Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 23:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231130-en
General
-
Target
file.exe
-
Size
340KB
-
MD5
b569202fea07ae8dd728f83277c386b5
-
SHA1
a1a7335d768c5d03c410fb9ddf8e9c0d952ef201
-
SHA256
985cead0658efef2c45367595df24ac3a69c5b053fb79393668895a95dce3435
-
SHA512
cb5c70f4c366d249bb527c4ef4cb9b179aafe1c79b14edf5c87de22d227303ccdadf9fb74c45d5bbf43e1d75c7f0154c055deac5828d228c3b92e1658b720e91
-
SSDEEP
3072:hun18CsLp9YTbYSebkOWkndBFQX+TuPPPPPPPPt0hyv3mzcwdsTwZSX2dGpeJtiN:U1zepbNWkndrnILvn8jZSXAnifa
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
smokeloader
pub1
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
45.15.156.187:23929
Signatures
-
Glupteba payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/4876-74-0x00000000030E0000-0x00000000039CB000-memory.dmp family_glupteba behavioral2/memory/4876-75-0x0000000000400000-0x0000000000F98000-memory.dmp family_glupteba behavioral2/memory/4876-294-0x0000000000400000-0x0000000000F98000-memory.dmp family_glupteba behavioral2/memory/4876-303-0x0000000000400000-0x0000000000F98000-memory.dmp family_glupteba behavioral2/memory/4876-316-0x0000000000400000-0x0000000000F98000-memory.dmp family_glupteba behavioral2/memory/4876-443-0x0000000000400000-0x0000000000F98000-memory.dmp family_glupteba behavioral2/memory/3588-491-0x0000000000400000-0x0000000000F98000-memory.dmp family_glupteba -
Raccoon Stealer V2 payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2980-20-0x0000000002460000-0x0000000002476000-memory.dmp family_raccoon_v2 behavioral2/memory/2980-21-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 behavioral2/memory/2980-72-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 behavioral2/memory/2980-239-0x0000000002460000-0x0000000002476000-memory.dmp family_raccoon_v2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3384-262-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
C7E6.exemi.exeupdater.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C7E6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mi.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
mi.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts mi.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
C7E6.exemi.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C7E6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C7E6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Deletes itself 1 IoCs
Processes:
pid process 3368 -
Executes dropped EXE 16 IoCs
Processes:
B805.exeC7E6.exeschtasks.exeDCA8.exeE3FC.exeE3FC.tmppowercfg.exevoiceassist.exevoiceassist.exemi.exeDCA8.execsrss.exeinjector.exeupdater.exewindefender.exewindefender.exepid process 2980 B805.exe 3824 C7E6.exe 4436 schtasks.exe 4876 DCA8.exe 1688 E3FC.exe 4272 E3FC.tmp 5072 powercfg.exe 2464 voiceassist.exe 4904 voiceassist.exe 2984 mi.exe 3588 DCA8.exe 1100 csrss.exe 1596 injector.exe 876 updater.exe 4996 windefender.exe 4224 windefender.exe -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exeE3FC.tmppid process 2300 regsvr32.exe 4272 E3FC.tmp 4272 E3FC.tmp 4272 E3FC.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\C7E6.exe themida C:\Users\Admin\AppData\Local\Temp\C7E6.exe themida behavioral2/memory/3824-49-0x0000000000CD0000-0x00000000018D4000-memory.dmp themida behavioral2/memory/3824-50-0x0000000000CD0000-0x00000000018D4000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\mi.exe themida C:\Users\Admin\AppData\Local\Temp\mi.exe themida C:\Users\Admin\AppData\Local\Temp\mi.exe themida behavioral2/memory/2984-360-0x00007FF784290000-0x00007FF784FF0000-memory.dmp themida behavioral2/memory/2984-366-0x00007FF784290000-0x00007FF784FF0000-memory.dmp themida behavioral2/memory/2984-367-0x00007FF784290000-0x00007FF784FF0000-memory.dmp themida C:\ProgramData\Google\Chrome\updater.exe themida C:\ProgramData\Google\Chrome\updater.exe themida behavioral2/memory/2984-614-0x00007FF784290000-0x00007FF784FF0000-memory.dmp themida behavioral2/memory/876-619-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmp themida behavioral2/memory/876-621-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmp themida behavioral2/memory/876-622-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Conhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Conhost.exe Key opened \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Conhost.exe Key opened \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Conhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
