updater.exe 72 PID 4904 created 3136 4904 updater.exe 72 PID 4904 created 3136 4904 updater.exe 72 PID 4904 created 3136 4904 updater.exe 72 -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral1/memory/4904-462-0x00007FF7AA960000-0x00007FF7AAF01000-memory.dmp xmrig behavioral1/memory/5076-532-0x00007FF7098F0000-0x00007FF70A0DF000-memory.dmp xmrig behavioral1/memory/5076-550-0x00007FF7098F0000-0x00007FF70A0DF000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5032 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation kos1.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation kos.exe -
Executes dropped EXE 15 IoCs
pid Process 2436 toolspub2.exe 968 e0cbefcb1af40c7d4aff4aca26621a98.exe 4164 kos1.exe 2600 latestX.exe 4840 set16.exe 4912 kos.exe 2504 is-3B28P.tmp 5020 previewer.exe 2380 previewer.exe 4904 updater.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1696 csrss.exe 2716 injector.exe 1324 windefender.exe 3628 windefender.exe -
Loads dropped DLL 3 IoCs
pid Process 2504 is-3B28P.tmp 2504 is-3B28P.tmp 2504 is-3B28P.tmp -
resource yara_rule behavioral1/files/0x0007000000023253-554.dat upx behavioral1/files/0x0007000000023253-556.dat upx behavioral1/files/0x0007000000023253-557.dat upx behavioral1/memory/1324-560-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4904 set thread context of 2528 4904 updater.exe 158 PID 4904 set thread context of 5076 4904 updater.exe 159 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e0cbefcb1af40c7d4aff4aca26621a98.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\PA Previewer\unins000.dat is-3B28P.tmp File created C:\Program Files (x86)\PA Previewer\is-LUTMQ.tmp is-3B28P.tmp File created C:\Program Files (x86)\PA Previewer\is-FQHQ6.tmp is-3B28P.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files (x86)\PA Previewer\is-3KNKA.tmp is-3B28P.tmp File created C:\Program Files (x86)\PA Previewer\is-1P357.tmp is-3B28P.tmp File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-3B28P.tmp File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-3B28P.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss e0cbefcb1af40c7d4aff4aca26621a98.exe File created C:\Windows\rss\csrss.exe e0cbefcb1af40c7d4aff4aca26621a98.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1616 sc.exe 2252 sc.exe 4744 sc.exe 2132 sc.exe 3576 sc.exe 2384 sc.exe 3024 sc.exe 3484 sc.exe 1868 sc.exe 5028 sc.exe 1328 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5092 schtasks.exe 4828 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 powershell.exe 1872 powershell.exe 2600 latestX.exe 2600 latestX.exe 4760 powershell.exe 4760 powershell.exe 2600 latestX.exe 2600 latestX.exe 2600 latestX.exe 2600 latestX.exe 2600 latestX.exe 2600 latestX.exe 4792 powershell.exe 4792 powershell.exe 4792 powershell.exe 2600 latestX.exe 2600 latestX.exe 968 e0cbefcb1af40c7d4aff4aca26621a98.exe 968 e0cbefcb1af40c7d4aff4aca26621a98.exe 2004 powershell.exe 2004 powershell.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 4536 powershell.exe 4536 powershell.exe 4904 updater.exe 4904 updater.exe 3348 powershell.exe 3348 powershell.exe 4600 powershell.exe 4600 powershell.exe 4904 updater.exe 4904 updater.exe 4904 updater.exe 4904 updater.exe 4904 updater.exe 4904 updater.exe 3184 powershell.exe 3184 powershell.exe 4976 powershell.exe 4976 powershell.exe 4904 updater.exe 4904 updater.exe 4904 updater.exe 4904 updater.exe 5076 explorer.exe 5076 explorer.exe 5076 explorer.exe 5076 explorer.exe 4908 powershell.exe 4908 powershell.exe 5076 explorer.exe 5076 explorer.exe 5076 explorer.exe 5076 explorer.exe 5076 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4912 kos.exe Token: SeDebugPrivilege 5020 previewer.exe Token: SeDebugPrivilege 2380 previewer.