Analysis

  • max time kernel
    125s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 16:38

General

  • Target

    file.exe

  • Size

    240KB

  • MD5

    6ea06d3e97986c035c377223cefe0fb1

  • SHA1

    6ac00da44291aed5832338b2d1792567a7d12924

  • SHA256

    76ab9dacb5fbbce3d4021b4d46622d96d0599af96440989a61c8fe555a3cac33

  • SHA512

    0ec26d1f07968dcfdb810c0e29d5f9f9af1c4cf3c768dbb3d91a080d17605a5d05d25423978eb891dcfe2fc938af02eef2ed1489c7c8f7799af02875fbee451b

  • SSDEEP

    3072:LxBU2lzBjWBuBz10fW2VEiJ9hvC+1Qd26d8kGrf3IT5bAtSDoqRu:PU2NBSBuBzyvrvP1Q4E8kYY5AtSDP

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

http://wirtshauspost.at/tmp/

http://msktk.ru/tmp/

http://soetegem.com/tmp/

http://gromograd.ru/tmp/

http://talesofpirates.net/tmp/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://zexeq.com/raud/get.php

Attributes
  • extension

    .mlrd

  • offline_id

    FjtJkuhRHnUARRt9GnbbgUTa6ErhJq4ZM668xSt1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xN3VuzQl0a Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0805JOsie