csrss.exeDCA8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" DCA8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
C7E6.exemi.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C7E6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 11 IoCs
Processes:
updater.exepowershell.exepowershell.exeConhost.exepowershell.exemi.exepowershell.exesc.exeConhost.exedescription ioc process File opened for modification C:\Windows\system32\MRT.exe updater.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\MRT.exe mi.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive sc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
C7E6.exemi.exeupdater.exepid process 3824 C7E6.exe 2984 mi.exe 876 updater.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powercfg.exeupdater.exedescription pid process target process PID 5072 set thread context of 3384 5072 powercfg.exe sc.exe PID 876 set thread context of 4344 876 updater.exe conhost.exe PID 876 set thread context of 544 876 updater.exe explorer.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
DCA8.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN DCA8.exe -
Drops file in Program Files directory 63 IoCs
Processes:
E3FC.tmpdescription ioc process File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-LVRHT.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-2OJBP.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-T2032.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-463ES.tmp E3FC.tmp File opened for modification C:\Program Files (x86)\VoiceAssistant\uninstall\unins000.dat E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-V0MDP.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-MEQSG.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-8K393.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-9CPVV.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\is-42J32.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-QH6AE.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-QK2CL.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-S8VMM.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-EFV6L.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-CQ949.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-7AKFI.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\lessmsi\is-H0RJ4.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-VL4HG.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-KRC1K.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-0G15U.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-M47V0.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-HO65B.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-NALG0.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-ANOHG.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-A363D.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-T79JM.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-5BLF2.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-3VGK7.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-U1BTE.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-5QPDK.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-BJSOS.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-EPQJU.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-THV4P.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-6DL1E.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-S19NH.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-12TFV.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\plugins\internal\is-CHL36.tmp E3FC.tmp File opened for modification C:\Program Files (x86)\VoiceAssistant\voiceassist.exe E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\uninstall\is-AE09F.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-QD7V6.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-49Q8A.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-1RI2O.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-IPDFT.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-4LPAK.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-744BO.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-KDS1K.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-M4UH2.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-9GGJV.