Analysis

  • max time kernel
    118s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-11-2023 19:24

General

  • Target

    9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe

  • Size

    1.4MB

  • MD5

    027c772d551e44636ad61f38c2d73131

  • SHA1

    798e7b6eebc2cb35e2abb3291374b292080bd643

  • SHA256

    9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9

  • SHA512

    4959beb25c705819bde2f72b2f8216cbecbb8eefcf0b3ca43d1d0de9ab698b2e7db2bf63d00dd0fe25fd39eb8c5b23d064b45a71d5ef12ca5c3e7974d6de96b7

  • SSDEEP

    24576:ZywIj0CVunxV79Qd9yA7A+4w0gIQAVOBTeFr1IH272vTAAjHqxYgRR6rCvhVF:Mp9yy71AVOZav6TECW

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

pixelfresh

C2

194.49.94.11:80

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • .NET Reactor proctector 19 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 9 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 12 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe
      "C:\Users\Admin\AppData\Local\Temp\9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vn4fk12.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vn4fk12.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eq3St12.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eq3St12.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3484
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ej3685.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ej3685.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3908
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2712
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:3948
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Fh495aL.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Fh495aL.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1708
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:4848
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                      PID:5036
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      6⤵
                        PID:3896
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Sb7qh5.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Sb7qh5.exe
                    4⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:712
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qR7eS6.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qR7eS6.exe
                  3⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Executes dropped EXE
                  • Windows security modification
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2812
              • C:\Users\Admin\AppData\Local\Temp\1911.exe
                C:\Users\Admin\AppData\Local\Temp\1911.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:432
                • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe
                  "C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:196
                  • C:\Users\Admin\AppData\Local\Temp\Broom.exe
                    C:\Users\Admin\AppData\Local\Temp\Broom.exe
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2320
                • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                  "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2764
                  • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                    "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                    4⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: MapViewOfSection
                    PID:4472
                • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
                  "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4876
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    4⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3536
                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
                    "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
                    4⤵
                    • Windows security bypass
                    • Executes dropped EXE
                    • Windows security modification
                    • Adds Run key to start application
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:1276
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:3100
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      5⤵
                        PID:4628
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          6⤵
                          • Modifies Windows Firewall
                          • Modifies data under HKEY_USERS
                          PID:3224
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:528
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:2536
                      • C:\Windows\rss\csrss.exe
                        C:\Windows\rss\csrss.exe
                        5⤵
                        • Executes dropped EXE
                        PID:820
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:4652
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          6⤵
                          • Creates scheduled task(s)
                          PID:4820
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /delete /tn ScheduledUpdate /f
                          6⤵
                            PID:4832
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                              PID:3636
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                                PID:1400
                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                6⤵
                                  PID:4648
                                • C:\Windows\SYSTEM32\schtasks.exe
                                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                  6⤵
                                  • Creates scheduled task(s)
                                  PID:1040
                                • C:\Windows\windefender.exe
                                  "C:\Windows\windefender.exe"
                                  6⤵
                                    PID:2072
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                      7⤵
                                        PID:3988
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                          8⤵
                                          • Launches sc.exe
                                          PID:4804
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                      6⤵
                                        PID:2000
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                          7⤵
                                          • Launches sc.exe
                                          PID:4620
                                • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                                  "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                                  3⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Drops file in Drivers directory
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  PID:1536
                              • C:\Users\Admin\AppData\Local\Temp\1AF6.exe
                                C:\Users\Admin\AppData\Local\Temp\1AF6.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2576
                              • C:\Users\Admin\AppData\Local\Temp\1CFB.exe
                                C:\Users\Admin\AppData\Local\Temp\1CFB.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4620
                              • C:\Users\Admin\AppData\Local\Temp\2316.exe
                                C:\Users\Admin\AppData\Local\Temp\2316.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4428
                              • C:\Users\Admin\AppData\Local\Temp\96A2.exe
                                C:\Users\Admin\AppData\Local\Temp\96A2.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:4184
                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
                                  3⤵
                                    PID:3748
                                • C:\Users\Admin\AppData\Local\Temp\9A1D.exe
                                  C:\Users\Admin\AppData\Local\Temp\9A1D.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:524
                                  • C:\Users\Admin\AppData\Local\Temp\9A1D.exe
                                    C:\Users\Admin\AppData\Local\Temp\9A1D.exe
                                    3⤵
                                    • Executes dropped EXE
                                    PID:3560
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  2⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:224
                                • C:\Windows\System32\cmd.exe
                                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  2⤵
                                    PID:652
                                    • C:\Windows\System32\sc.exe
                                      sc stop UsoSvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:2764
                                    • C:\Windows\System32\sc.exe
                                      sc stop WaaSMedicSvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:1728
                                    • C:\Windows\System32\sc.exe
                                      sc stop wuauserv
                                      3⤵
                                      • Launches sc.exe
                                      PID:4516
                                    • C:\Windows\System32\sc.exe
                                      sc stop bits
                                      3⤵
                                      • Launches sc.exe
                                      PID:3032
                                    • C:\Windows\System32\sc.exe
                                      sc stop dosvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:1664
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                    2⤵
                                      PID:520
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                      2⤵
                                        PID:4556
                                        • C:\Windows\System32\powercfg.exe
                                          powercfg /x -hibernate-timeout-ac 0
                                          3⤵
                                            PID:4420
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -hibernate-timeout-dc 0
                                            3⤵
                                              PID:96
                                            • C:\Windows\System32\powercfg.exe
                                              powercfg /x -standby-timeout-ac 0
                                              3⤵
                                                PID:1824
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -standby-timeout-dc 0
                                                3⤵
                                                  PID:3300
                                              • C:\Windows\System32\schtasks.exe
                                                C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                2⤵
                                                  PID:2480
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                  2⤵
                                                    PID:3156
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                    2⤵
                                                      PID:4232
                                                      • C:\Windows\System32\sc.exe
                                                        sc stop UsoSvc
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:5020
                                                      • C:\Windows\System32\sc.exe
                                                        sc stop WaaSMedicSvc
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:304
                                                      • C:\Windows\System32\sc.exe
                                                        sc stop wuauserv
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:2952
                                                      • C:\Windows\System32\sc.exe
                                                        sc stop bits
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:344
                                                      • C:\Windows\System32\sc.exe
                                                        sc stop dosvc
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:2076
                                                    • C:\Windows\System32\cmd.exe
                                                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                      2⤵
                                                        PID:1660
                                                        • C:\Windows\System32\powercfg.exe
                                                          powercfg /x -hibernate-timeout-ac 0
                                                          3⤵
                                                            PID:1468
                                                          • C:\Windows\System32\powercfg.exe
                                                            powercfg /x -hibernate-timeout-dc 0
                                                            3⤵
                                                              PID:2216
                                                            • C:\Windows\System32\powercfg.exe
                                                              powercfg /x -standby-timeout-ac 0
                                                              3⤵
                                                                PID:4092
                                                              • C:\Windows\System32\powercfg.exe
                                                                powercfg /x -standby-timeout-dc 0
                                                                3⤵
                                                                  PID:5080
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                2⤵
                                                                  PID:2820
                                                              • C:\Program Files\Google\Chrome\updater.exe
                                                                "C:\Program Files\Google\Chrome\updater.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:4628
                                                              • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"
                                                                1⤵
                                                                  PID:4424
                                                                • C:\Windows\windefender.exe
                                                                  C:\Windows\windefender.exe
                                                                  1⤵
                                                                    PID:4836