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.255.152.132:36011

Extracted

Family

amadey

Version

3.87

C2

http://79.137.192.18/9bDc8sQ/index.php

Attributes
  • install_dir

    577f58beff

  • install_file

    yiueea.exe

  • strings_key

    a5085075a537f09dec81cc154ec0af4d

rc4.plain

Extracted

Family

smokeloader

Botnet

pub1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3164
    • C:\Users\Admin\AppData\Local\Temp\EC15.exe
      C:\Users\Admin\AppData\Local\Temp\EC15.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Local\Temp\EC15.exe
        C:\Users\Admin\AppData\Local\Temp\EC15.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\1f9b3b28-fb05-42d6-b8c4-977b63f6c388" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          4⤵
          • Modifies file permissions
          PID:4012
        • C:\Users\Admin\AppData\Local\Temp\EC15.exe
          "C:\Users\Admin\AppData\Local\Temp\EC15.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4220
          • C:\Users\Admin\AppData\Local\Temp\EC15.exe
            "C:\Users\Admin\AppData\Local\Temp\EC15.exe" --Admin IsNotAutoStart IsNotTask
            5⤵
            • Executes dropped EXE
            PID:1084
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 568
              6⤵
              • Program crash
              PID:4552
    • C:\Users\Admin\AppData\Local\Temp\FAEB.exe
      C:\Users\Admin\AppData\Local\Temp\FAEB.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3980
    • C:\Users\Admin\AppData\Local\Temp\712.exe
      C:\Users\Admin\AppData\Local\Temp\712.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1460
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\F8E.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\F8E.dll
        3⤵
        • Loads dropped DLL
        PID:1368
    • C:\Users\Admin\AppData\Local\Temp\1CFD.exe
      C:\Users\Admin\AppData\Local\Temp\1CFD.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
        "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2224
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3328
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "yiueea.exe" /P "Admin:N"
              5⤵
                PID:952
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "yiueea.exe" /P "Admin:R" /E
                5⤵
                  PID:4108
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\577f58beff" /P "Admin:N"
                  5⤵
                    PID:4804
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:4516
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\577f58beff" /P "Admin:R" /E
                      5⤵
                        PID:3864
                    • C:\Users\Admin\AppData\Local\Temp\1000113001\latestX.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000113001\latestX.exe"
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in Drivers directory
                      • Executes dropped EXE
                      PID:3156
                • C:\Users\Admin\AppData\Local\Temp\21C1.exe
                  C:\Users\Admin\AppData\Local\Temp\21C1.exe
                  2⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:3396
                • C:\Users\Admin\AppData\Local\Temp\2972.exe
                  C:\Users\Admin\AppData\Local\Temp\2972.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1844
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2628
                  • C:\Users\Admin\AppData\Local\Temp\2972.exe
                    "C:\Users\Admin\AppData\Local\Temp\2972.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Modifies data under HKEY_USERS
                    PID:1548
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4648
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      4⤵
                      • Blocklisted process makes network request
                      • Accesses Microsoft Outlook profiles
                      • outlook_office_path
                      • outlook_win_path
                      PID:3136
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        5⤵
                        • Modifies Windows Firewall
                        PID:1568
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2968
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3840
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      4⤵
                        PID:3456
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                            PID:1980
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                            5⤵
                            • Creates scheduled task(s)
                            PID:3280
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /delete /tn ScheduledUpdate /f
                            5⤵
                              PID:3328
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                                PID:3404
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                5⤵
                                  PID:3556
                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                  5⤵
                                    PID:2584
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                    5⤵
                                    • Creates scheduled task(s)
                                    PID:2468
                                    • C:\Windows\System32\Conhost.exe
                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3256
                                  • C:\Windows\windefender.exe
                                    "C:\Windows\windefender.exe"
                                    5⤵
                                      PID:2276
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                        6⤵
                                          PID:2164
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                            7⤵
                                            • Launches sc.exe
                                            PID:880
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  2⤵
                                    PID:3136
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe
                                    2⤵
                                      PID:3892
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2324
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                      2⤵
                                        PID:2248
                                        • C:\Windows\System32\sc.exe
                                          sc stop UsoSvc
                                          3⤵
                                          • Launches sc.exe
                                          PID:4700
                                        • C:\Windows\System32\sc.exe
                                          sc stop WaaSMedicSvc
                                          3⤵
                                          • Launches sc.exe
                                          PID:1968
                                        • C:\Windows\System32\sc.exe
                                          sc stop bits
                                          3⤵
                                          • Launches sc.exe
                                          PID:2444
                                        • C:\Windows\System32\sc.exe
                                          sc stop wuauserv
                                          3⤵
                                          • Launches sc.exe
                                          PID:3508
                                        • C:\Windows\System32\sc.exe
                                          sc stop dosvc
                                          3⤵
                                          • Launches sc.exe
                                          PID:3380
                                      • C:\Windows\System32\cmd.exe
                                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                        2⤵
                                          PID:540
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -hibernate-timeout-ac 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4268
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -hibernate-timeout-dc 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4136
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -standby-timeout-ac 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4588
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -standby-timeout-dc 0
                                            3⤵
                                              PID:3256
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                            2⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3788
                                          • C:\Windows\System32\schtasks.exe
                                            C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                            2⤵
                                              PID:4292
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                              2⤵
                                                PID:3864
                                              • C:\Windows\System32\cmd.exe
                                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                2⤵
                                                  PID:696
                                                  • C:\Windows\System32\sc.exe
                                                    sc stop UsoSvc
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:1544
                                                  • C:\Windows\System32\sc.exe
                                                    sc stop WaaSMedicSvc
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:4132
                                                  • C:\Windows\System32\sc.exe
                                                    sc stop wuauserv
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:4868
                                                  • C:\Windows\System32\sc.exe
                                                    sc stop bits
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:4604
                                                  • C:\Windows\System32\sc.exe
                                                    sc stop dosvc
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:4628
                                                • C:\Windows\System32\cmd.exe
                                                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                  2⤵
                                                    PID:4240
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -hibernate-timeout-ac 0
                                                      3⤵
                                                        PID:2640
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                      2⤵
                                                        PID:3996
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1084 -ip 1084
                                                      1⤵
                                                        PID:3760
                                                      • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
                                                        C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:4528
                                                      • C:\Program Files\Google\Chrome\updater.exe
                                                        "C:\Program Files\Google\Chrome\updater.exe"
                                                        1⤵
                                                          PID:4972
                                                        • C:\Windows\windefender.exe
                                                          C:\Windows\windefender.exe
                                                          1⤵
                                                            PID:2976

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Program Files\Google\Chrome\updater.exe

                                                            Filesize

                                                            5.6MB

                                                            MD5

                                                            bae29e49e8190bfbbf0d77ffab8de59d

                                                            SHA1

                                                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                            SHA256

                                                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                            SHA512

                                                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                          • C:\Users\Admin\AppData\Local\1f9b3b28-fb05-42d6-b8c4-977b63f6c388\EC15.exe

                                                            Filesize

                                                            728KB

                                                            MD5

                                                            b5a49d7c6a9c31248c0676d0fc921967

                                                            SHA1

                                                            e2226592e6cebf82f5de1e76380bbb01291344bb

                                                            SHA256

                                                            e62936b1d28e5d77393275f6075ec71d424568469a2c7b6cec687553aeacfb22

                                                            SHA512

                                                            20f3f6b77bf6fb5c090730410bd110c017a92a9cae407850d9c254491fd0aca2d14ef7c3b94ca112ca6725360d2264188a335addd8c79d4b7ffde0832a0bbe8c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            77d622bb1a5b250869a3238b9bc1402b

                                                            SHA1

                                                            d47f4003c2554b9dfc4c16f22460b331886b191b

                                                            SHA256

                                                            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                            SHA512