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-QGTIT.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\uninstall\unins000.dat E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-LLLU3.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-O3L8L.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\plugins\internal\is-KI12M.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-V3F4B.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-U1TCJ.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-12PJG.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-TRK4T.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-1FU9M.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-NT1B1.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-E9J8G.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-RR1Q0.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-TJJ3H.tmp E3FC.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-C9GTL.tmp E3FC.tmp -
Drops file in Windows directory 4 IoCs
Processes:
DCA8.execsrss.exedescription ioc process File opened for modification C:\Windows\rss DCA8.exe File created C:\Windows\rss\csrss.exe DCA8.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2580 sc.exe 3192 sc.exe 4984 sc.exe 4344 sc.exe 3876 sc.exe 4204 sc.exe 3592 sc.exe 3384 sc.exe 1820 sc.exe 4476 sc.exe 2868 sc.exe 4504 sc.exe 4488 sc.exe 4548 sc.exe 1752 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4596 2980 WerFault.exe B805.exe 1312 4548 WerFault.exe powershell.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
schtasks.exefile.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI schtasks.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI schtasks.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2128 schtasks.exe 3580 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exesc.exeDCA8.exeConhost.exepowershell.exewindefender.exeConhost.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ sc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" DCA8.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" DCA8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" DCA8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 3936 file.exe 3936 file.exe 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
file.exeschtasks.exepid process 3936 file.exe 3368 3368 4436 schtasks.exe 3368 3368 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
C7E6.exesc.exesc.exeDCA8.exepowershell.exesc.exepowershell.exeConhost.exeConhost.exepowershell.execsrss.exepowershell.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 3824 C7E6.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 3384 sc.exe Token: SeDebugPrivilege 4548 sc.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 4876 DCA8.exe Token: SeImpersonatePrivilege 4876 DCA8.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 1820 sc.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 4928 powershell.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 4836 Conhost.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 1540 Conhost.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeDebugPrivilege 3364 powershell.exe Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeSystemEnvironmentPrivilege 1100 csrss.exe Token: SeDebugPrivilege 3140 powershell.exe Token: SeShutdownPrivilege 5072 powercfg.exe Token: SeCreatePagefilePrivilege 5072 powercfg.exe Token: SeShutdownPrivilege 1528 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
E3FC.tmppid process 4272 E3FC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeE3FC.exeE3FC.tmppowercfg.exenet.exeDCA8.exesc.exeDCA8.exedescription pid process target process PID 3368 wrote to memory of 2980 3368 B805.exe PID 3368 wrote to memory of 2980 3368 B805.exe PID 3368 wrote to memory of 2980 3368 B805.exe PID 3368 wrote to memory of 3908 3368 regsvr32.exe PID 3368 wrote to memory of 3908 3368 regsvr32.exe PID 3908 wrote to memory of 2300 3908 regsvr32.exe regsvr32.exe PID 3908 wrote to memory of 2300 3908 regsvr32.exe regsvr32.exe PID 3908 wrote to memory of 2300 3908 regsvr32.exe regsvr32.exe PID 3368 wrote to memory of 3824 3368 C7E6.exe PID 3368 wrote to memory of 3824 3368 C7E6.exe PID 3368 wrote to memory of 3824 3368 C7E6.exe PID 3368 wrote to memory of 4436 3368 schtasks.exe PID 3368 wrote to memory of 4436 3368 schtasks.exe PID 3368 wrote to