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeShutdownPrivilege 2288 powercfg.exe Token: SeCreatePagefilePrivilege 2288 powercfg.exe Token: SeShutdownPrivilege 2596 powercfg.exe Token: SeCreatePagefilePrivilege 2596 powercfg.exe Token: SeShutdownPrivilege 4268 powercfg.exe Token: SeCreatePagefilePrivilege 4268 powercfg.exe Token: SeShutdownPrivilege 4240 powercfg.exe Token: SeCreatePagefilePrivilege 4240 powercfg.exe Token: SeIncreaseQuotaPrivilege 4792 powershell.exe Token: SeSecurityPrivilege 4792 powershell.exe Token: SeTakeOwnershipPrivilege 4792 powershell.exe Token: SeLoadDriverPrivilege 4792 powershell.exe Token: SeSystemProfilePrivilege 4792 powershell.exe Token: SeSystemtimePrivilege 4792 powershell.exe Token: SeProfSingleProcessPrivilege 4792 powershell.exe Token: SeIncBasePriorityPrivilege 4792 powershell.exe Token: SeCreatePagefilePrivilege 4792 powershell.exe Token: SeBackupPrivilege 4792 powershell.exe Token: SeRestorePrivilege 4792 powershell.exe Token: SeShutdownPrivilege 4792 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeSystemEnvironmentPrivilege 4792 powershell.exe Token: SeRemoteShutdownPrivilege 4792 powershell.exe Token: SeUndockPrivilege 4792 powershell.exe Token: SeManageVolumePrivilege 4792 powershell.exe Token: 33 4792 powershell.exe Token: 34 4792 powershell.exe Token: 35 4792 powershell.exe Token: 36 4792 powershell.exe Token: SeIncreaseQuotaPrivilege 4792 powershell.exe Token: SeSecurityPrivilege 4792 powershell.exe Token: SeTakeOwnershipPrivilege 4792 powershell.exe Token: SeLoadDriverPrivilege 4792 powershell.exe Token: SeSystemProfilePrivilege 4792 powershell.exe Token: SeSystemtimePrivilege 4792 powershell.exe Token: SeProfSingleProcessPrivilege 4792 powershell.exe Token: SeIncBasePriorityPrivilege 4792 powershell.exe Token: SeCreatePagefilePrivilege 4792 powershell.exe Token: SeBackupPrivilege 4792 powershell.exe Token: SeRestorePrivilege 4792 powershell.exe Token: SeShutdownPrivilege 4792 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeSystemEnvironmentPrivilege 4792 powershell.exe Token: SeRemoteShutdownPrivilege 4792 powershell.exe Token: SeUndockPrivilege 4792 powershell.exe Token: SeManageVolumePrivilege 4792 powershell.exe Token: 33 4792 powershell.exe Token: 34 4792 powershell.exe Token: 35 4792 powershell.exe Token: 36 4792 powershell.exe Token: SeIncreaseQuotaPrivilege 4792 powershell.exe Token: SeSecurityPrivilege 4792 powershell.exe Token: SeTakeOwnershipPrivilege 4792 powershell.exe Token: SeLoadDriverPrivilege 4792 powershell.exe Token: SeSystemProfilePrivilege 4792 powershell.exe Token: SeSystemtimePrivilege 4792 powershell.exe Token: SeProfSingleProcessPrivilege 4792 powershell.exe Token: SeIncBasePriorityPrivilege 4792 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2436 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 88 PID 2528 wrote to memory of 2436 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 88 PID 2528 wrote to memory of 2436 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 88 PID 2528 wrote to memory of 968 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 89 PID 2528 wrote to memory of 968 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 89 PID 2528 wrote to memory of 968 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 89 PID 2528 wrote to memory of 4164 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 90 PID 2528 wrote to memory of 4164 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 90 PID 2528 wrote to memory of 4164 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 90 PID 2528 wrote to memory of 2600 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 91 PID 2528 wrote to memory of 2600 2528 93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe 91 PID 4164 wrote to memory of 4840 4164 kos1.exe 92 PID 4164 wrote to memory of 4840 4164 kos1.exe 92 PID 4164 wrote to memory of 4840 4164 kos1.exe 92 PID 4164 wrote to memory of 4912 4164 kos1.exe 93 PID 4164 wrote to memory of 4912 4164 kos1.exe 93 PID 4840 wrote to memory of 2504 4840 set16.exe 94 PID 4840 wrote to memory of 2504 4840 set16.exe 94 PID 4840 wrote to memory of 2504 4840 set16.exe 94 PID 2504 wrote to memory of 4680 2504 is-3B28P.tmp 97 PID 2504 wrote to memory of 4680 2504 is-3B28P.tmp 97 PID 2504 wrote to memory of 4680 2504 is-3B28P.tmp 97 PID 2504 wrote to memory of 5020 2504 is-3B28P.tmp 99 PID 2504 wrote to memory of 5020 2504 is-3B28P.tmp 99 PID 2504 wrote to memory of 5020 2504 is-3B28P.tmp 