Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2023 23:10

General

  • Target

    file.exe

  • Size

    340KB

  • MD5

    b569202fea07ae8dd728f83277c386b5

  • SHA1

    a1a7335d768c5d03c410fb9ddf8e9c0d952ef201

  • SHA256

    985cead0658efef2c45367595df24ac3a69c5b053fb79393668895a95dce3435

  • SHA512

    cb5c70f4c366d249bb527c4ef4cb9b179aafe1c79b14edf5c87de22d227303ccdadf9fb74c45d5bbf43e1d75c7f0154c055deac5828d228c3b92e1658b720e91

  • SSDEEP

    3072:hun18CsLp9YTbYSebkOWkndBFQX+TuPPPPPPPPt0hyv3mzcwdsTwZSX2dGpeJtiN:U1zepbNWkndrnILvn8jZSXAnifa

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

45.15.156.187:23929

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 7 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V2 payload 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 11 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 63 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 15 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3936
  • C:\Users\Admin\AppData\Local\Temp\B805.exe
    C:\Users\Admin\AppData\Local\Temp\B805.exe
    1⤵
    • Executes dropped EXE
    PID:2980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 7300
      2⤵
      • Program crash
      PID:4596
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\BD75.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\BD75.dll
      2⤵
      • Loads dropped DLL
      PID:2300
  • C:\Users\Admin\AppData\Local\Temp\C7E6.exe
    C:\Users\Admin\AppData\Local\Temp\C7E6.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:3824
  • C:\Users\Admin\AppData\Local\Temp\D7B6.exe
    C:\Users\Admin\AppData\Local\Temp\D7B6.exe
    1⤵
      PID:4436
      • C:\Windows\System32\Conhost.exe
        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        2⤵
          PID:2668
      • C:\Users\Admin\AppData\Local\Temp\DCA8.exe
        C:\Users\Admin\AppData\Local\Temp\DCA8.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4876
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          2⤵
            PID:4548
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 2536
              3⤵
              • Program crash
              PID:1312
          • C:\Users\Admin\AppData\Local\Temp\DCA8.exe
            "C:\Users\Admin\AppData\Local\Temp\DCA8.exe"
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:3588
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              3⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:2816
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              3⤵
                PID:3872
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  4⤵
                  • Modifies Windows Firewall
                  PID:1920
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                3⤵
                  PID:1820
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4928
                • C:\Windows\rss\csrss.exe
                  C:\Windows\rss\csrss.exe
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Manipulates WinMonFS driver.
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1100
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    4⤵
                      PID:4836
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                        PID:1540
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        4⤵
                        • Executes dropped EXE
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: MapViewOfSection
                        PID:4436
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        4⤵
                        • Creates scheduled task(s)
                        PID:2128
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3364
                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                        4⤵
                        • Executes dropped EXE
                        PID:1596
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        4⤵
                        • Creates scheduled task(s)
                        PID:3580
                      • C:\Windows\windefender.exe
                        "C:\Windows\windefender.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:4996
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          5⤵
                            PID:2100
                            • C:\Windows\SysWOW64\sc.exe
                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              6⤵
                              • Launches sc.exe
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4548
                  • C:\Users\Admin\AppData\Local\Temp\E3FC.exe
                    C:\Users\Admin\AppData\Local\Temp\E3FC.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1688
                    • C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmp" /SL5="$B00E0,7429766,54272,C:\Users\Admin\AppData\Local\Temp\E3FC.exe"
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in Program Files directory
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of WriteProcessMemory
                      PID:4272
                      • C:\Program Files (x86)\VoiceAssistant\voiceassist.exe
                        "C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -i
                        3⤵
                        • Executes dropped EXE
                        PID:2464
                      • C:\Program Files (x86)\VoiceAssistant\voiceassist.exe
                        "C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -s
                        3⤵
                        • Executes dropped EXE
                        PID:4904
                      • C:\Windows\SysWOW64\net.exe
                        "C:\Windows\system32\net.exe" helpmsg 9
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4524
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\system32\schtasks.exe" /Query
                        3⤵
                          PID:4004
                    • C:\Users\Admin\AppData\Local\Temp\EA56.exe
                      C:\Users\Admin\AppData\Local\Temp\EA56.exe
                      1⤵
                        PID:5072
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          2⤵
                            PID:3384
                            • C:\Users\Admin\AppData\Local\Temp\mi.exe
                              "C:\Users\Admin\AppData\Local\Temp\mi.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Drops file in Drivers directory
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Drops file in System32 directory
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:2984
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                4⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3140
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
                                4⤵
                                • Launches sc.exe
                                PID:2580
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop eventlog
                                4⤵
                                • Launches sc.exe
                                PID:3592
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
                                4⤵
                                • Launches sc.exe
                                PID:1752
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
                                4⤵
                                • Launches sc.exe
                                PID:3192
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                4⤵
                                  PID:3828
                                • C:\Windows\system32\powercfg.exe
                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                  4⤵
                                    PID:4012
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                    4⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:5072
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1528