memory of 4436 3368 schtasks.exe PID 3368 wrote to memory of 4876 3368 DCA8.exe PID 3368 wrote to memory of 4876 3368 DCA8.exe PID 3368 wrote to memory of 4876 3368 DCA8.exe PID 3368 wrote to memory of 1688 3368 E3FC.exe PID 3368 wrote to memory of 1688 3368 E3FC.exe PID 3368 wrote to memory of 1688 3368 E3FC.exe PID 1688 wrote to memory of 4272 1688 E3FC.exe E3FC.tmp PID 1688 wrote to memory of 4272 1688 E3FC.exe E3FC.tmp PID 1688 wrote to memory of 4272 1688 E3FC.exe E3FC.tmp PID 4272 wrote to memory of 4004 4272 E3FC.tmp schtasks.exe PID 4272 wrote to memory of 4004 4272 E3FC.tmp schtasks.exe PID 4272 wrote to memory of 4004 4272 E3FC.tmp schtasks.exe PID 3368 wrote to memory of 5072 3368 powercfg.exe PID 3368 wrote to memory of 5072 3368 powercfg.exe PID 3368 wrote to memory of 5072 3368 powercfg.exe PID 4272 wrote to memory of 2464 4272 E3FC.tmp voiceassist.exe PID 4272 wrote to memory of 2464 4272 E3FC.tmp voiceassist.exe PID 4272 wrote to memory of 2464 4272 E3FC.tmp voiceassist.exe PID 3368 wrote to memory of 1924 3368 Conhost.exe PID 3368 wrote to memory of 1924 3368 Conhost.exe PID 3368 wrote to memory of 1924 3368 Conhost.exe PID 3368 wrote to memory of 1924 3368 Conhost.exe PID 4272 wrote to memory of 4524 4272 E3FC.tmp net.exe PID 4272 wrote to memory of 4524 4272 E3FC.tmp net.exe PID 4272 wrote to memory of 4524 4272 E3FC.tmp net.exe PID 4272 wrote to memory of 4904 4272 E3FC.tmp voiceassist.exe PID 4272 wrote to memory of 4904 4272 E3FC.tmp voiceassist.exe PID 4272 wrote to memory of 4904 4272 E3FC.tmp voiceassist.exe PID 3368 wrote to memory of 2668 3368 Conhost.exe PID 3368 wrote to memory of 2668 3368 Conhost.exe PID 3368 wrote to memory of 2668 3368 Conhost.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 5072 wrote to memory of 3384 5072 powercfg.exe sc.exe PID 4524 wrote to memory of 4356 4524 net.exe net1.exe PID 4524 wrote to memory of 4356 4524 net.exe net1.exe PID 4524 wrote to memory of 4356 4524 net.exe net1.exe PID 4876 wrote to memory of 4548 4876 DCA8.exe sc.exe PID 4876 wrote to memory of 4548 4876 DCA8.exe sc.exe PID 4876 wrote to memory of 4548 4876 DCA8.exe sc.exe PID 3384 wrote to memory of 2984 3384 sc.exe mi.exe PID 3384 wrote to memory of 2984 3384 sc.exe mi.exe PID 3588 wrote to memory of 2816 3588 DCA8.exe powershell.exe PID 3588 wrote to memory of 2816 3588 DCA8.exe powershell.exe PID 3588 wrote to memory of 2816 3588 DCA8.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
Conhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Conhost.exe -
outlook_win_path 1 IoCs
Processes:
Conhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\B805.exeC:\Users\Admin\AppData\Local\Temp\B805.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 73002⤵
- Program crash
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\BD75.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\BD75.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\C7E6.exeC:\Users\Admin\AppData\Local\Temp\C7E6.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\D7B6.exeC:\Users\Admin\AppData\Local\Temp\D7B6.exe1⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
-
C:\Users\Admin\AppData\Local\Temp\DCA8.exeC:\Users\Admin\AppData\Local\Temp\DCA8.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 25363⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\DCA8.exe"C:\Users\Admin\AppData\Local\Temp\DCA8.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E3FC.exeC:\Users\Admin\AppData\Local\Temp\E3FC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmp"C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmp" /SL5="$B00E0,7429766,54272,C:\Users\Admin\AppData\Local\Temp\E3FC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exe"C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -i3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exe"C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -s3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 93⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵
-
C:\Users\Admin\AppData\Local\Temp\EA56.exeC:\Users\Admin\AppData\Local\Temp\EA56.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\mi.exe"C:\Users\Admin\AppData\Local\Temp\mi.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Drops file in System32 directory
- Launches sc.exe