99 PID 4680 wrote to memory of 4588 4680 net.exe 101 PID 4680 wrote to memory of 4588 4680 net.exe 101 PID 4680 wrote to memory of 4588 4680 net.exe 101 PID 968 wrote to memory of 1872 968 e0cbefcb1af40c7d4aff4aca26621a98.exe 98 PID 968 wrote to memory of 1872 968 e0cbefcb1af40c7d4aff4aca26621a98.exe 98 PID 968 wrote to memory of 1872 968 e0cbefcb1af40c7d4aff4aca26621a98.exe 98 PID 2504 wrote to memory of 2380 2504 is-3B28P.tmp 106 PID 2504 wrote to memory of 2380 2504 is-3B28P.tmp 106 PID 2504 wrote to memory of 2380 2504 is-3B28P.tmp 106 PID 4992 wrote to memory of 3576 4992 cmd.exe 111 PID 4992 wrote to memory of 3576 4992 cmd.exe 111 PID 4992 wrote to memory of 2384 4992 cmd.exe 112 PID 4992 wrote to memory of 2384 4992 cmd.exe 112 PID 4992 wrote to memory of 3024 4992 cmd.exe 113 PID 4992 wrote to memory of 3024 4992 cmd.exe 113 PID 4992 wrote to memory of 1616 4992 cmd.exe 114 PID 4992 wrote to memory of 1616 4992 cmd.exe 114 PID 4992 wrote to memory of 3484 4992 cmd.exe 115 PID 4992 wrote to memory of 3484 4992 cmd.exe 115 PID 2880 wrote to memory of 2288 2880 cmd.exe 120 PID 2880 wrote to memory of 2288 2880 cmd.exe 120 PID 2880 wrote to memory of 2596 2880 cmd.exe 121 PID 2880 wrote to memory of 2596 2880 cmd.exe 121 PID 2880 wrote to memory of 4268 2880 cmd.exe 122 PID 2880 wrote to memory of 4268 2880 cmd.exe 122 PID 2880 wrote to memory of 4240 2880 cmd.exe 123 PID 2880 wrote to memory of 4240 2880 cmd.exe 123 PID 1136 wrote to memory of 2004 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 129 PID 1136 wrote to memory of 2004 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 129 PID 1136 wrote to memory of 2004 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 129 PID 1136 wrote to memory of 4440 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 131 PID 1136 wrote to memory of 4440 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 131 PID 4440 wrote to memory of 5032 4440 cmd.exe 133 PID 4440 wrote to memory of 5032 4440 cmd.exe 133 PID 1136 wrote to memory of 4536 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 134 PID 1136 wrote to memory of 4536 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 134 PID 1136 wrote to memory of 4536 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 134 PID 1136 wrote to memory of 4600 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 138 PID 1136 wrote to memory of 4600 1136 e0cbefcb1af40c7d4aff4aca26621a98.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe"C:\Users\Admin\AppData\Local\Temp\93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5032
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:1696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5092
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2716
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:3372
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:2132
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\is-5ST8S.tmp\is-3B28P.tmp"C:\Users\Admin\AppData\Local\Temp\is-5ST8S.tmp\is-3B28P.tmp" /SL4 $8011A "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522244⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 85⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 86⤵PID:4588
-
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3136
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3576
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3024
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1616
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3484
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4116
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5028
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1328
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2252
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4744
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3928
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1820
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4736
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1408
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1324