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Program Files\Google\Chrome\updater.exe

                                                                    Filesize

                                                                    5.6MB

                                                                    MD5

                                                                    bae29e49e8190bfbbf0d77ffab8de59d

                                                                    SHA1

                                                                    4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                    SHA256

                                                                    f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                    SHA512

                                                                    9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9A1D.exe.log

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    c59f53fdcc8060e77447ed9ebf9dc926

                                                                    SHA1

                                                                    0f1d44782f283b315a2ad6fe37727bdc188ea21c

                                                                    SHA256

                                                                    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

                                                                    SHA512

                                                                    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    ad5cd538ca58cb28ede39c108acb5785

                                                                    SHA1

                                                                    1ae910026f3dbe90ed025e9e96ead2b5399be877

                                                                    SHA256

                                                                    c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                                                    SHA512

                                                                    c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    98344d3062a964179509879a8f80d014

                                                                    SHA1

                                                                    020c93b828da9425c2c8ff596482b1ecd3bbf143

                                                                    SHA256

                                                                    7ee222b0681b15039a3f1e888547c02859baa0e0f304c3dd1063e911e3e94b42

                                                                    SHA512

                                                                    5e6e9a825718f5e32b34ca86f9b132ffe034185142a68a0ce313438312c49e7e2392fa78ca4508458a401d3891cfd5917e8906b3f6830bb543465b33a8755223

                                                                  • C:\Users\Admin\AppData\Local\Temp\1911.exe

                                                                    Filesize

                                                                    12.6MB

                                                                    MD5

                                                                    275dfcec52cbf0642e80f905a0536755

                                                                    SHA1

                                                                    a67b08da2800526861668b5869280905a08d7adb

                                                                    SHA256

                                                                    7eeec8c77dae7ae63692da71d01d9299d0c3a3453abc0ee85b72e52a338d560d

                                                                    SHA512

                                                                    5e293cb649f74cb34fccb0effce9093510ca0632fa551aefb1c3351026d6c8b362cc749a9f6e7fd5d53381b8e86f2518bbdda32d63261436693a141969e294e5

                                                                  • C:\Users\Admin\AppData\Local\Temp\1911.exe

                                                                    Filesize

                                                                    12.6MB

                                                                    MD5

                                                                    275dfcec52cbf0642e80f905a0536755

                                                                    SHA1

                                                                    a67b08da2800526861668b5869280905a08d7adb

                                                                    SHA256

                                                                    7eeec8c77dae7ae63692da71d01d9299d0c3a3453abc0ee85b72e52a338d560d

                                                                    SHA512

                                                                    5e293cb649f74cb34fccb0effce9093510ca0632fa551aefb1c3351026d6c8b362cc749a9f6e7fd5d53381b8e86f2518bbdda32d63261436693a141969e294e5

                                                                  • C:\Users\Admin\AppData\Local\Temp\1AF6.exe

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    a2687e610dad6bcf4359bf2a5953e10a

                                                                    SHA1

                                                                    8320fd92e757ab42f8429a9e3b43dec909add268

                                                                    SHA256

                                                                    439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a

                                                                    SHA512

                                                                    b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf

                                                                  • C:\Users\Admin\AppData\Local\Temp\1AF6.exe

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    a2687e610dad6bcf4359bf2a5953e10a

                                                                    SHA1

                                                                    8320fd92e757ab42f8429a9e3b43dec909add268

                                                                    SHA256

                                                                    439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a

                                                                    SHA512

                                                                    b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf

                                                                  • C:\Users\Admin\AppData\Local\Temp\1CFB.exe

                                                                    Filesize

                                                                    277KB

                                                                    MD5

                                                                    1c3eced439962f3570f523d9af5fb908

                                                                    SHA1

                                                                    4bf23ad43ee572abd2c85418939793ffbcd444d3

                                                                    SHA256

                                                                    7acf0eba2165fcdfc72338959e9add02c362918c8451a0313c4ef797ae337abd

                                                                    SHA512

                                                                    bc4d4fc365609bcc1b112e9c09bc9c7c7b9ac523120cc4f997e98639a22ff0ac3860ccae067e558e067c36da18e445fc3c724622e1891dd2f5a61a05ac96ac37

                                                                  • C:\Users\Admin\AppData\Local\Temp\1CFB.exe

                                                                    Filesize

                                                                    277KB

                                                                    MD5

                                                                    1c3eced439962f3570f523d9af5fb908

                                                                    SHA1

                                                                    4bf23ad43ee572abd2c85418939793ffbcd444d3

                                                                    SHA256

                                                                    7acf0eba2165fcdfc72338959e9add02c362918c8451a0313c4ef797ae337abd

                                                                    SHA512

                                                                    bc4d4fc365609bcc1b112e9c09bc9c7c7b9ac523120cc4f997e98639a22ff0ac3860ccae067e558e067c36da18e445fc3c724622e1891dd2f5a61a05ac96ac37

                                                                  • C:\Users\Admin\AppData\Local\Temp\2316.exe

                                                                    Filesize

                                                                    443KB

                                                                    MD5

                                                                    ff4691f6c1f0e701303c2b135345890e

                                                                    SHA1

                                                                    83aa8ee0cc57af54ebab336c70d756a5a8c2f7d4

                                                                    SHA256

                                                                    06cf4c8c1b6aa436dfff3ec427dbe4ae291d170a0ad7445003995bbf6ccb21ca

                                                                    SHA512

                                                                    7a909dc95f019fb60da7751a888d11cb82f751560408cd47a7fdab53f92971690df5d9e8cddc9cd7cfa7c5949ff789683183c2271c5249403aa8322cfa1bcee6

                                                                  • C:\Users\Admin\AppData\Local\Temp\2316.exe

                                                                    Filesize

                                                                    443KB

                                                                    MD5

                                                                    ff4691f6c1f0e701303c2b135345890e

                                                                    SHA1

                                                                    83aa8ee0cc57af54ebab336c70d756a5a8c2f7d4

                                                                    SHA256

                                                                    06cf4c8c1b6aa436dfff3ec427dbe4ae291d170a0ad7445003995bbf6ccb21ca

                                                                    SHA512

                                                                    7a909dc95f019fb60da7751a888d11cb82f751560408cd47a7fdab53f92971690df5d9e8cddc9cd7cfa7c5949ff789683183c2271c5249403aa8322cfa1bcee6

                                                                  • C:\Users\Admin\AppData\Local\Temp\96A2.exe

                                                                    Filesize

                                                                    17.5MB

                                                                    MD5

                                                                    d6a28fab04acec60305a5c6be5b105d2

                                                                    SHA1

                                                                    8def206af9e2e8f463f15a2874b53c295fd28710

                                                                    SHA256

                                                                    ff8973e265cde0ecfc91cb81ae4af75946b2cfcaa772b5cd1390c176e788175f

                                                                    SHA512

                                                                    3406ec32344b3ffedc6295d10256920cb43dd511500473974400a3602b1b9d734b9a2439cc65dde64c7fae00cbe084812b3188cde78a7c8d75650ef8690a0212

                                                                  • C:\Users\Admin\AppData\Local\Temp\96A2.exe

                                                                    Filesize

                                                                    17.5MB

                                                                    MD5

                                                                    d6a28fab04acec60305a5c6be5b105d2

                                                                    SHA1

                                                                    8def206af9e2e8f463f15a2874b53c295fd28710

                                                                    SHA256

                                                                    ff8973e265cde0ecfc91cb81ae4af75946b2cfcaa772b5cd1390c176e788175f

                                                                    SHA512

                                                                    3406ec32344b3ffedc6295d10256920cb43dd511500473974400a3602b1b9d734b9a2439cc65dde64c7fae00cbe084812b3188cde78a7c8d75650ef8690a0212

                                                                  • C:\Users\Admin\AppData\Local\Temp\9A1D.exe

                                                                    Filesize

                                                                    1.0MB

                                                                    MD5

                                                                    1ed9f9bb8c6f1d5c482b4bbf61cf8ee8

                                                                    SHA1

                                                                    945b9bba996c54233daa15be3349441286b040cb

                                                                    SHA256

                                                                    04f692202efaca511b15aefa33daf5bea9287c8e8947fb62e92d3825e5ec04ae

                                                                    SHA512

                                                                    403a23e5923cee4c7ed48ef296737cedf4e265a77ad0b435aa6290e90a75c3d9268247f8af430027a903ebcb1dcb6c21cb573968ba06185dc1cd2e0a6121f6a4

                                                                  • C:\Users\Admin\AppData\Local\Temp\9A1D.exe

                                                                    Filesize

                                                                    1.0MB

                                                                    MD5

                                                                    1ed9f9bb8c6f1d5c482b4bbf61cf8ee8

                                                                    SHA1

                                                                    945b9bba996c54233daa15be3349441286b040cb

                                                                    SHA256

                                                                    04f692202efaca511b15aefa33daf5bea9287c8e8947fb62e92d3825e5ec04ae

                                                                    SHA512

                                                                    403a23e5923cee4c7ed48ef296737cedf4e265a77ad0b435aa6290e90a75c3d9268247f8af430027a903ebcb1dcb6c21cb573968ba06185dc1cd2e0a6121f6a4

                                                                  • C:\Users\Admin\AppData\Local\Temp\9A1D.exe

                                                                    Filesize

                                                                    1.0MB

                                                                    MD5

                                                                    1ed9f9bb8c6f1d5c482b4bbf61cf8ee8

                                                                    SHA1

                                                                    945b9bba996c54233daa15be3349441286b040cb

                                                                    SHA256

                                                                    04f692202efaca511b15aefa33daf5bea9287c8e8947fb62e92d3825e5ec04ae

                                                                    SHA512

                                                                    403a23e5923cee4c7ed48ef296737cedf4e265a77ad0b435aa6290e90a75c3d9268247f8af430027a903ebcb1dcb6c21cb573968ba06185dc1cd2e0a6121f6a4

                                                                  • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                                                    Filesize

                                                                    5.3MB

                                                                    MD5

                                                                    00e93456aa5bcf9f60f84b0c0760a212

                                                                    SHA1

                                                                    6096890893116e75bd46fea0b8c3921ceb33f57d

                                                                    SHA256

                                                                    ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                                                                    SHA512

                                                                    abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qR7eS6.exe

                                                                    Filesize

                                                                    189KB

                                                                    MD5

                                                                    f4af3a9bb5b128ea7f4a49016ae8de1f

                                                                    SHA1

                                                                    77e47932af41b3af5bfff73d2a4c9773dc224f0d

                                                                    SHA256

                                                                    195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1

                                                                    SHA512

                                                                    1067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qR7eS6.exe

                                                                    Filesize

                                                                    189KB

                                                                    MD5

                                                                    f4af3a9bb5b128ea7f4a49016ae8de1f

                                                                    SHA1

                                                                    77e47932af41b3af5bfff73d2a4c9773dc224f0d

                                                                    SHA256

                                                                    195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1

                                                                    SHA512

                                                                    1067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vn4fk12.exe

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    c42d8b074bea6be54ca45b27bdf26aab

                                                                    SHA1

                                                                    05e8db08fb2cf46d41716616206774936572fb97

                                                                    SHA256

                                                                    8e1ce1786026390684f65eade15b7d099b4b771e19c0f0323d553e2b5a4c52a7

                                                                    SHA512

                                                                    8a8d060663e720ef7b3b44a5ae136a2ef99a61b6c7ce855db817cd133f563ea35debd0d2b8473152d7ea340ea5065902f7edbd84e0a20ce1eeafa2edeef1f3bc

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vn4fk12.exe

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    c42d8b074bea6be54ca45b27bdf26aab

                                                                    SHA1

                                                                    05e8db08fb2cf46d41716616206774936572fb97

                                                                    SHA256

                                                                    8e1ce1786026390684f65eade15b7d099b4b771e19c0f0323d553e2b5a4c52a7

                                                                    SHA512

                                                                    8a8d060663e720ef7b3b44a5ae136a2ef99a61b6c7ce855db817cd133f563ea35debd0d2b8473152d7ea340ea5065902f7edbd84e0a20ce1eeafa2edeef1f3bc

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Sb7qh5.exe

                                                                    Filesize

                                                                    37KB

                                                                    MD5

                                                                    b938034561ab089d7047093d46deea8f

                                                                    SHA1

                                                                    d778c32cc46be09b107fa47cf3505ba5b748853d

                                                                    SHA256

                                                                    260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161

                                                                    SHA512

                                                                    4909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Sb7qh5.exe

                                                                    Filesize

                                                                    37KB

                                                                    MD5

                                                                    b938034561ab089d7047093d46deea8f

                                                                    SHA1

                                                                    d778c32cc46be09b107fa47cf3505ba5b748853d

                                                                    SHA256

                                                                    260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161

                                                                    SHA512

                                                                    4909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eq3St12.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    a20942cf76749a9f835a3972f1a35687

                                                                    SHA1

                                                                    7dbf3255848e6ccb521437d2adc2a403fd4fe2dd

                                                                    SHA256

                                                                    7f6536c5119421a36c7f8d001388e79204588376738ff08e17a54053adb3d8ad

                                                                    SHA512

                                                                    8bfd631c885556654d1877a17b183c7366e04cb102659f7fb54ed1f684078df6bfea79afafbda5c202c97ae86c0f00a26aa75ed09b0e3830dbcc28b3c76b5c9f

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eq3St12.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    a20942cf76749a9f835a3972f1a35687

                                                                    SHA1

                                                                    7dbf3255848e6ccb521437d2adc2a403fd4fe2dd

                                                                    SHA256

                                                                    7f6536c5119421a36c7f8d001388e79204588376738ff08e17a54053adb3d8ad

                                                                    SHA512

                                                                    8bfd631c885556654d1877a17b183c7366e04cb102659f7fb54ed1f684078df6bfea79afafbda5c202c97ae86c0f00a26aa75ed09b0e3830dbcc28b3c76b5c9f

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ej3685.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    a0f4193cb476131ed313d99a72c17f5c

                                                                    SHA1

                                                                    eefa0347ff96caae4bb03c141b31797cec86c835

                                                                    SHA256

                                                                    34e23f3bad4ddfa81df84f23813a587d842eecab1bdeae845abcb8034c626d3f

                                                                    SHA512

                                                                    4f287f26fe0477ece8f66a3f59c66632cf0694b7ae122c10453438feacaf16bd6afe52e475f81db9f1cf50ae30243bf9b94a865f351d933b20335d3857e210a1

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ej3685.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    a0f4193cb476131ed313d99a72c17f5c

                                                                    SHA1

                                                                    eefa0347ff96caae4bb03c141b31797cec86c835

                                                                    SHA256

                                                                    34e23f3bad4ddfa81df84f23813a587d842eecab1bdeae845abcb8034c626d3f

                                                                    SHA512

                                                                    4f287f26fe0477ece8f66a3f59c66632cf0694b7ae122c10453438feacaf16bd6afe52e475f81db9f1cf50ae30243bf9b94a865f351d933b20335d3857e210a1

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Fh495aL.exe

                                                                    Filesize

                                                                    2.4MB

                                                                    MD5

                                                                    d8c598049f9067e9b755eb511b18d4d4

                                                                    SHA1

                                                                    84390e87fe95e18093ff11ca95d6c767ee50c2f3

                                                                    SHA256

                                                                    b35158d43279a1bcbc0e16c24033b213b0a392a6d9915e7e9395eeca0a32930a

                                                                    SHA512

                                                                    3162bda425b171fc7ea314fd8b649e09f1ec41cf882b94112b5cf9bbd5e03f326af1de15ab0e67646308d109216a7889642d2a7c6ed40c5b20cb080cbc5f4b93

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Fh495aL.exe

                                                                    Filesize

                                                                    2.4MB

                                                                    MD5

                                                                    d8c598049f9067e9b755eb511b18d4d4

                                                                    SHA1

                                                                    84390e87fe95e18093ff11ca95d6c767ee50c2f3

                                                                    SHA256

                                                                    b35158d43279a1bcbc0e16c24033b213b0a392a6d9915e7e9395eeca0a32930a

                                                                    SHA512

                                                                    3162bda425b171fc7ea314fd8b649e09f1ec41cf882b94112b5cf9bbd5e03f326af1de15ab0e67646308d109216a7889642d2a7c6ed40c5b20cb080cbc5f4b93

                                                                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                                                    Filesize

                                                                    2.5MB

                                                                    MD5

                                                                    f13cf6c130d41595bc96be10a737cb18

                                                                    SHA1

                                                                    6b14ea97930141aa5caaeeeb13dd4c6dad55d102

                                                                    SHA256

                                                                    dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f

                                                                    SHA512

                                                                    ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48

                                                                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                                                    Filesize

                                                                    2.5MB

                                                                    MD5

                                                                    f13cf6c130d41595bc96be10a737cb18

                                                                    SHA1

                                                                    6b14ea97930141aa5caaeeeb13dd4c6dad55d102

                                                                    SHA256

                                                                    dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f

                                                                    SHA512

                                                                    ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48

                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gqhge45d.1ur.ps1

                                                                    Filesize

                                                                    1B

                                                                    MD5

                                                                    c4ca4238a0b923820dcc509a6f75849b

                                                                    SHA1

                                                                    356a192b7913b04c54574d18c28d46e6395428ab

                                                                    SHA256

                                                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                    SHA512

                                                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                    Filesize

                                                                    281KB

                                                                    MD5

                                                                    d98e33b66343e7c96158444127a117f6

                                                                    SHA1

                                                                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                    SHA256

                                                                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                    SHA512

                                                                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                    Filesize

                                                                    281KB

                                                                    MD5

                                                                    d98e33b66343e7c96158444127a117f6

                                                                    SHA1

                                                                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                    SHA256

                                                                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                    SHA512

                                                                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libcrypto-1_1.dll

                                                                    Filesize

                                                                    3.5MB

                                                                    MD5

                                                                    b7c32c8e7d21aa9b79470037227eba43

                                                                    SHA1

                                                                    38d719b10ca035cee65162c1a44e2c62123d41b4

                                                                    SHA256

                                                                    99b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23

                                                                    SHA512

                                                                    d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libevent-2-1-7.dll

                                                                    Filesize

                                                                    876KB

                                                                    MD5

                                                                    736443b08b5a52b6958f001e8200be71

                                                                    SHA1

                                                                    e56ddc8476aef0d3482c99c5bfaf0f57458b2576

                                                                    SHA256

                                                                    da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4

                                                                    SHA512

                                                                    9dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libgcc_s_dw2-1.dll

                                                                    Filesize

                                                                    668KB

                                                                    MD5

                                                                    36e1c3814bde3418ba3d38517954cb7c

                                                                    SHA1

                                                                    495e1ba5b0b442e70124d33daa6fea4e3e5931b0

                                                                    SHA256

                                                                    b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1

                                                                    SHA512

                                                                    df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssl-1_1.dll

                                                                    Filesize

                                                                    938KB

                                                                    MD5

                                                                    d92e59b71bf8a0d827597ed95b2eca42

                                                                    SHA1

                                                                    cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a

                                                                    SHA256

                                                                    b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3

                                                                    SHA512

                                                                    be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssp-0.dll

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    7cdbaca31739500aefc06dd85a8558ff

                                                                    SHA1

                                                                    adc36ec6a3cdc7e57a1b706c820e382627f6cb90

                                                                    SHA256

                                                                    0a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb

                                                                    SHA512

                                                                    6df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe

                                                                    Filesize

                                                                    4.3MB

                                                                    MD5

                                                                    055ae7c584a7b012955bf5d874f30cfa

                                                                    SHA1

                                                                    f2b4d8c5307ff09607be929ec08fc2727bf03dcf

                                                                    SHA256

                                                                    d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8

                                                                    SHA512

                                                                    910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe

                                                                    Filesize

                                                                    4.3MB

                                                                    MD5

                                                                    055ae7c584a7b012955bf5d874f30cfa

                                                                    SHA1

                                                                    f2b4d8c5307ff09607be929ec08fc2727bf03dcf

                                                                    SHA256

                                                                    d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8

                                                                    SHA512

                                                                    910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\zlib1.dll

                                                                    Filesize

                                                                    135KB

                                                                    MD5

                                                                    f08b1f044c68770c190daf1eb1f3157e

                                                                    SHA1

                                                                    f94103a542459d60434f9ddb6b5f45b11eae2923

                                                                    SHA256

                                                                    1d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27

                                                                    SHA512

                                                                    0667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c

                                                                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    14a535954bf4becdfd4dc6ad7cb45153

                                                                    SHA1

                                                                    d9eb9619e56cf54334e4cb28490113b6a5984c79

                                                                    SHA256

                                                                    32e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff

                                                                    SHA512

                                                                    6c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1

                                                                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    14a535954bf4becdfd4dc6ad7cb45153

                                                                    SHA1

                                                                    d9eb9619e56cf54334e4cb28490113b6a5984c79

                                                                    SHA256

                                                                    32e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff

                                                                    SHA512

                                                                    6c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1

                                                                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    14a535954bf4becdfd4dc6ad7cb45153