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 91⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2980 -ip 29801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4548 -ip 45481⤵
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart1⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
-
C:\Windows\explorer.exeexplorer.exe2⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart1⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exeFilesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exeFilesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exeFilesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
C:\ProgramData\Google\Chrome\updater.exeFilesize
8.0MB
MD507bd860504c44b4f4be2b4749fd05550
SHA1563325377c1d144d06d06052e9adf7f8c8048668
SHA2567a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7
SHA51254129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a
-
C:\ProgramData\Google\Chrome\updater.exeFilesize
8.0MB
MD507bd860504c44b4f4be2b4749fd05550
SHA1563325377c1d144d06d06052e9adf7f8c8048668
SHA2567a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7
SHA51254129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a
-
C:\ProgramData\SHelperTrack\SHelperTrack.exeFilesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
C:\Users\Admin\AppData\Local\Temp\B805.exeFilesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
C:\Users\Admin\AppData\Local\Temp\B805.exeFilesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
C:\Users\Admin\AppData\Local\Temp\BD75.dllFilesize
3.0MB
MD518356cbd55de61190244f9be22cf2f6d
SHA198510c90b004e98090a1462bf056fa916f1f2e0a
SHA256fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8
SHA5125c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe
-
C:\Users\Admin\AppData\Local\Temp\BD75.dllFilesize
3.0MB
MD518356cbd55de61190244f9be22cf2f6d
SHA198510c90b004e98090a1462bf056fa916f1f2e0a
SHA256fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8
SHA5125c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe
-
C:\Users\Admin\AppData\Local\Temp\C7E6.exeFilesize
4.2MB
MD533c6731fb7512630217f405efc5c71b4
SHA1bf483f230f4bbaf53e0610182ef9f94a95dcb67a
SHA2560fb245e80fdb23c83dcef3ee510e7633acb208c1b07b825f0b6764c8faf5700b
SHA512eea6ee3169b2eaecaf84e78e42372d1000938f7eefb0bfb75a1b87a612676f89b1473fdbf1c7c4caf3949dae6eecbb9e39f85fb2abc2d702bdbc8ee3ce60fd55
-
C:\Users\Admin\AppData\Local\Temp\C7E6.exeFilesize
4.2MB
MD533c6731fb7512630217f405efc5c71b4
SHA1bf483f230f4bbaf53e0610182ef9f94a95dcb67a
SHA2560fb245e80fdb23c83dcef3ee510e7633acb208c1b07b825f0b6764c8faf5700b
SHA512eea6ee3169b2eaecaf84e78e42372d1000938f7eefb0bfb75a1b87a612676f89b1473fdbf1c7c4caf3949dae6eecbb9e39f85fb2abc2d702bdbc8ee3ce60fd55
-
C:\Users\Admin\AppData\Local\Temp\D7B6.exeFilesize
340KB
MD580f0d2f7eab0b8bb7e32284c8a3fcf27
SHA16d469130a0dcb848d22ce24fd51f0bd9ef305e31
SHA25655ea853e07226a70d1ba7dc03909ad8bf9ee661b9f040648a4d4dc298253e9ac
SHA51256057f9c3ccaba0ccb4978ec87dca1cbe24ba2d2bab423de62dbcb6a9bd4ba395edb542ec38b16f29c3871a0e7beedbdb29bb669d0f1841f7f339989572bd965
-
C:\Users\Admin\AppData\Local\Temp\D7B6.exeFilesize
340KB
MD580f0d2f7eab0b8bb7e32284c8a3fcf27
SHA16d469130a0dcb848d22ce24fd51f0bd9ef305e31
SHA25655ea853e07226a70d1ba7dc03909ad8bf9ee661b9f040648a4d4dc298253e9ac
SHA51256057f9c3ccaba0ccb4978ec87dca1cbe24ba2d2bab423de62dbcb6a9bd4ba395edb542ec38b16f29c3871a0e7beedbdb29bb669d0f1841f7f339989572bd965
-
C:\Users\Admin\AppData\Local\Temp\DCA8.exeFilesize
4.2MB
MD518830592a0999545b8178136c3d9e630
SHA1c8cf60a1bfda9aa529dcc3513b5575b04b61d31b
SHA256a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902
SHA5123d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2
-
C:\Users\Admin\AppData\Local\Temp\DCA8.exeFilesize
4.2MB
MD518830592a0999545b8178136c3d9e630
SHA1c8cf60a1bfda9aa529dcc3513b5575b04b61d31b
SHA256a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902
SHA5123d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2
-
C:\Users\Admin\AppData\Local\Temp\DCA8.exeFilesize
4.2MB
MD518830592a0999545b8178136c3d9e630
SHA1c8cf60a1bfda9aa529dcc3513b5575b04b61d31b
SHA256a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902
SHA5123d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2
-
C:\Users\Admin\AppData\Local\Temp\E3FC.exeFilesize
7.3MB
MD5e8c0437da3e93b86a42e2b791b1a9130
SHA1746c2032d786ffb969729fc837786bd1a11ea643
SHA256936483a1f1a96b272c7a1e10d3a1fb755303ab8005ba685aae04f5cc35b8cabb
SHA512a838206dff9222771e744d6583ff75d0cab21fc764ff4564be23754b36d1920ecd1f5b2de790ece61564ca513d74d219a518a8f05b793c981344467578d6ac99
-
C:\Users\Admin\AppData\Local\Temp\E3FC.exeFilesize
7.3MB
MD5e8c0437da3e93b86a42e2b791b1a9130
SHA1746c2032d786ffb969729fc837786bd1a11ea643
SHA256936483a1f1a96b272c7a1e10d3a1fb755303ab8005ba685aae04f5cc35b8cabb
SHA512a838206dff9222771e744d6583ff75d0cab21fc764ff4564be23754b36d1920ecd1f5b2de790ece61564ca513d74d219a518a8f05b793c981344467578d6ac99
-
C:\Users\Admin\AppData\Local\Temp\EA56.exeFilesize
1.9MB
MD5095bb001734cdc89303a8783e4f6b2d1
SHA1f985cefe530475b936ed292f1d5b424c1202bee6
SHA25677954d2ba5d002af2dc7ebd549f21ff012a60f37182a3d4fc91d2f973d759f72
SHA51299306e7ff0f2c99f60ce762488b9af12ee58a7384ee076e40b3a03f43131590fed03379a520acb5191cb4d28f157f319b9d648e8fd16a6596d0cdf385bb15478
-
C:\Users\Admin\AppData\Local\Temp\EA56.exeFilesize
1.9MB
MD5095bb001734cdc89303a8783e4f6b2d1
SHA1f985cefe530475b936ed292f1d5b424c1202bee6
SHA25677954d2ba5d002af2dc7ebd549f21ff012a60f37182a3d4fc91d2f973d759f72
SHA51299306e7ff0f2c99f60ce762488b9af12ee58a7384ee076e40b3a03f43131590fed03379a520acb5191cb4d28f157f319b9d648e8fd16a6596d0cdf385bb15478
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dvhufzgj.ukj.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\is-E983L.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-E983L.tmp\_isetup\_isdecmp.dllFilesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
C:\Users\Admin\AppData\Local\Temp\is-E983L.tmp\_isetup\_isdecmp.dllFilesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmpFilesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmpFilesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
C:\Users\Admin\AppData\Local\Temp\mi.exeFilesize
8.0MB
MD507bd860504c44b4f4be2b4749fd05550
SHA1563325377c1d144d06d06052e9adf7f8c8048668
SHA2567a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7
SHA51254129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a
-
C:\Users\Admin\AppData\Local\Temp\mi.exeFilesize
8.0MB
MD507bd860504c44b4f4be2b4749fd05550
SHA1563325377c1d144d06d06052e9adf7f8c8048668
SHA2567a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7
SHA51254129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a
-
C:\Users\Admin\AppData\Local\Temp\mi.exeFilesize
8.0MB
MD507bd860504c44b4f4be2b4749fd05550
SHA1563325377c1d144d06d06052e9adf7f8c8048668
SHA2567a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7
SHA51254129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a
-
C:\Users\Admin\AppData\Roaming\jtfescdFilesize
340KB
MD580f0d2f7eab0b8bb7e32284c8a3fcf27
SHA16d469130a0dcb848d22ce24fd51f0bd9ef305e31
SHA25655ea853e07226a70d1ba7dc03909ad8bf9ee661b9f040648a4d4dc298253e9ac
SHA51256057f9c3ccaba0ccb4978ec87dca1cbe24ba2d2bab423de62dbcb6a9bd4ba395edb542ec38b16f29c3871a0e7beedbdb29bb669d0f1841f7f339989572bd965
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD58facf334bb263090f16a0360f9d366ce
SHA16c634648d902435ef4286189969ca98908b219a1
SHA2566b2dbb2c304c68725d9e17ad8c998150a462b72c72799d3c0f5645e1e31f5911
SHA512b2db2444b64b32e39d4d90b69a02740c3a567378144ef1f03844b2399dc3524d326ec1182981606695f300f955f1dd907a598fd4bdcdda0f2625b32242d6fe81
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5491ff5f74d63c4bbc6e9657dc7781e57
SHA1a888cc2afe7a853ff8f3bdd6b57c6197145a99dd
SHA2569246b79b289a6c18d33195dc52ee0f86e6218b351903f855655f1e9f8e8b0798
SHA51272e639544a837819eef1802cd952e750e289f05057d544c8f24928de690d9c623a57f57c73066445f9ec420f514b5e190d4797d226884a703c57ab92c3b32f3e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5db1c1488ee1546e6ee44bafa060e6212
SHA167f662b4904ff27b97cd1b83ddafec9a75753e09
SHA256c125ab6baa63a7ee3cc9e95068ff9825a92bde1c8a7bc8e2f76b270db13f6b66
SHA512596e3885b6c08d9d9857e6f4dd638b82e33d11f62fd50d5b8ffc23db967826683ab095290963fa24209b24d9631806fd6d6c17258493e0664c0ddf4f0ad90537
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5349c40c494fa2edb610792faa678caa6
SHA177dccf1b49c40122583edf0d4b0ae696c90e6892
SHA256aafefc48947e505e0e7e62e50a51055f8c42a7c76fcc6080582a391af22e1269
SHA51295c07821e19979c3f571c5f04b3b4cce6f928480c38a91123f907bbdc3b347ad7abfea15cf04c2be31eefa476160d2da1fee39dc0948be56ae8179f3a344eb98
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD56be5444a0314ff3bbee7880e149ad70a
SHA145e48cb857d9c52df579fee03053088803ffc0e5
SHA256916c9f8ef761dce219fc5ee3d9edd9c0612ccd8dc5c02cc22a4918ec7db30f83