                                                            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                          • C:\Users\Admin\AppData\Local\Temp\1000113001\latestX.exe

                                                            Filesize

                                                            5.6MB

                                                            MD5

                                                            bae29e49e8190bfbbf0d77ffab8de59d

                                                            SHA1

                                                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                            SHA256

                                                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                            SHA512

                                                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                          • C:\Users\Admin\AppData\Local\Temp\1000113001\latestX.exe

                                                            Filesize

                                                            5.6MB

                                                            MD5

                                                            bae29e49e8190bfbbf0d77ffab8de59d

                                                            SHA1

                                                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                            SHA256

                                                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                            SHA512

                                                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                          • C:\Users\Admin\AppData\Local\Temp\1000113001\latestX.exe

                                                            Filesize

                                                            5.6MB

                                                            MD5

                                                            bae29e49e8190bfbbf0d77ffab8de59d

                                                            SHA1

                                                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                            SHA256

                                                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                            SHA512

                                                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                            Filesize

                                                            196B

                                                            MD5

                                                            62962daa1b19bbcc2db10b7bfd531ea6

                                                            SHA1

                                                            d64bae91091eda6a7532ebec06aa70893b79e1f8

                                                            SHA256

                                                            80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880

                                                            SHA512

                                                            9002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7

                                                          • C:\Users\Admin\AppData\Local\Temp\1CFD.exe

                                                            Filesize

                                                            307KB

                                                            MD5

                                                            55f845c433e637594aaf872e41fda207

                                                            SHA1

                                                            1188348ca7e52f075e7d1d0031918c2cea93362e

                                                            SHA256

                                                            f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                                                            SHA512

                                                            5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                                                          • C:\Users\Admin\AppData\Local\Temp\1CFD.exe

                                                            Filesize

                                                            307KB

                                                            MD5

                                                            55f845c433e637594aaf872e41fda207

                                                            SHA1

                                                            1188348ca7e52f075e7d1d0031918c2cea93362e

                                                            SHA256

                                                            f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                                                            SHA512

                                                            5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                                                          • C:\Users\Admin\AppData\Local\Temp\21C1.exe

                                                            Filesize

                                                            241KB

                                                            MD5

                                                            6c84a2f6e63040ecf96c202f85cf290c

                                                            SHA1

                                                            a30687935565e329b05415e92e67011ba8000b06

                                                            SHA256

                                                            d6bad0f9a8d2a23f8249cc64a8304b9b02c5f76db93c25ddf85ff12c52377c5b

                                                            SHA512

                                                            ec68e92b767cbd099d6cb309a7844c0c487883ca2b4fde089266cb3fdfb0d2d39cfeb3ea974ea1387261851cbfc0d1aa21f6332e5223d31e9f39428ff694a89d

                                                          • C:\Users\Admin\AppData\Local\Temp\21C1.exe

                                                            Filesize

                                                            241KB

                                                            MD5

                                                            6c84a2f6e63040ecf96c202f85cf290c

                                                            SHA1

                                                            a30687935565e329b05415e92e67011ba8000b06

                                                            SHA256

                                                            d6bad0f9a8d2a23f8249cc64a8304b9b02c5f76db93c25ddf85ff12c52377c5b

                                                            SHA512

                                                            ec68e92b767cbd099d6cb309a7844c0c487883ca2b4fde089266cb3fdfb0d2d39cfeb3ea974ea1387261851cbfc0d1aa21f6332e5223d31e9f39428ff694a89d

                                                          • C:\Users\Admin\AppData\Local\Temp\2972.exe

                                                            Filesize

                                                            4.1MB

                                                            MD5

                                                            f0118fdfcadf8262c58b3638c0edc6a9

                                                            SHA1

                                                            a10b96bfc56711c9d605a0b61cca01b4ba6b6658

                                                            SHA256

                                                            8e380777da39ad7a588f4d9b703adc18b4ba935c21b17f215a3da5792672f205

                                                            SHA512

                                                            99ac5c4de20e47e8c355e9852061cb1ef25a44a5ef20cc0dd6187d13676a1cd7dd8a44cffa9462715bff3c7c7268814afe9fffb9b664f3e2cef3595a6b148837

                                                          • C:\Users\Admin\AppData\Local\Temp\2972.exe

                                                            Filesize

                                                            4.1MB

                                                            MD5

                                                            f0118fdfcadf8262c58b3638c0edc6a9

                                                            SHA1

                                                            a10b96bfc56711c9d605a0b61cca01b4ba6b6658

                                                            SHA256

                                                            8e380777da39ad7a588f4d9b703adc18b4ba935c21b17f215a3da5792672f205

                                                            SHA512

                                                            99ac5c4de20e47e8c355e9852061cb1ef25a44a5ef20cc0dd6187d13676a1cd7dd8a44cffa9462715bff3c7c7268814afe9fffb9b664f3e2cef3595a6b148837