                                                                    SHA1

                                                                    d9eb9619e56cf54334e4cb28490113b6a5984c79

                                                                    SHA256

                                                                    32e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff

                                                                    SHA512

                                                                    6c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1

                                                                  • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                    Filesize

                                                                    5.6MB

                                                                    MD5

                                                                    bae29e49e8190bfbbf0d77ffab8de59d

                                                                    SHA1

                                                                    4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                    SHA256

                                                                    f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                    SHA512

                                                                    9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                  • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                    Filesize

                                                                    5.6MB

                                                                    MD5

                                                                    bae29e49e8190bfbbf0d77ffab8de59d

                                                                    SHA1

                                                                    4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                    SHA256

                                                                    f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                    SHA512

                                                                    9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp5EFC.tmp

                                                                    Filesize

                                                                    46KB

                                                                    MD5

                                                                    02d2c46697e3714e49f46b680b9a6b83

                                                                    SHA1

                                                                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                    SHA256

                                                                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                    SHA512

                                                                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp5F30.tmp

                                                                    Filesize

                                                                    92KB

                                                                    MD5

                                                                    3f194152deb86dd24c32d81e7749d57e

                                                                    SHA1

                                                                    b1c3b2d10013dfd65ef8d44fd475ac76e1815203

                                                                    SHA256

                                                                    9cad93e2e9da675749e0e07f1b61d65ab1333b17a82b9daeaac035646dcbc5aa

                                                                    SHA512

                                                                    c4e922f8c3a304d2faf7148c47f202e5062c419ff0d1330b1626f3e2077642e850377a531fe7ac7f935f22b1b64cfab5169305d6ad79fc8bda49dbff37f98fbf

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp5F4C.tmp

                                                                    Filesize

                                                                    96KB

                                                                    MD5

                                                                    d367ddfda80fdcf578726bc3b0bc3e3c

                                                                    SHA1

                                                                    23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                                    SHA256

                                                                    0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                                    SHA512

                                                                    40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                                  • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                    Filesize

                                                                    244KB

                                                                    MD5

                                                                    4137b230bb95d9e8cab423efba2d9fb8

                                                                    SHA1

                                                                    998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485

                                                                    SHA256

                                                                    5d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f

                                                                    SHA512

                                                                    a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49

                                                                  • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                    Filesize

                                                                    244KB

                                                                    MD5

                                                                    4137b230bb95d9e8cab423efba2d9fb8

                                                                    SHA1

                                                                    998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485

                                                                    SHA256

                                                                    5d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f

                                                                    SHA512

                                                                    a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49

                                                                  • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                    Filesize

                                                                    244KB

                                                                    MD5

                                                                    4137b230bb95d9e8cab423efba2d9fb8

                                                                    SHA1

                                                                    998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485

                                                                    SHA256

                                                                    5d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f

                                                                    SHA512

                                                                    a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49

                                                                  • C:\Users\Admin\AppData\Roaming\frfiiad

                                                                    Filesize

                                                                    244KB

                                                                    MD5

                                                                    4137b230bb95d9e8cab423efba2d9fb8

                                                                    SHA1

                                                                    998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485

                                                                    SHA256

                                                                    5d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f

                                                                    SHA512

                                                                    a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    e745b8b7681f5ae25b09a7b1eb2f8fd3

                                                                    SHA1

                                                                    cd55c3fcf95d11f5d4fb4a75233dc69494f74d80

                                                                    SHA256

                                                                    5a7e3072d483e8dc341b902b937b53a379dc4080f08b54410c3c2046dd500538

                                                                    SHA512

                                                                    65ff6cfa6b416c099612e9f00399514d52264a4a58f8c63e2f78111805bf623eecded3d18c36dc1be5431aef50a1c192eaed6122e10d722e94325e6412d4298e

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    a3e93c34bbcc9aba7bb4859827420ac9

                                                                    SHA1

                                                                    d1bb92050d25adbe94a6fb7805aa6364db9c0939

                                                                    SHA256

                                                                    f1d8e34ecb650c5ac440be6e4e59ca2d307be87999ef012e6293c67882183b63

                                                                    SHA512

                                                                    0c1e24f7b3292d1008aca729de559910ebcce0f385e8dea35472a40d6748a04ac252e19b93a5316898d1afeafbc8e0d3e01a1435230611df33e38a2273a6e91f

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    c6de19ad6383105ab4facacde91b9bf2

                                                                    SHA1

                                                                    f049a6a8a54c2b262a60309d54ce452f74f7fdca

                                                                    SHA256

                                                                    d75168b5e109ad6f608b52a73b58b7e4f16b448919f910c7416fdff626d8042d

                                                                    SHA512

                                                                    0db3304a0ffd41412308759a81d07411414ced2bbcbce3a066370697aa5d16b9e6bc98ba8527ecf4488e337e12390b2e97a77521def207dbee959fe285d81d8e

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    d1f02b696b8c1d131ff0144c975324f3

                                                                    SHA1

                                                                    942f3ebad81a726be27c4d45c76e1a305f335a0b

                                                                    SHA256

                                                                    660555f6741ed6158173a7a694f7a5bddde83d5f3946077361d6e1d3318fe0b8

                                                                    SHA512

                                                                    eb7a7df5396cd832afcfe53c7b9386a6a9e6b15d45a91eb5e7e027af7ceb09df5e06ad455840fd49a83a737e183a9908f2df5541e61d8dc10a3785cda49b82bd

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    2c5b4652dbec7c8810d89117cfb5f1b8

                                                                    SHA1

                                                                    29aac6f15b918c8ab5b987b912752c981666127a

                                                                    SHA256

                                                                    9625e6aaf9e178c4f7a5cdc3cec754b5b5e573092fbdad55a699e00ad955d5a8

                                                                    SHA512

                                                                    c8955f4a8dced3942c279dbec9b68cdf1bcb990e0489a638149001b3a6fd4ce9daba37a119ede79dc17388d1b595128413495016a4cfa887d32161aa957d9963