SHA5129781ba6f9bf46b22a8e08db56694a952aca4d839f5dc42a221433b55dd9acb22ccdb4084a11ee224a03b03e27979f3804be1fd4610065e9e071e30a1a7e5c8cf
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD518830592a0999545b8178136c3d9e630
SHA1c8cf60a1bfda9aa529dcc3513b5575b04b61d31b
SHA256a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902
SHA5123d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD518830592a0999545b8178136c3d9e630
SHA1c8cf60a1bfda9aa529dcc3513b5575b04b61d31b
SHA256a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902
SHA5123d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2
-
C:\Windows\system32\drivers\etc\hostsFilesize
3KB
MD52d29fd3ae57f422e2b2121141dc82253
SHA1c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA25680a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/876-619-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmpFilesize
13.4MB
-
memory/876-622-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmpFilesize
13.4MB
-
memory/876-621-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmpFilesize
13.4MB
-
memory/1688-295-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1688-80-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1924-291-0x0000000000CA0000-0x0000000000D0B000-memory.dmpFilesize
428KB
-
memory/1924-250-0x0000000000D10000-0x0000000000D90000-memory.dmpFilesize
512KB
-
memory/1924-244-0x0000000000CA0000-0x0000000000D0B000-memory.dmpFilesize
428KB
-
memory/1924-253-0x0000000000CA0000-0x0000000000D0B000-memory.dmpFilesize
428KB
-
memory/2300-323-0x0000000029880000-0x00000000298D3000-memory.dmpFilesize
332KB
-
memory/2300-322-0x0000000000260000-0x0000000000272000-memory.dmpFilesize
72KB
-
memory/2300-305-0x0000000002650000-0x0000000002754000-memory.dmpFilesize
1.0MB
-
memory/2300-306-0x0000000002760000-0x0000000003C1D000-memory.dmpFilesize
20.7MB
-
memory/2300-307-0x0000000003C20000-0x0000000003D19000-memory.dmpFilesize
996KB
-
memory/2300-311-0x0000000003D20000-0x0000000003E18000-memory.dmpFilesize
992KB
-
memory/2300-25-0x00000000005D0000-0x00000000005D6000-memory.dmpFilesize
24KB
-
memory/2300-317-0x0000000003D20000-0x0000000003E18000-memory.dmpFilesize
992KB
-
memory/2300-26-0x0000000010000000-0x00000000102FF000-memory.dmpFilesize
3.0MB
-
memory/2300-32-0x0000000002650000-0x0000000002754000-memory.dmpFilesize
1.0MB
-
memory/2300-81-0x0000000010000000-0x00000000102FF000-memory.dmpFilesize
3.0MB
-
memory/2300-30-0x0000000002650000-0x0000000002754000-memory.dmpFilesize
1.0MB
-
memory/2300-29-0x0000000002650000-0x0000000002754000-memory.dmpFilesize
1.0MB
-
memory/2300-28-0x0000000002520000-0x0000000002641000-memory.dmpFilesize
1.1MB
-
memory/2464-241-0x0000000000400000-0x00000000006A4000-memory.dmpFilesize
2.6MB
-
memory/2464-235-0x0000000000400000-0x00000000006A4000-memory.dmpFilesize
2.6MB
-
memory/2668-285-0x0000000000920000-0x000000000092C000-memory.dmpFilesize
48KB
-
memory/2668-278-0x0000000000930000-0x0000000000937000-memory.dmpFilesize
28KB
-
memory/2668-267-0x0000000000920000-0x000000000092C000-memory.dmpFilesize
48KB
-
memory/2980-236-0x0000000000BC0000-0x0000000000CC0000-memory.dmpFilesize
1024KB
-
memory/2980-72-0x0000000000400000-0x000000000085E000-memory.dmpFilesize
4.4MB
-
memory/2980-239-0x0000000002460000-0x0000000002476000-memory.dmpFilesize
88KB
-
memory/2980-21-0x0000000000400000-0x000000000085E000-memory.dmpFilesize
4.4MB
-
memory/2980-19-0x0000000000BC0000-0x0000000000CC0000-memory.dmpFilesize
1024KB
-
memory/2980-20-0x0000000002460000-0x0000000002476000-memory.dmpFilesize
88KB
-
memory/2984-366-0x00007FF784290000-0x00007FF784FF0000-memory.dmpFilesize
13.4MB
-
memory/2984-367-0x00007FF784290000-0x00007FF784FF0000-memory.dmpFilesize
13.4MB
-
memory/2984-360-0x00007FF784290000-0x00007FF784FF0000-memory.dmpFilesize
13.4MB
-
memory/2984-614-0x00007FF784290000-0x00007FF784FF0000-memory.dmpFilesize
13.4MB
-
memory/3368-4-0x0000000002BE0000-0x0000000002BF6000-memory.dmpFilesize
88KB
-
memory/3368-251-0x0000000002C90000-0x0000000002CA6000-memory.dmpFilesize
88KB
-
memory/3384-300-0x00000000094E0000-0x0000000009A0C000-memory.dmpFilesize
5.2MB
-
memory/3384-289-0x0000000073010000-0x00000000737C0000-memory.dmpFilesize
7.7MB
-
memory/3384-290-0x0000000007510000-0x0000000007520000-memory.dmpFilesize
64KB
-
memory/3384-298-0x0000000008BC0000-0x0000000008C10000-memory.dmpFilesize
320KB
-