                                                          • C:\Users\Admin\AppData\Local\Temp\2972.exe

                                                            Filesize

                                                            4.1MB

                                                            MD5

                                                            f0118fdfcadf8262c58b3638c0edc6a9

                                                            SHA1

                                                            a10b96bfc56711c9d605a0b61cca01b4ba6b6658

                                                            SHA256

                                                            8e380777da39ad7a588f4d9b703adc18b4ba935c21b17f215a3da5792672f205

                                                            SHA512

                                                            99ac5c4de20e47e8c355e9852061cb1ef25a44a5ef20cc0dd6187d13676a1cd7dd8a44cffa9462715bff3c7c7268814afe9fffb9b664f3e2cef3595a6b148837

                                                          • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                                                            Filesize

                                                            307KB

                                                            MD5

                                                            55f845c433e637594aaf872e41fda207

                                                            SHA1

                                                            1188348ca7e52f075e7d1d0031918c2cea93362e

                                                            SHA256

                                                            f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                                                            SHA512

                                                            5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                                                          • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                                                            Filesize

                                                            307KB

                                                            MD5

                                                            55f845c433e637594aaf872e41fda207

                                                            SHA1

                                                            1188348ca7e52f075e7d1d0031918c2cea93362e

                                                            SHA256

                                                            f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                                                            SHA512

                                                            5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                                                          • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                                                            Filesize

                                                            307KB

                                                            MD5

                                                            55f845c433e637594aaf872e41fda207

                                                            SHA1

                                                            1188348ca7e52f075e7d1d0031918c2cea93362e

                                                            SHA256

                                                            f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                                                            SHA512

                                                            5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                                                          • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                                                            Filesize

                                                            307KB

                                                            MD5

                                                            55f845c433e637594aaf872e41fda207

                                                            SHA1

                                                            1188348ca7e52f075e7d1d0031918c2cea93362e

                                                            SHA256

                                                            f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                                                            SHA512

                                                            5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                                                          • C:\Users\Admin\AppData\Local\Temp\712.exe

                                                            Filesize

                                                            8.9MB

                                                            MD5

                                                            22b5ba8e29ad46aea74520369763650a

                                                            SHA1

                                                            5477b1f2384bc99e50cf8414c6adfe2e9c0ab2ec

                                                            SHA256

                                                            ebd8083f3e802cac490686d05a3fe08e2305a6657a9af5ef38fe772496f621ec

                                                            SHA512

                                                            38cb42bbb50a3aca19c3af8af01bf5d46e27841f50df2fc421183550daad6b65f91c3e454705a9e3ad9706a198c7bd928d6e2d1487a369cd7d3788e547e6eead

                                                          • C:\Users\Admin\AppData\Local\Temp\EC15.exe

                                                            Filesize

                                                            728KB

                                                            MD5

                                                            b5a49d7c6a9c31248c0676d0fc921967

                                                            SHA1

                                                            e2226592e6cebf82f5de1e76380bbb01291344bb

                                                            SHA256

                                                            e62936b1d28e5d77393275f6075ec71d424568469a2c7b6cec687553aeacfb22

                                                            SHA512

                                                            20f3f6b77bf6fb5c090730410bd110c017a92a9cae407850d9c254491fd0aca2d14ef7c3b94ca112ca6725360d2264188a335addd8c79d4b7ffde0832a0bbe8c

                                                          • C:\Users\Admin\AppData\Local\Temp\EC15.exe

                                                            Filesize

                                                            728KB

                                                            MD5

                                                            b5a49d7c6a9c31248c0676d0fc921967

                                                            SHA1

                                                            e2226592e6cebf82f5de1e76380bbb01291344bb

                                                            SHA256

                                                            e62936b1d28e5d77393275f6075ec71d424568469a2c7b6cec687553aeacfb22

                                                            SHA512

                                                            20f3f6b77bf6fb5c090730410bd110c017a92a9cae407850d9c254491fd0aca2d14ef7c3b94ca112ca6725360d2264188a335addd8c79d4b7ffde0832a0bbe8c

                                                          • C:\Users\Admin\AppData\Local\Temp\EC15.exe

                                                            Filesize

                                                            728KB

                                                            MD5

                                                            b5a49d7c6a9c31248c0676d0fc921967

                                                            SHA1

                                                            e2226592e6cebf82f5de1e76380bbb01291344bb

                                                            SHA256

                                                            e62936b1d28e5d77393275f6075ec71d424568469a2c7b6cec687553aeacfb22

                                                            SHA512

                                                            20f3f6b77bf6fb5c090730410bd110c017a92a9cae407850d9c254491fd0aca2d14ef7c3b94ca112ca6725360d2264188a335addd8c79d4b7ffde0832a0bbe8c

                                                          • C:\Users\Admin\AppData\Local\Temp\EC15.exe

                                                            Filesize

                                                            728KB

                                                            MD5

                                                            b5a49d7c6a9c31248c0676d0fc921967

                                                            SHA1

                                                            e2226592e6cebf82f5de1e76380bbb01291344bb

                                                            SHA256

                                                            e62936b1d28e5d77393275f6075ec71d424568469a2c7b6cec687553aeacfb22

                                                            SHA512

                                                            20f3f6b77bf6fb5c090730410bd110c017a92a9cae407850d9c254491fd0aca2d14ef7c3b94ca112ca6725360d2264188a335addd8c79d4b7ffde0832a0bbe8c

                                                          • C:\Users\Admin\AppData\Local\Temp\EC15.exe

                                                            Filesize

                                                            728KB

                                                            MD5

                                                            b5a49d7c6a9c31248c0676d0fc921967

                                                            SHA1

                                                            e2226592e6cebf82f5de1e76380bbb01291344bb

                                                            SHA256

                                                            e62936b1d28e5d77393275f6075ec71d424568469a2c7b6cec687553aeacfb22

                                                            SHA512

                                                            20f3f6b77bf6fb5c090730410bd110c017a92a9cae407850d9c254491fd0aca2d14ef7c3b94ca112ca6725360d2264188a335addd8c79d4b7ffde0832a0bbe8c

                                                          • C:\Users\Admin\AppData\Local\Temp\F8E.dll

                                                            Filesize

                                                            2.3MB

                                                            MD5

                                                            55f1c499b31e58a29f6dacea7580fb69

                                                            SHA1

                                                            c6e5c6a4bb84374a6b172e8eb0c43aaab5423e1a

                                                            SHA256

                                                            b2fadb2f33351919a782043b2898b201b7420fd1d57800a1d144710156640854

                                                            SHA512

                                                            9c2f2189e686e05585c6afef0cb4608b5c81ec89f48b992c600fa95ede32a51dc1ee53df518f97b3fb1c8c096adbc3534562f3d6af921bd9b1781fa9dd7786e1

                                                          • C:\Users\Admin\AppData\Local\Temp\F8E.dll

                                                            Filesize

                                                            2.3MB

                                                            MD5

                                                            55f1c499b31e58a29f6dacea7580fb69

                                                            SHA1

                                                            c6e5c6a4bb84374a6b172e8eb0c43aaab5423e1a

                                                            SHA256

                                                            b2fadb2f33351919a782043b2898b201b7420fd1d57800a1d144710156640854

                                                            SHA512

                                                            9c2f2189e686e05585c6afef0cb4608b5c81ec89f48b992c600fa95ede32a51dc1ee53df518f97b3fb1c8c096adbc3534562f3d6af921bd9b1781fa9dd7786e1

                                                          • C:\Users\Admin\AppData\Local\Temp\FAEB.exe

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            5b293206e810d2871736e1ecbd9cc196

                                                            SHA1

                                                            47c0baadfba1876cb8ffdff6f057f16f2076197f

                                                            SHA256

                                                            f31ce717ef107b5c0901a0c8581553b71ad7a09180e28a1575b0955905519628

                                                            SHA512

                                                            110ae30f84747fb35cc75f6b2608aea5f90f25c3b2c49105deedc121d2ab8036949f58acc3d436b5d4584c9c1a7a30bac74f501b786f4e71d6414950d19fbb32

                                                          • C:\Users\Admin\AppData\Local\Temp\FAEB.exe

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            5b293206e810d2871736e1ecbd9cc196

                                                            SHA1

                                                            47c0baadfba1876cb8ffdff6f057f16f2076197f

                                                            SHA256

                                                            f31ce717ef107b5c0901a0c8581553b71ad7a09180e28a1575b0955905519628

                                                            SHA512

                                                            110ae30f84747fb35cc75f6b2608aea5f90f25c3b2c49105deedc121d2ab8036949f58acc3d436b5d4584c9c1a7a30bac74f501b786f4e71d6414950d19fbb32

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3dtc4kny.cz0.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                            Filesize