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2528
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:3628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4.1MB
MD53f3622728f4370ea546221a2039b10de
SHA18cd041ac962b1ed90ea56d2f8b25153a1d796c5f
SHA2561e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed
SHA5124d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4
-
Filesize
4.1MB
MD53f3622728f4370ea546221a2039b10de
SHA18cd041ac962b1ed90ea56d2f8b25153a1d796c5f
SHA2561e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed
SHA5124d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4
-
Filesize
4.1MB
MD53f3622728f4370ea546221a2039b10de
SHA18cd041ac962b1ed90ea56d2f8b25153a1d796c5f
SHA2561e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed
SHA5124d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4
-
Filesize
4.1MB
MD53f3622728f4370ea546221a2039b10de
SHA18cd041ac962b1ed90ea56d2f8b25153a1d796c5f
SHA2561e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed
SHA5124d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
213KB
MD592505d71d65f3fd132de5d032d371d63
SHA1a381f472b41aab5f1241f58e522cfe73b36c7a67
SHA2563adc2d21a85e8f73b72c75cf9450a7eb2fe843df24b827a9afe1201316d07944
SHA5124dca261185cdaf561b42e7210e1b3dd7d2eb4832354cbadb6ebbb5da2f07fa3917ddbb1433d19c358587f63483d6e59a1891aa26fb5e33e3c04cd6a353de9cdc
-
Filesize
213KB
MD592505d71d65f3fd132de5d032d371d63
SHA1a381f472b41aab5f1241f58e522cfe73b36c7a67
SHA2563adc2d21a85e8f73b72c75cf9450a7eb2fe843df24b827a9afe1201316d07944
SHA5124dca261185cdaf561b42e7210e1b3dd7d2eb4832354cbadb6ebbb5da2f07fa3917ddbb1433d19c358587f63483d6e59a1891aa26fb5e33e3c04cd6a353de9cdc
-
Filesize
213KB
MD592505d71d65f3fd132de5d032d371d63
SHA1a381f472b41aab5f1241f58e522cfe73b36c7a67
SHA2563adc2d21a85e8f73b72c75cf9450a7eb2fe843df24b827a9afe1201316d07944
SHA5124dca261185cdaf561b42e7210e1b3dd7d2eb4832354cbadb6ebbb5da2f07fa3917ddbb1433d19c358587f63483d6e59a1891aa26fb5e33e3c04cd6a353de9cdc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56c47176daefddee8da4330d11bc9aeb0
SHA112b13c36bcb44e6e904f4b3b106d9b3fbcfd6f18
SHA2560804c5d94e6a360768a344a3283827605d2b499f9ec5165e98719deddd0ba7c6
SHA51233cd531db516df5951382b3a53e7a41ddf5c8d5536a64e43ea40b018301bf94161a5ab694c27bc0d46a339f3c986e98f56f7132e1896b599c1b1cbce54fa6a72
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD592312eab981a7073dd117a9dcf54ad3e
SHA1e4151f41d809530c6a72c9937856d14a4207e271
SHA256c95b881d6ef0c43b1823759ab18aab5ba2021e01a28de0427d88847dd2fab318
SHA512db486bb4a7da60dc2bd534d9542f0e076112b90ffb2b0f500d68db2fffd520ecc7e9ced424baf0e099acdfe6bb0800ef6ed0fa6b535e57774a3949b709ce2d41
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55f9891960ae5a2eefddf99bbbf867a55
SHA1c2a4061adb62b52d39a53b061a96563ef4db8414
SHA256a2bfbb775b51e2ee159fa2037c46aa3d508addd8fb9dff4184d72c6596a289e7
SHA51200a0f3512cd5b331d8fc0dd6abf5430d5ee928be09d50663dcb7b13dde56a1f14bcec5f08b74cee3619918d16e3560bd704edd356a5cd0606c8215e7b420e1d9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50cf6bf06130f69d633ffdfcda2319eb4
SHA131b4bfbff4b4c8cb857ac4acff6cc1661d3f3f3c
SHA25678606175016d4124670fa30166316bd7abae7b7225d4ff4f378fdc21a90f4cac
SHA51218d39b1d430d9e16aefc3b53a730984d9e2bbfd45f172e2425eb738038d76f56c52dba8bc878653e480b27fb30f567528d55e0059aab96cf1333872ac19f1eaa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50148f25f623ef787a29d0717afe69f5b
SHA1fd9bc889c75c4aecacdbe3e285c5f59673944ab4
SHA2563ba9a9609c31c5d8fb868914784ac143eb70846e85aa43d9cfc40ff34a75b7bc
SHA5124e5aa0d8055bd23598732132ca6fc7449487a8e2d331e96a04bf9f9ae4c992bbd9239b58cd28632f22c6a5773c28307a250092e969b04d51e3496aa220f28723
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
4.1MB
MD53f3622728f4370ea546221a2039b10de
SHA18cd041ac962b1ed90ea56d2f8b25153a1d796c5f
SHA2561e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed
SHA5124d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4
-
Filesize
4.1MB
MD53f3622728f4370ea546221a2039b10de
SHA18cd041ac962b1ed90ea56d2f8b25153a1d796c5f
SHA2561e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed
SHA5124d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec