Analysis

  • max time kernel
    105s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2023, 09:35

General

  • Target

    a846a9156fb4e966bcb73321248885c5da813749f7b7eea9afda1bfb3a03d2d3.exe

  • Size

    251KB

  • MD5

    0a603a16ff9136c693c009e29023422a

  • SHA1

    22c858d81e972eefeb917ce9a227a3b6276ce140

  • SHA256

    a846a9156fb4e966bcb73321248885c5da813749f7b7eea9afda1bfb3a03d2d3

  • SHA512

    ec7d036ce78113fca01a9c2b4e37c33b137cc04a4086eccf534447ee709f06db9dc42fcb1aee4066bfdb3ed2c88a7959cd8c8bb0602979298a4821cbd02fe47a

  • SSDEEP

    3072:AtCrzYS4GBMBTMTHr7BZPvPLMg17/avcRmotnFcjC5RecAk:qqEskTMTLFtPLMg5/aEmobc+q

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.181:40264

Extracted

Family

djvu

C2

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .gycc

  • offline_id

    nN1rRlTxKTPo66pmJEAHwufZ2Dhz4MsNxIlOk6t1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-CDZ4hMgp2X Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0829ASdw

rsa_pubkey.plain

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\a846a9156fb4e966bcb73321248885c5da813749f7b7eea9afda1bfb3a03d2d3.exe
      "C:\Users\Admin\AppData\Local\Temp\a846a9156fb4e966bcb73321248885c5da813749f7b7eea9afda1bfb3a03d2d3.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3452
    • C:\Users\Admin\AppData\Local\Temp\E455.exe
      C:\Users\Admin\AppData\Local\Temp\E455.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Users\Admin\AppData\Local\Temp\E455.exe
        C:\Users\Admin\AppData\Local\Temp\E455.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        PID:4708
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\8813bc4e-aa53-44a8-8033-6c2721890fcb" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          4⤵
          • Modifies file permissions
          PID:2752
        • C:\Users\Admin\AppData\Local\Temp\E455.exe
          "C:\Users\Admin\AppData\Local\Temp\E455.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:4972
          • C:\Users\Admin\AppData\Local\Temp\E455.exe
            "C:\Users\Admin\AppData\Local\Temp\E455.exe" --Admin IsNotAutoStart IsNotTask
            5⤵
            • Executes dropped EXE
            PID:1884
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 568
              6⤵
              • Program crash
              PID:2280
    • C:\Users\Admin\AppData\Local\Temp\E60B.exe
      C:\Users\Admin\AppData\Local\Temp\E60B.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1976
      • C:\Users\Admin\AppData\Local\Temp\E8AC.exe
        C:\Users\Admin\AppData\Local\Temp\E8AC.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\EB0F.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\EB0F.dll
          3⤵
          • Loads dropped DLL
          PID:2280
      • C:\Users\Admin\AppData\Local\Temp\270.exe
        C:\Users\Admin\AppData\Local\Temp\270.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe
          "C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Users\Admin\AppData\Local\Temp\Broom.exe
            C:\Users\Admin\AppData\Local\Temp\Broom.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1308
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:1396
          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
            "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
            4⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: MapViewOfSection
            PID:4304
        • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
          "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
          3⤵
          • Executes dropped EXE
          PID:2980
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:2884
            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
              "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
              4⤵
              • Executes dropped EXE
              PID:1948
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                  PID:3836
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1976
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    6⤵
                    • Modifies Windows Firewall
                    PID:436
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                    PID:3820
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                      PID:4756
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      5⤵
                        PID:3740
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                            PID:4716
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                            6⤵
                            • Creates scheduled task(s)
                            PID:1704
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /delete /tn ScheduledUpdate /f
                            6⤵
                              PID:1972
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                                PID:5044
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                6⤵
                                  PID:3760
                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                  6⤵
                                    PID:5092
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                    6⤵
                                    • Creates scheduled task(s)
                                    PID:220
                                  • C:\Windows\windefender.exe
                                    "C:\Windows\windefender.exe"
                                    6⤵
                                      PID:4588
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                        7⤵
                                          PID:216
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                            8⤵
                                            • Launches sc.exe
                                            PID:1524
                                • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                                  "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                                  3⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Drops file in Drivers directory
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  PID:3984
                              • C:\Users\Admin\AppData\Local\Temp\F33.exe
                                C:\Users\Admin\AppData\Local\Temp\F33.exe
                                2⤵
                                • Executes dropped EXE
                                PID:4408
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 340
                                  3⤵
                                  • Program crash
                                  PID:4680
                              • C:\Users\Admin\AppData\Local\Temp\1ACC.exe
                                C:\Users\Admin\AppData\Local\Temp\1ACC.exe
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:2024
                                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                  "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:3128
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    4⤵
                                      PID:5104
                                    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                      "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      PID:3696
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nologo -noprofile
                                        5⤵
                                        • Modifies data under HKEY_USERS
                                        PID:2084
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                        5⤵
                                          PID:4516
                                          • C:\Windows\system32\netsh.exe
                                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                            6⤵
                                            • Modifies Windows Firewall
                                            PID:2752
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -nologo -noprofile
                                          5⤵
                                            PID:2372
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            5⤵
                                              PID:1096
                                        • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
                                          "C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          PID:4176
                                          • C:\Users\Admin\AppData\Local\Temp\Broom.exe
                                            C:\Users\Admin\AppData\Local\Temp\Broom.exe
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1732
                                      • C:\Windows\SysWOW64\explorer.exe
                                        C:\Windows\SysWOW64\explorer.exe
                                        2⤵
                                          PID:336
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe
                                          2⤵
                                            PID:4036
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                            2⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4764
                                          • C:\Windows\System32\cmd.exe
                                            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                            2⤵
                                              PID:4100
                                              • C:\Windows\System32\sc.exe
                                                sc stop UsoSvc
                                                3⤵
                                                • Launches sc.exe
                                                PID:1196
                                              • C:\Windows\System32\sc.exe
                                                sc stop WaaSMedicSvc
                                                3⤵
                                                • Launches sc.exe
                                                PID:1304
                                              • C:\Windows\System32\sc.exe
                                                sc stop bits
                                                3⤵
                                                • Launches sc.exe
                                                PID:2520
                                              • C:\Windows\System32\sc.exe
                                                sc stop wuauserv
                                                3⤵
                                                • Launches sc.exe
                                                PID:4640
                                              • C:\Windows\System32\sc.exe
                                                sc stop dosvc
                                                3⤵
                                                • Launches sc.exe
                                                PID:2244
                                            • C:\Windows\System32\cmd.exe
                                              C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                              2⤵
                                                PID:1152
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  3⤵
                                                  • Accesses Microsoft Outlook profiles
                                                  • outlook_office_path
                                                  • outlook_win_path
                                                  PID:336
                                                • C:\Windows\System32\powercfg.exe
                                                  powercfg /x -hibernate-timeout-ac 0
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2212
                                                • C:\Windows\System32\powercfg.exe
                                                  powercfg /x -hibernate-timeout-dc 0
                                                  3⤵
                                                    PID:3940
                                                  • C:\Windows\System32\powercfg.exe
                                                    powercfg /x -standby-timeout-ac 0
                                                    3⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2456
                                                  • C:\Windows\System32\powercfg.exe
                                                    powercfg /x -standby-timeout-dc 0
                                                    3⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3868
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                  2⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4472
                                                • C:\Windows\System32\schtasks.exe
                                                  C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                  2⤵
                                                    PID:1400
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3940
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                    2⤵
                                                    • Modifies data under HKEY_USERS
                                                    PID:3836
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop UsoSvc
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:2792
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop WaaSMedicSvc
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:3672
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop wuauserv
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:1976
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop bits
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:4812
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop dosvc
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:4100
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                    2⤵
                                                      PID:4932
                                                      • C:\Windows\System32\powercfg.exe
                                                        powercfg /x -hibernate-timeout-ac 0
                                                        3⤵
                                                          PID:384
                                                        • C:\Windows\System32\powercfg.exe
                                                          powercfg /x -hibernate-timeout-dc 0
                                                          3⤵
                                                            PID:4588
                                                          • C:\Windows\System32\powercfg.exe
                                                            powercfg /x -standby-timeout-ac 0
                                                            3⤵
                                                              PID:1616
                                                            • C:\Windows\System32\powercfg.exe
                                                              powercfg /x -standby-timeout-dc 0
                                                              3⤵
                                                                PID:1280
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                              2⤵
                                                                PID:4108
                                                              • C:\Windows\System32\conhost.exe
                                                                C:\Windows\System32\conhost.exe
                                                                2⤵
                                                                  PID:3036
                                                                • C:\Windows\explorer.exe
                                                                  C:\Windows\explorer.exe
                                                                  2⤵
                                                                    PID:3080
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4408 -ip 4408
                                                                  1⤵
                                                                    PID:1968
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1884 -ip 1884
                                                                    1⤵
                                                                      PID:928
                                                                    • C:\Program Files\Google\Chrome\updater.exe
                                                                      "C:\Program Files\Google\Chrome\updater.exe"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:4184
                                                                    • C:\Windows\windefender.exe
                                                                      C:\Windows\windefender.exe
                                                                      1⤵
                                                                        PID:4744

                                                                      Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Program Files\Google\Chrome\updater.exe

                                                                              Filesize

                                                                              5.6MB

                                                                              MD5

                                                                              bae29e49e8190bfbbf0d77ffab8de59d

                                                                              SHA1

                                                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                              SHA256

                                                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                              SHA512

                                                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                            • C:\Program Files\Google\Chrome\updater.exe

                                                                              Filesize

                                                                              5.6MB

                                                                              MD5

                                                                              bae29e49e8190bfbbf0d77ffab8de59d

                                                                              SHA1

                                                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                              SHA256

                                                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                              SHA512

                                                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                            • C:\Users\Admin\AppData\Local\8813bc4e-aa53-44a8-8033-6c2721890fcb\E455.exe

                                                                              Filesize

                                                                              749KB

                                                                              MD5

                                                                              0e26e1121ed601ff7fd85737d055fa29

                                                                              SHA1

                                                                              df51489c205a16a03696222b633aa93778478ae2

                                                                              SHA256

                                                                              f314bec2500fa1f439860c84d2cb0c6f600407d70a40e82b771ad475d69eb74c

                                                                              SHA512

                                                                              7e61a327fc7063c5a4b4958913ad2d3e0fc3107f9cabe9a4961b1f75abdeeb5a8e9ecd6add72e7bf475ed99e8a3bc451ad6465ec5b53706978b70d238516caec

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                              SHA1

                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                              SHA256

                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                              SHA512

                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              a6ea7bfcd3aac150c0caef765cb52281

                                                                              SHA1

                                                                              037dc22c46a0eb0b9ad4c74088129e387cffe96b

                                                                              SHA256

                                                                              f019af2e5e74cdf13c963910500f9436c66b6f2901f5056d72f82310f20113b9

                                                                              SHA512

                                                                              c8d2d373b48a26cf6eec1f5cfc05819011a3fc49d863820ad07b6442dd6d5f64e27022a9e4c381eb58bf7f6b19f8e77d508734ff803073ec2fb32da9081b6f23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              944B

                                                                              MD5

                                                                              77d622bb1a5b250869a3238b9bc1402b

                                                                              SHA1

                                                                              d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                              SHA256

                                                                              f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                              SHA512

                                                                              d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                            • C:\Users\Admin\AppData\Local\Temp\1ACC.exe

                                                                              Filesize

                                                                              6.4MB

                                                                              MD5

                                                                              faa78f58b4f091f8c56ea622d8576703

                                                                              SHA1

                                                                              2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

                                                                              SHA256

                                                                              464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

                                                                              SHA512

                                                                              3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

                                                                            • C:\Users\Admin\AppData\Local\Temp\1ACC.exe

                                                                              Filesize

                                                                              6.4MB

                                                                              MD5

                                                                              faa78f58b4f091f8c56ea622d8576703

                                                                              SHA1

                                                                              2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

                                                                              SHA256

                                                                              464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

                                                                              SHA512

                                                                              3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

                                                                            • C:\Users\Admin\AppData\Local\Temp\270.exe

                                                                              Filesize

                                                                              12.3MB

                                                                              MD5

                                                                              788ae36c88bdc0b60fb4455d833b486c

                                                                              SHA1

                                                                              0e00efd8a59dc6bb0d17589104a1e048d2123877

                                                                              SHA256

                                                                              3ce85883196c60029ea274d02b47b099e5d8b0f8b8acee778605857a51ee72e2

                                                                              SHA512

                                                                              ad47042b3ebd8b9c2153c43046e2a399ddd01350526878493e1f234f7cd8f42356cd6e150ea1b9d70b52cea24a27898cf5f9c8a1be395cca19050fbb173d525d

                                                                            • C:\Users\Admin\AppData\Local\Temp\270.exe

                                                                              Filesize

                                                                              12.3MB

                                                                              MD5

                                                                              788ae36c88bdc0b60fb4455d833b486c

                                                                              SHA1

                                                                              0e00efd8a59dc6bb0d17589104a1e048d2123877

                                                                              SHA256

                                                                              3ce85883196c60029ea274d02b47b099e5d8b0f8b8acee778605857a51ee72e2

                                                                              SHA512

                                                                              ad47042b3ebd8b9c2153c43046e2a399ddd01350526878493e1f234f7cd8f42356cd6e150ea1b9d70b52cea24a27898cf5f9c8a1be395cca19050fbb173d525d

                                                                            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              890bfdf3c7eecbb505c0fdc415f466b3

                                                                              SHA1

                                                                              90889e27be89519f23d85915956d989b75793c8d

                                                                              SHA256

                                                                              e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                                                                              SHA512

                                                                              e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                                                                            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              890bfdf3c7eecbb505c0fdc415f466b3

                                                                              SHA1

                                                                              90889e27be89519f23d85915956d989b75793c8d

                                                                              SHA256

                                                                              e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                                                                              SHA512

                                                                              e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                                                                            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              890bfdf3c7eecbb505c0fdc415f466b3

                                                                              SHA1

                                                                              90889e27be89519f23d85915956d989b75793c8d

                                                                              SHA256

                                                                              e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                                                                              SHA512

                                                                              e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                                                                            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              890bfdf3c7eecbb505c0fdc415f466b3

                                                                              SHA1

                                                                              90889e27be89519f23d85915956d989b75793c8d

                                                                              SHA256

                                                                              e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                                                                              SHA512

                                                                              e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                                                                            • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                                                              Filesize

                                                                              5.3MB

                                                                              MD5

                                                                              00e93456aa5bcf9f60f84b0c0760a212

                                                                              SHA1

                                                                              6096890893116e75bd46fea0b8c3921ceb33f57d

                                                                              SHA256

                                                                              ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                                                                              SHA512

                                                                              abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                                                                            • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                                                              Filesize

                                                                              5.3MB

                                                                              MD5

                                                                              00e93456aa5bcf9f60f84b0c0760a212

                                                                              SHA1

                                                                              6096890893116e75bd46fea0b8c3921ceb33f57d

                                                                              SHA256

                                                                              ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                                                                              SHA512

                                                                              abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                                                                            • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                                                              Filesize

                                                                              5.3MB

                                                                              MD5

                                                                              00e93456aa5bcf9f60f84b0c0760a212

                                                                              SHA1

                                                                              6096890893116e75bd46fea0b8c3921ceb33f57d

                                                                              SHA256

                                                                              ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                                                                              SHA512

                                                                              abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                                                                            • C:\Users\Admin\AppData\Local\Temp\E455.exe

                                                                              Filesize

                                                                              749KB

                                                                              MD5

                                                                              0e26e1121ed601ff7fd85737d055fa29

                                                                              SHA1

                                                                              df51489c205a16a03696222b633aa93778478ae2

                                                                              SHA256

                                                                              f314bec2500fa1f439860c84d2cb0c6f600407d70a40e82b771ad475d69eb74c

                                                                              SHA512

                                                                              7e61a327fc7063c5a4b4958913ad2d3e0fc3107f9cabe9a4961b1f75abdeeb5a8e9ecd6add72e7bf475ed99e8a3bc451ad6465ec5b53706978b70d238516caec

                                                                            • C:\Users\Admin\AppData\Local\Temp\E455.exe

                                                                              Filesize

                                                                              749KB

                                                                              MD5

                                                                              0e26e1121ed601ff7fd85737d055fa29

                                                                              SHA1

                                                                              df51489c205a16a03696222b633aa93778478ae2

                                                                              SHA256

                                                                              f314bec2500fa1f439860c84d2cb0c6f600407d70a40e82b771ad475d69eb74c

                                                                              SHA512

                                                                              7e61a327fc7063c5a4b4958913ad2d3e0fc3107f9cabe9a4961b1f75abdeeb5a8e9ecd6add72e7bf475ed99e8a3bc451ad6465ec5b53706978b70d238516caec

                                                                            • C:\Users\Admin\AppData\Local\Temp\E455.exe

                                                                              Filesize

                                                                              749KB

                                                                              MD5

                                                                              0e26e1121ed601ff7fd85737d055fa29

                                                                              SHA1

                                                                              df51489c205a16a03696222b633aa93778478ae2

                                                                              SHA256

                                                                              f314bec2500fa1f439860c84d2cb0c6f600407d70a40e82b771ad475d69eb74c

                                                                              SHA512

                                                                              7e61a327fc7063c5a4b4958913ad2d3e0fc3107f9cabe9a4961b1f75abdeeb5a8e9ecd6add72e7bf475ed99e8a3bc451ad6465ec5b53706978b70d238516caec

                                                                            • C:\Users\Admin\AppData\Local\Temp\E455.exe

                                                                              Filesize

                                                                              749KB

                                                                              MD5

                                                                              0e26e1121ed601ff7fd85737d055fa29

                                                                              SHA1

                                                                              df51489c205a16a03696222b633aa93778478ae2

                                                                              SHA256

                                                                              f314bec2500fa1f439860c84d2cb0c6f600407d70a40e82b771ad475d69eb74c

                                                                              SHA512

                                                                              7e61a327fc7063c5a4b4958913ad2d3e0fc3107f9cabe9a4961b1f75abdeeb5a8e9ecd6add72e7bf475ed99e8a3bc451ad6465ec5b53706978b70d238516caec

                                                                            • C:\Users\Admin\AppData\Local\Temp\E455.exe

                                                                              Filesize

                                                                              749KB

                                                                              MD5

                                                                              0e26e1121ed601ff7fd85737d055fa29

                                                                              SHA1

                                                                              df51489c205a16a03696222b633aa93778478ae2

                                                                              SHA256

                                                                              f314bec2500fa1f439860c84d2cb0c6f600407d70a40e82b771ad475d69eb74c

                                                                              SHA512

                                                                              7e61a327fc7063c5a4b4958913ad2d3e0fc3107f9cabe9a4961b1f75abdeeb5a8e9ecd6add72e7bf475ed99e8a3bc451ad6465ec5b53706978b70d238516caec

                                                                            • C:\Users\Admin\AppData\Local\Temp\E60B.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              07b22a19dbffdd26d196f01a543b7856

                                                                              SHA1

                                                                              90da954671980cf9463ef5cf1751dcd32be796dd

                                                                              SHA256

                                                                              e63d06f5e2de4cd492df7504300b5fa53b0dded5a23dac408b2778811d6b45e2

                                                                              SHA512

                                                                              f389ad558708d10df9427539b85094a4b149c49dfb92bd4e48aa518dc3a52f0d9a890b9b152f4873b81381beaaf749d8dc6262293a0035d999fb6439abe6753c

                                                                            • C:\Users\Admin\AppData\Local\Temp\E60B.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              07b22a19dbffdd26d196f01a543b7856

                                                                              SHA1

                                                                              90da954671980cf9463ef5cf1751dcd32be796dd

                                                                              SHA256

                                                                              e63d06f5e2de4cd492df7504300b5fa53b0dded5a23dac408b2778811d6b45e2

                                                                              SHA512

                                                                              f389ad558708d10df9427539b85094a4b149c49dfb92bd4e48aa518dc3a52f0d9a890b9b152f4873b81381beaaf749d8dc6262293a0035d999fb6439abe6753c

                                                                            • C:\Users\Admin\AppData\Local\Temp\E8AC.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              110420eeb8d1004a45bca1a06e214705

                                                                              SHA1

                                                                              a0070b19dcf83a7f630f2a02fde93faac1a75633

                                                                              SHA256

                                                                              6afc7d0eea79bfc7721b0299c38c99740b57766a1dee973f8ff7219f3cca9dd7

                                                                              SHA512

                                                                              cf9abb3a145cd7359e405d81a5c5c2d23296c854cd28096184725d7ef853065f7e77187c619a1e1f6d7ee371143f1dae8237a471418e91136985caeef68cd4e3

                                                                            • C:\Users\Admin\AppData\Local\Temp\E8AC.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              110420eeb8d1004a45bca1a06e214705

                                                                              SHA1

                                                                              a0070b19dcf83a7f630f2a02fde93faac1a75633

                                                                              SHA256

                                                                              6afc7d0eea79bfc7721b0299c38c99740b57766a1dee973f8ff7219f3cca9dd7

                                                                              SHA512

                                                                              cf9abb3a145cd7359e405d81a5c5c2d23296c854cd28096184725d7ef853065f7e77187c619a1e1f6d7ee371143f1dae8237a471418e91136985caeef68cd4e3

                                                                            • C:\Users\Admin\AppData\Local\Temp\EB0F.dll

                                                                              Filesize

                                                                              1.6MB

                                                                              MD5

                                                                              4164fa66f608eb71f038fa7ee6ece5bc

                                                                              SHA1

                                                                              d879704e3d4f1ddb97cde3100962dfb684458c27

                                                                              SHA256

                                                                              b43fbe5adf27e984234a4abff46adc22241bcb5b894ce7b518aa024a4c6556f8

                                                                              SHA512

                                                                              35dbc13c03cb155ad920fc82de78456cc0aa174671a7ac96953693111596be2bd30e4a0d35e2002f66ddc4e3341f90c3a2d71f35607eaca4673e6a5b6b76edb0

                                                                            • C:\Users\Admin\AppData\Local\Temp\EB0F.dll

                                                                              Filesize

                                                                              1.6MB

                                                                              MD5

                                                                              4164fa66f608eb71f038fa7ee6ece5bc

                                                                              SHA1

                                                                              d879704e3d4f1ddb97cde3100962dfb684458c27

                                                                              SHA256

                                                                              b43fbe5adf27e984234a4abff46adc22241bcb5b894ce7b518aa024a4c6556f8

                                                                              SHA512

                                                                              35dbc13c03cb155ad920fc82de78456cc0aa174671a7ac96953693111596be2bd30e4a0d35e2002f66ddc4e3341f90c3a2d71f35607eaca4673e6a5b6b76edb0

                                                                            • C:\Users\Admin\AppData\Local\Temp\F33.exe

                                                                              Filesize

                                                                              335KB

                                                                              MD5

                                                                              8d3a2e319a935c158635ec1f0ace1168

                                                                              SHA1

                                                                              6329c10b4736656ad5672fbdd9bc7cbf17f77ede

                                                                              SHA256

                                                                              61eb71b3c8071bd85f29346c9d019eb9d1ebad2fdb5c9689dce3bd4a0c54ecc4

                                                                              SHA512

                                                                              24f001683f31af188e2f1bbf2a39f7f1e28f1a24f9b980c28fe0bf68023057bf5eb5d3d2e5ee495a7919d1be1e7a66e616908220ac13694ab8e90d2b993845b7

                                                                            • C:\Users\Admin\AppData\Local\Temp\F33.exe

                                                                              Filesize

                                                                              335KB

                                                                              MD5

                                                                              8d3a2e319a935c158635ec1f0ace1168

                                                                              SHA1

                                                                              6329c10b4736656ad5672fbdd9bc7cbf17f77ede

                                                                              SHA256

                                                                              61eb71b3c8071bd85f29346c9d019eb9d1ebad2fdb5c9689dce3bd4a0c54ecc4

                                                                              SHA512

                                                                              24f001683f31af188e2f1bbf2a39f7f1e28f1a24f9b980c28fe0bf68023057bf5eb5d3d2e5ee495a7919d1be1e7a66e616908220ac13694ab8e90d2b993845b7

                                                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              cba9c1d1fcbf999d9ccb04050c5c5154

                                                                              SHA1

                                                                              554e436c9c3f1f16c9a9b7ab74dd4cd191118481

                                                                              SHA256

                                                                              c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842

                                                                              SHA512

                                                                              c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b

                                                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              cba9c1d1fcbf999d9ccb04050c5c5154

                                                                              SHA1

                                                                              554e436c9c3f1f16c9a9b7ab74dd4cd191118481

                                                                              SHA256

                                                                              c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842

                                                                              SHA512

                                                                              c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b

                                                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              cba9c1d1fcbf999d9ccb04050c5c5154

                                                                              SHA1

                                                                              554e436c9c3f1f16c9a9b7ab74dd4cd191118481

                                                                              SHA256

                                                                              c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842

                                                                              SHA512

                                                                              c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b

                                                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              d56df2995b539368495f3300e48d8e18

                                                                              SHA1

                                                                              8d2d02923afb5fb5e09ce1592104db17a3128246

                                                                              SHA256

                                                                              b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

                                                                              SHA512

                                                                              2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

                                                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                                                                              Filesize

                                                                              2.3MB

                                                                              MD5

                                                                              d56df2995b539368495f3300e48d8e18

                                                                              SHA1

                                                                              8d2d02923afb5fb5e09ce1592104db17a3128246

                                                                              SHA256

                                                                              b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

                                                                              SHA512

                                                                              2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3ot2jbno.l43.ps1

                                                                              Filesize

                                                                              60B

                                                                              MD5

                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                              SHA1

                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                              SHA256

                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                              SHA512

                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                              Filesize

                                                                              281KB

                                                                              MD5

                                                                              d98e33b66343e7c96158444127a117f6

                                                                              SHA1

                                                                              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                              SHA256

                                                                              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                              SHA512

                                                                              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                              Filesize

                                                                              281KB

                                                                              MD5

                                                                              d98e33b66343e7c96158444127a117f6

                                                                              SHA1

                                                                              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                              SHA256

                                                                              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                              SHA512

                                                                              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              949ec0b69598677e2a1413d267e96c29

                                                                              SHA1

                                                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                                                              SHA256

                                                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                                                              SHA512

                                                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              949ec0b69598677e2a1413d267e96c29

                                                                              SHA1

                                                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                                                              SHA256

                                                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                                                              SHA512

                                                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              949ec0b69598677e2a1413d267e96c29

                                                                              SHA1

                                                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                                                              SHA256

                                                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                                                              SHA512

                                                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              949ec0b69598677e2a1413d267e96c29

                                                                              SHA1

                                                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                                                              SHA256

                                                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                                                              SHA512

                                                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                                                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                              Filesize

                                                                              5.6MB

                                                                              MD5

                                                                              bae29e49e8190bfbbf0d77ffab8de59d

                                                                              SHA1

                                                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                              SHA256

                                                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                              SHA512

                                                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                              Filesize

                                                                              5.6MB

                                                                              MD5

                                                                              bae29e49e8190bfbbf0d77ffab8de59d

                                                                              SHA1

                                                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                              SHA256