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    3703df80ced6b0959b69b32fd81bd9ef

                                                                    SHA1

                                                                    ab5e72a34ec6fe9be426ce5c02840f09355755d7

                                                                    SHA256

                                                                    91793f880479479f10a6d83cf48d6076a7c334b792cdd7d3a243a76d5c63da14

                                                                    SHA512

                                                                    6836d22c4651b0384d9e149513b8543fb441ee24f660f98e16c7d9285b0eef843c8473e85ec1306dab550e621642b6a1f258def4c2130f24d5a3a1a4e2c8dfcd

                                                                  • C:\Windows\System32\drivers\etc\hosts

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    00930b40cba79465b7a38ed0449d1449

                                                                    SHA1

                                                                    4b25a89ee28b20ba162f23772ddaf017669092a5

                                                                    SHA256

                                                                    eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                                                    SHA512

                                                                    cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                                                  • C:\Windows\rss\csrss.exe

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    14a535954bf4becdfd4dc6ad7cb45153

                                                                    SHA1

                                                                    d9eb9619e56cf54334e4cb28490113b6a5984c79

                                                                    SHA256

                                                                    32e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff

                                                                    SHA512

                                                                    6c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1

                                                                  • C:\Windows\rss\csrss.exe

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    14a535954bf4becdfd4dc6ad7cb45153

                                                                    SHA1

                                                                    d9eb9619e56cf54334e4cb28490113b6a5984c79

                                                                    SHA256

                                                                    32e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff

                                                                    SHA512

                                                                    6c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1

                                                                  • C:\Windows\rss\csrss.exe

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    14a535954bf4becdfd4dc6ad7cb45153

                                                                    SHA1

                                                                    d9eb9619e56cf54334e4cb28490113b6a5984c79

                                                                    SHA256

                                                                    32e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff

                                                                    SHA512

                                                                    6c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1

                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    811d351aabd7b708fef7683cf5e29e15

                                                                    SHA1

                                                                    06fd89e5a575f45d411cf4b3a2d277e642e73dbb

                                                                    SHA256

                                                                    0915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18

                                                                    SHA512

                                                                    702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a

                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    302a7c179ef577c237c5418fb770fd27

                                                                    SHA1

                                                                    343ef00d1357a8d2ff6e1143541a8a29435ed30c

                                                                    SHA256

                                                                    9e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f

                                                                    SHA512

                                                                    f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699

                                                                  • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libevent-2-1-7.dll

                                                                    Filesize

                                                                    876KB

                                                                    MD5

                                                                    736443b08b5a52b6958f001e8200be71

                                                                    SHA1

                                                                    e56ddc8476aef0d3482c99c5bfaf0f57458b2576

                                                                    SHA256

                                                                    da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4

                                                                    SHA512

                                                                    9dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1

                                                                  • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssl-1_1.dll

                                                                    Filesize

                                                                    938KB

                                                                    MD5

                                                                    d92e59b71bf8a0d827597ed95b2eca42

                                                                    SHA1

                                                                    cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a

                                                                    SHA256

                                                                    b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3

                                                                    SHA512

                                                                    be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04

                                                                  • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssp-0.dll

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    7cdbaca31739500aefc06dd85a8558ff

                                                                    SHA1

                                                                    adc36ec6a3cdc7e57a1b706c820e382627f6cb90

                                                                    SHA256

                                                                    0a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb

                                                                    SHA512

                                                                    6df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba

                                                                  • memory/432-109-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/432-110-0x00000000002A0000-0x0000000000F34000-memory.dmp

                                                                    Filesize

                                                                    12.6MB

                                                                  • memory/432-159-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/712-52-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                    Filesize

                                                                    44KB

                                                                  • memory/712-37-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                    Filesize

                                                                    44KB

                                                                  • memory/1536-284-0x00007FF7B7480000-0x00007FF7B7A21000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/2320-153-0x00000000026E0000-0x00000000026E1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2320-374-0x0000000000400000-0x0000000000965000-memory.dmp

                                                                    Filesize

                                                                    5.4MB

                                                                  • memory/2320-178-0x0000000000400000-0x0000000000965000-memory.dmp

                                                                    Filesize

                                                                    5.4MB

                                                                  • memory/2320-290-0x00000000026E0000-0x00000000026E1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2576-181-0x0000000007090000-0x00000000070AE000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/2576-113-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/2576-112-0x0000000000C30000-0x0000000000C4E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/2576-275-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/2576-164-0x00000000069D0000-0x0000000006B92000-memory.dmp

                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/2576-165-0x00000000070D0000-0x00000000075FC000-memory.dmp

                                                                    Filesize

                                                                    5.2MB

                                                                  • memory/2576-180-0x0000000006F70000-0x0000000006FE6000-memory.dmp

                                                                    Filesize

                                                                    472KB

                                                                  • memory/2576-122-0x0000000005550000-0x0000000005560000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2576-179-0x0000000005550000-0x0000000005560000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2576-174-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/2764-167-0x00000000005E0000-0x00000000006E0000-memory.dmp

                                                                    Filesize

                                                                    1024KB

                                                                  • memory/2764-168-0x0000000000550000-0x0000000000559000-memory.dmp

                                                                    Filesize

                                                                    36KB

                                                                  • memory/2812-78-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-70-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-92-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-58-0x0000000002190000-0x00000000021B0000-memory.dmp

                                                                    Filesize

                                                                    128KB

                                                                  • memory/2812-59-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/2812-60-0x0000000004E50000-0x0000000004E6E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/2812-62-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-61-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-64-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-66-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-68-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-94-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/2812-72-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-90-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-74-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-76-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-80-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-82-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-84-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-86-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/2812-88-0x0000000004E50000-0x0000000004E69000-memory.dmp