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop dosvc
                                    4⤵
                                    • Launches sc.exe
                                    PID:4984
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop bits
                                    4⤵
                                    • Launches sc.exe
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:3384
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop wuauserv
                                    4⤵
                                    • Drops file in System32 directory
                                    • Launches sc.exe
                                    • Modifies data under HKEY_USERS
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1820
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                    4⤵
                                    • Launches sc.exe
                                    PID:4476
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop UsoSvc
                                    4⤵
                                    • Launches sc.exe
                                    PID:4344
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    4⤵
                                      PID:392
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                1⤵
                                  PID:1924
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 helpmsg 9
                                  1⤵
                                    PID:4356
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe
                                    1⤵
                                      PID:2668
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2980 -ip 2980
                                      1⤵
                                        PID:1112
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4548 -ip 4548
                                        1⤵
                                          PID:1100
                                        • C:\Windows\system32\wusa.exe
                                          wusa /uninstall /kb:890830 /quiet /norestart
                                          1⤵
                                            PID:668
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            1⤵
                                            • Drops file in System32 directory
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4836
                                          • C:\ProgramData\Google\Chrome\updater.exe
                                            C:\ProgramData\Google\Chrome\updater.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Drops file in Drivers directory
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Checks whether UAC is enabled
                                            • Drops file in System32 directory
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious use of SetThreadContext
                                            PID:876
                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                              2⤵
                                              • Drops file in System32 directory
                                              • Modifies data under HKEY_USERS
                                              PID:4528
                                            • C:\Windows\system32\sc.exe
                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                              2⤵
                                              • Launches sc.exe
                                              PID:4504
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              2⤵
                                                PID:544
                                              • C:\Windows\system32\conhost.exe
                                                C:\Windows\system32\conhost.exe
                                                2⤵
                                                  PID:4344
                                                • C:\Windows\system32\powercfg.exe
                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                  2⤵
                                                    PID:2640
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                    2⤵
                                                      PID:1940
                                                    • C:\Windows\system32\powercfg.exe
                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                      2⤵
                                                        PID:4684
                                                      • C:\Windows\system32\powercfg.exe
                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                        2⤵
                                                          PID:1108
                                                        • C:\Windows\system32\sc.exe
                                                          C:\Windows\system32\sc.exe stop dosvc
                                                          2⤵
                                                          • Launches sc.exe
                                                          PID:2868
                                                        • C:\Windows\system32\sc.exe
                                                          C:\Windows\system32\sc.exe stop bits
                                                          2⤵
                                                          • Launches sc.exe
                                                          PID:3876
                                                        • C:\Windows\system32\sc.exe
                                                          C:\Windows\system32\sc.exe stop wuauserv
                                                          2⤵
                                                          • Launches sc.exe
                                                          PID:4204
                                                        • C:\Windows\system32\sc.exe
                                                          C:\Windows\system32\sc.exe stop UsoSvc
                                                          2⤵
                                                          • Launches sc.exe
                                                          PID:4488
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                          2⤵
                                                            PID:924
                                                        • C:\Windows\System32\Conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          1⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1540
                                                        • C:\Windows\System32\Conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          1⤵
                                                          • Accesses Microsoft Outlook profiles
                                                          • outlook_office_path
                                                          • outlook_win_path
                                                          PID:1924
                                                        • C:\Windows\system32\wusa.exe
                                                          wusa /uninstall /kb:890830 /quiet /norestart
                                                          1⤵
                                                            PID:4668
                                                          • C:\Windows\windefender.exe
                                                            C:\Windows\windefender.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Modifies data under HKEY_USERS
                                                            PID:4224