                                                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                              SHA512

                                                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                                              Filesize

                                                                              5.6MB

                                                                              MD5

                                                                              bae29e49e8190bfbbf0d77ffab8de59d

                                                                              SHA1

                                                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                                                              SHA256

                                                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                                                              SHA512

                                                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                              Filesize

                                                                              260KB

                                                                              MD5

                                                                              23a3f8ff6a8e447ee8b48e8c9e188123

                                                                              SHA1

                                                                              bdf493ca01d7450de254187f4af38f645d7d5166

                                                                              SHA256

                                                                              9255e00c6aa2208cc146527b062285215b6da58735ac14714d8049611bb6e5d0

                                                                              SHA512

                                                                              645e71d205bce54b02ed4a1442ce009bfd20de89e1fc6e12648cd1c81dfc0a86ebb0e52cda14ed1d3c9bae549fa6530a08c8a75fdbc5568d0498888070bb233a

                                                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                              Filesize

                                                                              260KB

                                                                              MD5

                                                                              23a3f8ff6a8e447ee8b48e8c9e188123

                                                                              SHA1

                                                                              bdf493ca01d7450de254187f4af38f645d7d5166

                                                                              SHA256

                                                                              9255e00c6aa2208cc146527b062285215b6da58735ac14714d8049611bb6e5d0

                                                                              SHA512

                                                                              645e71d205bce54b02ed4a1442ce009bfd20de89e1fc6e12648cd1c81dfc0a86ebb0e52cda14ed1d3c9bae549fa6530a08c8a75fdbc5568d0498888070bb233a

                                                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                              Filesize

                                                                              260KB

                                                                              MD5

                                                                              23a3f8ff6a8e447ee8b48e8c9e188123

                                                                              SHA1

                                                                              bdf493ca01d7450de254187f4af38f645d7d5166

                                                                              SHA256

                                                                              9255e00c6aa2208cc146527b062285215b6da58735ac14714d8049611bb6e5d0

                                                                              SHA512

                                                                              645e71d205bce54b02ed4a1442ce009bfd20de89e1fc6e12648cd1c81dfc0a86ebb0e52cda14ed1d3c9bae549fa6530a08c8a75fdbc5568d0498888070bb233a

                                                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                                              Filesize

                                                                              260KB

                                                                              MD5

                                                                              23a3f8ff6a8e447ee8b48e8c9e188123

                                                                              SHA1

                                                                              bdf493ca01d7450de254187f4af38f645d7d5166

                                                                              SHA256

                                                                              9255e00c6aa2208cc146527b062285215b6da58735ac14714d8049611bb6e5d0

                                                                              SHA512

                                                                              645e71d205bce54b02ed4a1442ce009bfd20de89e1fc6e12648cd1c81dfc0a86ebb0e52cda14ed1d3c9bae549fa6530a08c8a75fdbc5568d0498888070bb233a

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              968cb9309758126772781b83adb8a28f

                                                                              SHA1

                                                                              8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                                              SHA256

                                                                              92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                                              SHA512

                                                                              4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              132633a61efab55785c6bc4d6b496eb8

                                                                              SHA1

                                                                              b88016f9737846a39c5e5cc269789a9f6255579d

                                                                              SHA256

                                                                              58b4c9cd9eef7d5cd801110bb33e15e3422e8a3fb9963c0126bbb9ca17d24e58

                                                                              SHA512

                                                                              16a7c4bbdbe09a0d69067217d1ef0aa9a25570fdbec6d4fcdc51db8aab7e977fdd76f931c4704511114a7723c7b5bef852ec1168897dcaae61d1be6966d85ee5

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              132633a61efab55785c6bc4d6b496eb8

                                                                              SHA1

                                                                              b88016f9737846a39c5e5cc269789a9f6255579d

                                                                              SHA256

                                                                              58b4c9cd9eef7d5cd801110bb33e15e3422e8a3fb9963c0126bbb9ca17d24e58

                                                                              SHA512

                                                                              16a7c4bbdbe09a0d69067217d1ef0aa9a25570fdbec6d4fcdc51db8aab7e977fdd76f931c4704511114a7723c7b5bef852ec1168897dcaae61d1be6966d85ee5

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              d2e093a91fdf29c3fca7d7720aef4b19

                                                                              SHA1

                                                                              304cb1478b93a80308c67986a19992f1e61ce134

                                                                              SHA256

                                                                              957a10134645a5c1926a494da8b813c107a253d43aa078bb33c12fbdcce24126

                                                                              SHA512

                                                                              5b328a5af1e70ed1afca8d0bd2a2a45b82ae91b185504361158a64fe26dcfa5a63a4eed81fe97dd0e9f830c2acfff78f4034ccac696d15d4d53890b8e6ae6812

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              d2e093a91fdf29c3fca7d7720aef4b19

                                                                              SHA1

                                                                              304cb1478b93a80308c67986a19992f1e61ce134

                                                                              SHA256

                                                                              957a10134645a5c1926a494da8b813c107a253d43aa078bb33c12fbdcce24126

                                                                              SHA512

                                                                              5b328a5af1e70ed1afca8d0bd2a2a45b82ae91b185504361158a64fe26dcfa5a63a4eed81fe97dd0e9f830c2acfff78f4034ccac696d15d4d53890b8e6ae6812

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              80c69355aeb67e0976864be1e433d1da

                                                                              SHA1

                                                                              b2b34c23c8da55cd0c66dde9a289fdb3af5349e0

                                                                              SHA256

                                                                              0e5f2da57e23185f326035d24c6ee173643906e996327f14619b33fec1331e5a

                                                                              SHA512

                                                                              6a4df877c85830b407e075e397ee18dd2765c575161e90c2b6f5ecefb78675278e8c12fc50240a91be036a12625b904cb683199f0106d6bb901f05c08c6dafda

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              80c69355aeb67e0976864be1e433d1da

                                                                              SHA1

                                                                              b2b34c23c8da55cd0c66dde9a289fdb3af5349e0

                                                                              SHA256

                                                                              0e5f2da57e23185f326035d24c6ee173643906e996327f14619b33fec1331e5a

                                                                              SHA512

                                                                              6a4df877c85830b407e075e397ee18dd2765c575161e90c2b6f5ecefb78675278e8c12fc50240a91be036a12625b904cb683199f0106d6bb901f05c08c6dafda

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              430a79edce751861392ac6abf94d77cc

                                                                              SHA1

                                                                              0487ca9fcc614ea3ce5d34b8ffaaafdb78698a58

                                                                              SHA256

                                                                              77265d95648bc9a17470572d8c86ee6613900b08fa5414871606046e142197e1

                                                                              SHA512

                                                                              68349205d3bc94c8d851262c08423077bf967604eb21395d17783edbfe4733a9617c7f1374243945d0a15135f869f1089c3b8588e87ebc1b94aabe0fa9164f19

                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              b5b3ca88d52e7d763067e30ac64cf475

                                                                              SHA1

                                                                              7e02eb48d18a9ad632cc22171f6ca4b99de4f56b

                                                                              SHA256

                                                                              91c11112c5660f12fc2a2b9cc90d68e00006b8355fcde0389ec6ab0a54ee5821

                                                                              SHA512

                                                                              44cd664150e558b59dd690d013f5d8426cbd01e88737a3fcba4ecc2d6a1a2e56c598c2a18f3c8fb1d2c4c74d0b7957de965147bdd257cb251fc1c4446b872bae

                                                                            • C:\Windows\System32\drivers\etc\hosts

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              00930b40cba79465b7a38ed0449d1449

                                                                              SHA1

                                                                              4b25a89ee28b20ba162f23772ddaf017669092a5

                                                                              SHA256

                                                                              eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                                                              SHA512

                                                                              cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                                                            • C:\Windows\rss\csrss.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              949ec0b69598677e2a1413d267e96c29

                                                                              SHA1

                                                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                                                              SHA256

                                                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                                                              SHA512

                                                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                                                            • C:\Windows\rss\csrss.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              949ec0b69598677e2a1413d267e96c29

                                                                              SHA1

                                                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                                                              SHA256

                                                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                                                              SHA512

                                                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              bdb25c22d14ec917e30faf353826c5de

                                                                              SHA1

                                                                              6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                                                                              SHA256

                                                                              e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                                                                              SHA512

                                                                              b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              b42c70c1dbf0d1d477ec86902db9e986

                                                                              SHA1

                                                                              1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                                                                              SHA256

                                                                              8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                                                                              SHA512

                                                                              57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                                                                            • C:\Windows\windefender.exe

                                                                              Filesize

                                                                              2.0MB

                                                                              MD5

                                                                              8e67f58837092385dcf01e8a2b4f5783

                                                                              SHA1

                                                                              012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                              SHA256

                                                                              166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                              SHA512

                                                                              40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                            • C:\Windows\windefender.exe

                                                                              Filesize

                                                                              2.0MB

                                                                              MD5

                                                                              8e67f58837092385dcf01e8a2b4f5783

                                                                              SHA1

                                                                              012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                              SHA256

                                                                              166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                              SHA512

                                                                              40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                            • C:\Windows\windefender.exe

                                                                              Filesize

                                                                              2.0MB

                                                                              MD5

                                                                              8e67f58837092385dcf01e8a2b4f5783

                                                                              SHA1

                                                                              012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                              SHA256

                                                                              166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                              SHA512

                                                                              40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                            • memory/336-112-0x00000000004D0000-0x000000000053B000-memory.dmp

                                                                              Filesize

                                                                              428KB

                                                                            • memory/336-118-0x0000000000540000-0x00000000005C0000-memory.dmp

                                                                              Filesize

                                                                              512KB

                                                                            • memory/336-187-0x00000000004D0000-0x000000000053B000-memory.dmp

                                                                              Filesize

                                                                              428KB

                                                                            • memory/336-119-0x00000000004D0000-0x000000000053B000-memory.dmp

                                                                              Filesize

                                                                              428KB

                                                                            • memory/1104-152-0x0000000002250000-0x00000000022E4000-memory.dmp

                                                                              Filesize

                                                                              592KB

                                                                            • memory/1104-153-0x00000000022F0000-0x000000000240B000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/1308-95-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1308-195-0x0000000000400000-0x0000000000965000-memory.dmp

                                                                              Filesize

                                                                              5.4MB

                                                                            • memory/1308-217-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1396-208-0x00000000009A0000-0x00000000009A9000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/1396-207-0x0000000000B70000-0x0000000000C70000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1732-197-0x0000000002730000-0x0000000002731000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1732-205-0x0000000000400000-0x0000000000965000-memory.dmp

                                                                              Filesize

                                                                              5.4MB

                                                                            • memory/1884-260-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/1884-261-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/1884-263-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/1948-539-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/1948-576-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/1976-54-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/1976-115-0x0000000007CF0000-0x0000000007D56000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/1976-206-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/1976-53-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                              Filesize