                                                            281KB

                                                            MD5

                                                            d98e33b66343e7c96158444127a117f6

                                                            SHA1

                                                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                            SHA256

                                                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                            SHA512

                                                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                            Filesize

                                                            281KB

                                                            MD5

                                                            d98e33b66343e7c96158444127a117f6

                                                            SHA1

                                                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                            SHA256

                                                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                            SHA512

                                                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                          • C:\Users\Admin\AppData\Roaming\adrjjaf

                                                            Filesize

                                                            241KB

                                                            MD5

                                                            6c84a2f6e63040ecf96c202f85cf290c

                                                            SHA1

                                                            a30687935565e329b05415e92e67011ba8000b06

                                                            SHA256

                                                            d6bad0f9a8d2a23f8249cc64a8304b9b02c5f76db93c25ddf85ff12c52377c5b

                                                            SHA512

                                                            ec68e92b767cbd099d6cb309a7844c0c487883ca2b4fde089266cb3fdfb0d2d39cfeb3ea974ea1387261851cbfc0d1aa21f6332e5223d31e9f39428ff694a89d

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            968cb9309758126772781b83adb8a28f

                                                            SHA1

                                                            8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                            SHA256

                                                            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                            SHA512

                                                            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            ec7462c63a74c95ce399339ed95ff625

                                                            SHA1

                                                            d27e41836fbcbfb9364def146ed1cc913858caae

                                                            SHA256

                                                            8fe37d8e0f3ab1672d55cac29fc756425a50156cc8467d36a3990dac1823de73

                                                            SHA512

                                                            928381988c1b9a7725dfe3f8df74345abde105e18b9262f7fc4813f2715ccd7139fc4fda9cc34eb026a1aef169e090ce3fc97565479819800fa3819117e28025

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            e1ac5db09fffd53004e22afc227bad30

                                                            SHA1

                                                            65ddd07a70eba071a3089308534f5332f24c9973

                                                            SHA256

                                                            046723e2e5ce40cafee634220080495146bbe947f78922affcde81ccd428b7b4

                                                            SHA512

                                                            6fa776919d9989074ee259d964ba2e9976206f482d0802979227b6b36038fe5c79260ce3abd81a5af94fef4580f6c265af627f31293d8273e4ac0539ee73e9fe

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            d54631da3208e766a6ef6d811133ac8b

                                                            SHA1

                                                            f9da794d1ad2d5b3e2210d788f14abd92182f125

                                                            SHA256

                                                            4b8a273789583d47f02b9beb22ade61ced5376e2aadbe70b1a4b1e5b3c4c4312

                                                            SHA512

                                                            ce83139826901c7ad1f7d06081513f8d4b24a49a836ccfc2f9d9da4cff1750e48954ff57b6e6637b3e7f9c363e7708ab3fbd5724ac3be773ac0ed38887a0e64b

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            6031ff292a6a0ba2ebde11b6e08e02e5

                                                            SHA1

                                                            91b918bd4c775bb13552a6a931f87b0cd7935bb8

                                                            SHA256

                                                            48fbe3829c357f0ec15c387d708e3a142443677f58af882d5fc28942df2980d4

                                                            SHA512

                                                            8b97261020ea110923576f66d7bb72859922db83277fb72e2251aed751ddcc7f493646daf5977b0a6048dae43e857e09b71b329f3badc08e1c0ccad558679ae0

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            50e387229e951e21f8577b572d80ef8a

                                                            SHA1

                                                            8a3b44921022883e6f73a115328003662c648ae9

                                                            SHA256

                                                            ba4b408a3f3ce424f234cb5d4a7d692ec20973ff29ba7e6e202a4c141752d7b6

                                                            SHA512

                                                            e8036d32cf8ad2ba16fcf9dff485fd50c46c4807c53067072198f2ed0516f5257bf488090c1e5d7087b72316df673653e5d815e170397cf856b67f27643c7bed

                                                          • C:\Windows\System32\drivers\etc\hosts

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            00930b40cba79465b7a38ed0449d1449

                                                            SHA1

                                                            4b25a89ee28b20ba162f23772ddaf017669092a5

                                                            SHA256

                                                            eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                                            SHA512

                                                            cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                                          • C:\Windows\rss\csrss.exe

                                                            Filesize

                                                            4.1MB

                                                            MD5

                                                            f0118fdfcadf8262c58b3638c0edc6a9

                                                            SHA1

                                                            a10b96bfc56711c9d605a0b61cca01b4ba6b6658

                                                            SHA256

                                                            8e380777da39ad7a588f4d9b703adc18b4ba935c21b17f215a3da5792672f205

                                                            SHA512

                                                            99ac5c4de20e47e8c355e9852061cb1ef25a44a5ef20cc0dd6187d13676a1cd7dd8a44cffa9462715bff3c7c7268814afe9fffb9b664f3e2cef3595a6b148837