                                                                    Filesize

                                                                    100KB

                                                                  • memory/3244-277-0x0000000001300000-0x0000000001316000-memory.dmp

                                                                    Filesize

                                                                    88KB

                                                                  • memory/3244-51-0x0000000001250000-0x0000000001266000-memory.dmp

                                                                    Filesize

                                                                    88KB

                                                                  • memory/3536-288-0x0000000006EA0000-0x0000000006ED6000-memory.dmp

                                                                    Filesize

                                                                    216KB

                                                                  • memory/3536-291-0x0000000007010000-0x0000000007020000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/3536-295-0x00000000075D0000-0x00000000075F2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/3536-296-0x0000000007ED0000-0x0000000007F36000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/3536-297-0x0000000007F40000-0x0000000008290000-memory.dmp

                                                                    Filesize

                                                                    3.3MB

                                                                  • memory/3536-298-0x0000000008300000-0x000000000831C000-memory.dmp

                                                                    Filesize

                                                                    112KB

                                                                  • memory/3536-293-0x0000000007650000-0x0000000007C78000-memory.dmp

                                                                    Filesize

                                                                    6.2MB

                                                                  • memory/3536-317-0x0000000009390000-0x00000000093CC000-memory.dmp

                                                                    Filesize

                                                                    240KB

                                                                  • memory/3536-287-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3536-357-0x000000007F7F0000-0x000000007F800000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/3536-359-0x000000006CEF0000-0x000000006CF3B000-memory.dmp

                                                                    Filesize

                                                                    300KB

                                                                  • memory/3536-358-0x000000000A2A0000-0x000000000A2D3000-memory.dmp

                                                                    Filesize

                                                                    204KB

                                                                  • memory/3536-363-0x000000006B9D0000-0x000000006BD20000-memory.dmp

                                                                    Filesize

                                                                    3.3MB

                                                                  • memory/3536-365-0x000000000A280000-0x000000000A29E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3536-289-0x0000000007010000-0x0000000007020000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/3896-39-0x0000000000400000-0x0000000000547000-memory.dmp

                                                                    Filesize

                                                                    1.3MB

                                                                  • memory/3896-40-0x0000000000400000-0x0000000000547000-memory.dmp

                                                                    Filesize

                                                                    1.3MB

                                                                  • memory/3896-30-0x0000000000400000-0x0000000000547000-memory.dmp

                                                                    Filesize

                                                                    1.3MB

                                                                  • memory/3896-32-0x0000000000400000-0x0000000000547000-memory.dmp

                                                                    Filesize

                                                                    1.3MB

                                                                  • memory/3896-29-0x0000000000400000-0x0000000000547000-memory.dmp

                                                                    Filesize

                                                                    1.3MB

                                                                  • memory/3948-21-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                    Filesize

                                                                    240KB

                                                                  • memory/3948-45-0x000000000B620000-0x000000000B65E000-memory.dmp

                                                                    Filesize

                                                                    248KB

                                                                  • memory/3948-28-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3948-41-0x0000000008EE0000-0x0000000008EEA000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/3948-38-0x000000000B3A0000-0x000000000B432000-memory.dmp

                                                                    Filesize

                                                                    584KB

                                                                  • memory/3948-46-0x000000000B7A0000-0x000000000B7EB000-memory.dmp

                                                                    Filesize

                                                                    300KB

                                                                  • memory/3948-44-0x000000000B5C0000-0x000000000B5D2000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/3948-31-0x000000000B8A0000-0x000000000BD9E000-memory.dmp

                                                                    Filesize

                                                                    5.0MB

                                                                  • memory/3948-43-0x000000000B690000-0x000000000B79A000-memory.dmp

                                                                    Filesize

                                                                    1.0MB

                                                                  • memory/3948-95-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3948-42-0x000000000C3B0000-0x000000000C9B6000-memory.dmp

                                                                    Filesize

                                                                    6.0MB

                                                                  • memory/4428-283-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/4428-163-0x0000000007FB0000-0x0000000008016000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/4428-203-0x0000000008990000-0x00000000089E0000-memory.dmp

                                                                    Filesize

                                                                    320KB

                                                                  • memory/4428-162-0x0000000007640000-0x0000000007650000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/4428-160-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/4428-148-0x0000000000400000-0x0000000000470000-memory.dmp

                                                                    Filesize

                                                                    448KB

                                                                  • memory/4428-142-0x0000000000540000-0x000000000059A000-memory.dmp

                                                                    Filesize

                                                                    360KB

                                                                  • memory/4472-278-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                    Filesize

                                                                    36KB

                                                                  • memory/4472-171-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                    Filesize

                                                                    36KB

                                                                  • memory/4472-169-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                    Filesize

                                                                    36KB

                                                                  • memory/4620-158-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/4620-161-0x00000000074C0000-0x00000000074D0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/4620-141-0x00000000001C0000-0x00000000001FE000-memory.dmp

                                                                    Filesize

                                                                    248KB

                                                                  • memory/4620-292-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/4620-294-0x00000000074C0000-0x00000000074D0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/4620-145-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                    Filesize

                                                                    292KB

                                                                  • memory/4620-337-0x0000000072FC0000-0x00000000736AE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/4876-173-0x0000000002A30000-0x0000000002E37000-memory.dmp

                                                                    Filesize

                                                                    4.0MB

                                                                  • memory/4876-177-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                    Filesize

                                                                    9.1MB

                                                                  • memory/4876-176-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                    Filesize

                                                                    9.1MB

                                                                  • memory/4876-175-0x0000000002E40000-0x000000000372B000-memory.dmp

                                                                    Filesize

                                                                    8.9MB

                                                                  • memory/4876-373-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                    Filesize

                                                                    9.1MB