memory/3384-299-0x0000000008DE0000-0x0000000008FA2000-memory.dmpFilesize
1.8MB
-
memory/3384-262-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3588-491-0x0000000000400000-0x0000000000F98000-memory.dmpFilesize
11.6MB
-
memory/3824-268-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-43-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-258-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-53-0x00000000055F0000-0x00000000055FA000-memory.dmpFilesize
40KB
-
memory/3824-54-0x0000000008DA0000-0x00000000093B8000-memory.dmpFilesize
6.1MB
-
memory/3824-288-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-287-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-286-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-55-0x0000000008020000-0x000000000812A000-memory.dmpFilesize
1.0MB
-
memory/3824-56-0x0000000007D90000-0x0000000007DA2000-memory.dmpFilesize
72KB
-
memory/3824-263-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-51-0x00000000081D0000-0x0000000008774000-memory.dmpFilesize
5.6MB
-
memory/3824-37-0x0000000000CD0000-0x00000000018D4000-memory.dmpFilesize
12.0MB
-
memory/3824-58-0x0000000007DC0000-0x0000000007E0C000-memory.dmpFilesize
304KB
-
memory/3824-38-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-40-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-39-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-41-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-249-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-52-0x0000000007CC0000-0x0000000007D52000-memory.dmpFilesize
584KB
-
memory/3824-45-0x0000000077134000-0x0000000077136000-memory.dmpFilesize
8KB
-
memory/3824-247-0x0000000000CD0000-0x00000000018D4000-memory.dmpFilesize
12.0MB
-
memory/3824-248-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-243-0x00000000088F0000-0x0000000008956000-memory.dmpFilesize
408KB
-
memory/3824-57-0x0000000007F10000-0x0000000007F4C000-memory.dmpFilesize
240KB
-
memory/3824-47-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-48-0x00000000758B0000-0x00000000759A0000-memory.dmpFilesize
960KB
-
memory/3824-49-0x0000000000CD0000-0x00000000018D4000-memory.dmpFilesize
12.0MB
-
memory/3824-50-0x0000000000CD0000-0x00000000018D4000-memory.dmpFilesize
12.0MB
-
memory/3936-1-0x0000000000E40000-0x0000000000F40000-memory.dmpFilesize
1024KB
-
memory/3936-5-0x0000000000400000-0x0000000000BB2000-memory.dmpFilesize
7.7MB
-
memory/3936-3-0x0000000000400000-0x0000000000BB2000-memory.dmpFilesize
7.7MB
-
memory/3936-2-0x00000000028F0000-0x00000000028FB000-memory.dmpFilesize
44KB
-
memory/4272-103-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/4272-296-0x0000000000400000-0x00000000004BC000-memory.dmpFilesize
752KB
-
memory/4436-66-0x0000000000400000-0x0000000000BB2000-memory.dmpFilesize
7.7MB
-
memory/4436-64-0x0000000000D70000-0x0000000000E70000-memory.dmpFilesize
1024KB
-
memory/4436-65-0x0000000000C30000-0x0000000000C3B000-memory.dmpFilesize
44KB
-
memory/4436-255-0x0000000000400000-0x0000000000BB2000-memory.dmpFilesize
7.7MB
-
memory/4548-312-0x0000000002E60000-0x0000000002E96000-memory.dmpFilesize
216KB
-
memory/4548-318-0x0000000073010000-0x00000000737C0000-memory.dmpFilesize
7.7MB
-
memory/4548-315-0x0000000005AE0000-0x0000000006108000-memory.dmpFilesize
6.2MB
-
memory/4548-319-0x0000000002F40000-0x0000000002F50000-memory.dmpFilesize
64KB
-
memory/4548-320-0x0000000002F40000-0x0000000002F50000-memory.dmpFilesize
64KB
-
memory/4876-74-0x00000000030E0000-0x00000000039CB000-memory.dmpFilesize
8.9MB
-
memory/4876-75-0x0000000000400000-0x0000000000F98000-memory.dmpFilesize
11.6MB
-
memory/4876-73-0x0000000002BD0000-0x0000000002FD6000-memory.dmpFilesize
4.0MB
-
memory/4876-443-0x0000000000400000-0x0000000000F98000-memory.dmpFilesize
11.6MB
-
memory/4876-316-0x0000000000400000-0x0000000000F98000-memory.dmpFilesize
11.6MB
-
memory/4876-294-0x0000000000400000-0x0000000000F98000-memory.dmpFilesize
11.6MB
-
memory/4876-303-0x0000000000400000-0x0000000000F98000-memory.dmpFilesize
11.6MB
-
memory/4876-297-0x0000000002BD0000-0x0000000002FD6000-memory.dmpFilesize
4.0MB
-
memory/4904-526-0x0000000000400000-0x00000000006A4000-memory.dmpFilesize
2.6MB
-
memory/4904-359-0x0000000000400000-0x00000000006A4000-memory.dmpFilesize
2.6MB
-
memory/4904-256-0x0000000000400000-0x00000000006A4000-memory.dmpFilesize
2.6MB
-
memory/4904-304-0x0000000000400000-0x00000000006A4000-memory.dmpFilesize
2.6MB