                                                          • C:\Windows\rss\csrss.exe

                                                            Filesize

                                                            4.1MB

                                                            MD5

                                                            f0118fdfcadf8262c58b3638c0edc6a9

                                                            SHA1

                                                            a10b96bfc56711c9d605a0b61cca01b4ba6b6658

                                                            SHA256

                                                            8e380777da39ad7a588f4d9b703adc18b4ba935c21b17f215a3da5792672f205

                                                            SHA512

                                                            99ac5c4de20e47e8c355e9852061cb1ef25a44a5ef20cc0dd6187d13676a1cd7dd8a44cffa9462715bff3c7c7268814afe9fffb9b664f3e2cef3595a6b148837

                                                          • C:\Windows\windefender.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8e67f58837092385dcf01e8a2b4f5783

                                                            SHA1

                                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                            SHA256

                                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                            SHA512

                                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                          • C:\Windows\windefender.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8e67f58837092385dcf01e8a2b4f5783

                                                            SHA1

                                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                            SHA256

                                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                            SHA512

                                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                          • C:\Windows\windefender.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8e67f58837092385dcf01e8a2b4f5783

                                                            SHA1

                                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                            SHA256

                                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                            SHA512

                                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                          • memory/1084-122-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/1084-121-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/1084-126-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/1368-138-0x0000000003100000-0x0000000003201000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/1368-125-0x0000000002FE0000-0x00000000030FB000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/1368-152-0x0000000003100000-0x0000000003201000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/1368-137-0x0000000003100000-0x0000000003201000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/1368-81-0x0000000010000000-0x0000000010251000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/1368-140-0x0000000003100000-0x0000000003201000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/1368-82-0x0000000002B20000-0x0000000002B26000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/1460-153-0x00007FF7612D0000-0x00007FF761C21000-memory.dmp

                                                            Filesize

                                                            9.3MB

                                                          • memory/1460-212-0x00007FF7612D0000-0x00007FF761C21000-memory.dmp

                                                            Filesize

                                                            9.3MB

                                                          • memory/1460-266-0x00007FF7612D0000-0x00007FF761C21000-memory.dmp

                                                            Filesize

                                                            9.3MB

                                                          • memory/1460-310-0x00007FF7612D0000-0x00007FF761C21000-memory.dmp

                                                            Filesize

                                                            9.3MB

                                                          • memory/1548-356-0x0000000000400000-0x0000000002FB8000-memory.dmp

                                                            Filesize

                                                            43.7MB

                                                          • memory/1844-150-0x0000000000400000-0x0000000002FB8000-memory.dmp

                                                            Filesize

                                                            43.7MB

                                                          • memory/1844-136-0x0000000004FF0000-0x00000000058DB000-memory.dmp

                                                            Filesize

                                                            8.9MB

                                                          • memory/1844-135-0x0000000004BF0000-0x0000000004FF0000-memory.dmp

                                                            Filesize

                                                            4.0MB

                                                          • memory/1844-205-0x0000000004BF0000-0x0000000004FF0000-memory.dmp

                                                            Filesize

                                                            4.0MB

                                                          • memory/1844-208-0x0000000000400000-0x0000000002FB8000-memory.dmp

                                                            Filesize

                                                            43.7MB

                                                          • memory/1844-255-0x0000000000400000-0x0000000002FB8000-memory.dmp

                                                            Filesize

                                                            43.7MB

                                                          • memory/1844-333-0x0000000000400000-0x0000000002FB8000-memory.dmp

                                                            Filesize

                                                            43.7MB

                                                          • memory/2628-215-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/2628-216-0x0000000005CB0000-0x0000000005D16000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/2628-204-0x0000000073880000-0x0000000074030000-memory.dmp

                                                            Filesize

                                                            7.7MB

                                                          • memory/2628-206-0x0000000002D10000-0x0000000002D20000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/2628-207-0x0000000004D80000-0x0000000004DB6000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/2628-211-0x00000000053F0000-0x0000000005A18000-memory.dmp

                                                            Filesize

                                                            6.2MB

                                                          • memory/2628-214-0x0000000005BA0000-0x0000000005BC2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/2628-232-0x0000000002D10000-0x0000000002D20000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/2628-231-0x0000000073880000-0x0000000074030000-memory.dmp