                                                                              240KB

                                                                            • memory/1976-61-0x00000000079E0000-0x00000000079F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/1976-218-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/1976-212-0x00000000079E0000-0x00000000079F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2024-178-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/2024-117-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/2024-109-0x00000000002F0000-0x0000000000964000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/2216-103-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/2216-59-0x0000000073900000-0x00000000740B0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/2216-60-0x0000000000230000-0x0000000000E7E000-memory.dmp

                                                                              Filesize

                                                                              12.3MB

                                                                            • memory/2280-39-0x0000000000600000-0x0000000000606000-memory.dmp

                                                                              Filesize

                                                                              24KB

                                                                            • memory/2280-110-0x0000000010000000-0x0000000010192000-memory.dmp

                                                                              Filesize

                                                                              1.6MB

                                                                            • memory/2280-160-0x00000000024C0000-0x00000000025D0000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/2280-111-0x0000000002390000-0x00000000024BD000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/2280-174-0x00000000024C0000-0x00000000025D0000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/2280-168-0x00000000024C0000-0x00000000025D0000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/2280-38-0x0000000010000000-0x0000000010192000-memory.dmp

                                                                              Filesize

                                                                              1.6MB

                                                                            • memory/2508-198-0x0000000009AF0000-0x0000000009CB2000-memory.dmp

                                                                              Filesize

                                                                              1.8MB

                                                                            • memory/2508-50-0x00000000080B0000-0x00000000080C2000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/2508-199-0x000000000A1F0000-0x000000000A71C000-memory.dmp

                                                                              Filesize

                                                                              5.2MB

                                                                            • memory/2508-46-0x0000000007E20000-0x0000000007EB2000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/2508-31-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-33-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-47-0x0000000007FD0000-0x0000000007FDA000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/2508-35-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-121-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-34-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-48-0x0000000008F00000-0x0000000009518000-memory.dmp

                                                                              Filesize

                                                                              6.1MB

                                                                            • memory/2508-49-0x00000000081E0000-0x00000000082EA000-memory.dmp

                                                                              Filesize

                                                                              1.0MB

                                                                            • memory/2508-113-0x0000000000360000-0x0000000000A1E000-memory.dmp

                                                                              Filesize

                                                                              6.7MB

                                                                            • memory/2508-167-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-52-0x0000000008150000-0x000000000819C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/2508-122-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-36-0x0000000077D04000-0x0000000077D06000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2508-123-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-51-0x0000000008110000-0x000000000814C000-memory.dmp

                                                                              Filesize

                                                                              240KB

                                                                            • memory/2508-200-0x00000000099B0000-0x0000000009A00000-memory.dmp

                                                                              Filesize

                                                                              320KB

                                                                            • memory/2508-30-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-114-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-44-0x0000000000360000-0x0000000000A1E000-memory.dmp

                                                                              Filesize

                                                                              6.7MB

                                                                            • memory/2508-150-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-28-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-26-0x0000000000360000-0x0000000000A1E000-memory.dmp

                                                                              Filesize

                                                                              6.7MB

                                                                            • memory/2508-149-0x00000000764D0000-0x00000000765C0000-memory.dmp

                                                                              Filesize

                                                                              960KB

                                                                            • memory/2508-45-0x0000000008330000-0x00000000088D4000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/2980-326-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/2980-226-0x0000000002D70000-0x000000000365B000-memory.dmp

                                                                              Filesize

                                                                              8.9MB

                                                                            • memory/2980-224-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/2980-375-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/2980-216-0x0000000002970000-0x0000000002D6C000-memory.dmp

                                                                              Filesize

                                                                              4.0MB

                                                                            • memory/3128-279-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/3128-376-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/3136-230-0x00000000027C0000-0x00000000027D6000-memory.dmp

                                                                              Filesize

                                                                              88KB

                                                                            • memory/3136-4-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                                                                              Filesize

                                                                              88KB

                                                                            • memory/3452-5-0x0000000000400000-0x00000000004F2000-memory.dmp

                                                                              Filesize

                                                                              968KB

                                                                            • memory/3452-2-0x00000000005D0000-0x00000000005DB000-memory.dmp

                                                                              Filesize

                                                                              44KB

                                                                            • memory/3452-3-0x0000000000400000-0x00000000004F2000-memory.dmp

                                                                              Filesize

                                                                              968KB

                                                                            • memory/3452-1-0x0000000000610000-0x0000000000710000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/3696-540-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/3696-578-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                              Filesize

                                                                              9.1MB

                                                                            • memory/3984-321-0x00007FF603370000-0x00007FF603911000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/3984-196-0x00007FF603370000-0x00007FF603911000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/4036-129-0x00000000005C0000-0x00000000005CC000-memory.dmp

                                                                              Filesize

                                                                              48KB

                                                                            • memory/4036-120-0x00000000005C0000-0x00000000005CC000-memory.dmp

                                                                              Filesize

                                                                              48KB

                                                                            • memory/4036-128-0x00000000005D0000-0x00000000005D7000-memory.dmp

                                                                              Filesize

                                                                              28KB

                                                                            • memory/4184-377-0x00007FF725C50000-0x00007FF7261F1000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/4304-231-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/4304-210-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/4304-213-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/4408-219-0x0000000002E80000-0x0000000002F80000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/4408-220-0x00000000046E0000-0x00000000046EB000-memory.dmp

                                                                              Filesize

                                                                              44KB

                                                                            • memory/4408-221-0x0000000000400000-0x0000000002ACB000-memory.dmp

                                                                              Filesize

                                                                              38.8MB

                                                                            • memory/4708-169-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/4708-158-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/4708-156-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/4708-161-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/4708-192-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/4764-236-0x00007FFB30940000-0x00007FFB31401000-memory.dmp

                                                                              Filesize

                                                                              10.8MB