                                                            Filesize

                                                            7.7MB

                                                          • memory/2628-228-0x00000000068A0000-0x00000000068E4000-memory.dmp

                                                            Filesize

                                                            272KB

                                                          • memory/2628-227-0x0000000006330000-0x000000000634E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/2628-226-0x0000000005E20000-0x0000000006174000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/3048-65-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3048-103-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3048-67-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3048-63-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3048-61-0x0000000000400000-0x0000000000537000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3136-202-0x0000000000C30000-0x0000000000C9B000-memory.dmp

                                                            Filesize

                                                            428KB

                                                          • memory/3136-157-0x0000000000C30000-0x0000000000C9B000-memory.dmp

                                                            Filesize

                                                            428KB

                                                          • memory/3136-160-0x0000000000C30000-0x0000000000C9B000-memory.dmp

                                                            Filesize

                                                            428KB

                                                          • memory/3136-159-0x0000000000CA0000-0x0000000000D15000-memory.dmp

                                                            Filesize

                                                            468KB

                                                          • memory/3156-213-0x00007FF6D5B70000-0x00007FF6D6111000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/3164-8-0x0000000000640000-0x000000000064B000-memory.dmp

                                                            Filesize

                                                            44KB

                                                          • memory/3164-2-0x0000000000640000-0x000000000064B000-memory.dmp

                                                            Filesize

                                                            44KB

                                                          • memory/3164-3-0x0000000000400000-0x00000000005B3000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/3164-5-0x0000000000400000-0x00000000005B3000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/3164-1-0x00000000006E0000-0x00000000007E0000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/3184-23-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-372-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-4-0x0000000002F90000-0x0000000002FA6000-memory.dmp

                                                            Filesize

                                                            88KB

                                                          • memory/3184-9-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-43-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-40-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-166-0x00000000032D0000-0x00000000032E6000-memory.dmp

                                                            Filesize

                                                            88KB

                                                          • memory/3184-10-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-39-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-37-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-11-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-44-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-12-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-38-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-13-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-14-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-36-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-15-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-35-0x0000000003440000-0x0000000003450000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-17-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-19-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-20-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-42-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-34-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-360-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-358-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-21-0x0000000003440000-0x0000000003450000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-357-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-22-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-33-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-31-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-28-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-29-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-27-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-24-0x0000000003440000-0x0000000003450000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3184-25-0x0000000003410000-0x0000000003420000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3396-113-0x00000000007E0000-0x00000000008E0000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/3396-117-0x0000000000400000-0x00000000005B3000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/3396-114-0x0000000000640000-0x000000000064B000-memory.dmp

                                                            Filesize

                                                            44KB

                                                          • memory/3396-172-0x0000000000400000-0x00000000005B3000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/3892-147-0x0000000000C30000-0x0000000000C3C000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/3892-151-0x0000000000C30000-0x0000000000C3C000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/3916-309-0x00000000007A0000-0x00000000007FA000-memory.dmp

                                                            Filesize

                                                            360KB

                                                          • memory/3980-71-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/3980-98-0x0000000007830000-0x0000000007840000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3980-80-0x0000000073880000-0x0000000074030000-memory.dmp

                                                            Filesize

                                                            7.7MB

                                                          • memory/3980-86-0x0000000007D70000-0x0000000008314000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/3980-123-0x0000000007B50000-0x0000000007B8C000-memory.dmp

                                                            Filesize

                                                            240KB

                                                          • memory/3980-134-0x0000000073880000-0x0000000074030000-memory.dmp

                                                            Filesize

                                                            7.7MB

                                                          • memory/3980-112-0x0000000008940000-0x0000000008F58000-memory.dmp

                                                            Filesize

                                                            6.1MB

                                                          • memory/3980-119-0x0000000007AF0000-0x0000000007B02000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3980-198-0x0000000007830000-0x0000000007840000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3980-88-0x0000000007860000-0x00000000078F2000-memory.dmp

                                                            Filesize

                                                            584KB

                                                          • memory/3980-127-0x0000000007CD0000-0x0000000007D1C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/3980-115-0x0000000007BC0000-0x0000000007CCA000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/3980-102-0x0000000007A20000-0x0000000007A2A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/4220-116-0x00000000047B0000-0x000000000484E000-memory.dmp

                                                            Filesize

                                                            632KB

                                                          • memory/4432-56-0x00000000047A0000-0x000000000483A000-memory.dmp

                                                            Filesize

                                                            616KB

                                                          • memory/4432-57-0x0000000004990000-0x0000000004AAB000-memory.dmp

                                                            Filesize

                                                            1.1MB