                                                          Network

                                                          MITRE ATT&CK Matrix ATT&CK v13

                                                          Execution

                                                          Scheduled Task/Job

                                                          1
                                                          T1053

                                                          Persistence

                                                          Create or Modify System Process

                                                          3
                                                          T1543

                                                          Windows Service

                                                          3
                                                          T1543.003

                                                          Boot or Logon Autostart Execution

                                                          1
                                                          T1547

                                                          Registry Run Keys / Startup Folder

                                                          1
                                                          T1547.001

                                                          Scheduled Task/Job

                                                          1
                                                          T1053

                                                          Privilege Escalation

                                                          Create or Modify System Process

                                                          3
                                                          T1543

                                                          Windows Service

                                                          3
                                                          T1543.003

                                                          Boot or Logon Autostart Execution

                                                          1
                                                          T1547

                                                          Registry Run Keys / Startup Folder

                                                          1
                                                          T1547.001

                                                          Scheduled Task/Job

                                                          1
                                                          T1053

                                                          Defense Evasion

                                                          Virtualization/Sandbox Evasion

                                                          1
                                                          T1497

                                                          Impair Defenses

                                                          1
                                                          T1562

                                                          Modify Registry

                                                          1
                                                          T1112

                                                          Credential Access

                                                          Unsecured Credentials

                                                          2
                                                          T1552

                                                          Credentials In Files

                                                          2
                                                          T1552.001

                                                          Discovery

                                                          Query Registry

                                                          5
                                                          T1012

                                                          Virtualization/Sandbox Evasion

                                                          1
                                                          T1497

                                                          System Information Discovery

                                                          4
                                                          T1082

                                                          Peripheral Device Discovery

                                                          1
                                                          T1120

                                                          Collection

                                                          Data from Local System

                                                          2
                                                          T1005

                                                          Email Collection

                                                          1
                                                          T1114

                                                          Impact

                                                          Service Stop

                                                          1
                                                          T1489

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Program Files (x86)\VoiceAssistant\voiceassist.exe
                                                            Filesize

                                                            2.6MB

                                                            MD5

                                                            ef9b854c3bf29138d9d24292a50def6e

                                                            SHA1

                                                            8d498781213415902226843bde3b008266ebb5f5

                                                            SHA256

                                                            d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84

                                                            SHA512

                                                            401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef

                                                          • C:\Program Files (x86)\VoiceAssistant\voiceassist.exe
                                                            Filesize

                                                            2.6MB

                                                            MD5

                                                            ef9b854c3bf29138d9d24292a50def6e

                                                            SHA1

                                                            8d498781213415902226843bde3b008266ebb5f5

                                                            SHA256

                                                            d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84

                                                            SHA512

                                                            401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef

                                                          • C:\Program Files (x86)\VoiceAssistant\voiceassist.exe
                                                            Filesize

                                                            2.6MB

                                                            MD5

                                                            ef9b854c3bf29138d9d24292a50def6e

                                                            SHA1

                                                            8d498781213415902226843bde3b008266ebb5f5

                                                            SHA256

                                                            d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84

                                                            SHA512

                                                            401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef

                                                          • C:\ProgramData\Google\Chrome\updater.exe
                                                            Filesize

                                                            8.0MB

                                                            MD5

                                                            07bd860504c44b4f4be2b4749fd05550

                                                            SHA1

                                                            563325377c1d144d06d06052e9adf7f8c8048668

                                                            SHA256

                                                            7a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7

                                                            SHA512

                                                            54129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a

                                                          • C:\ProgramData\Google\Chrome\updater.exe
                                                            Filesize

                                                            8.0MB

                                                            MD5

                                                            07bd860504c44b4f4be2b4749fd05550

                                                            SHA1

                                                            563325377c1d144d06d06052e9adf7f8c8048668

                                                            SHA256

                                                            7a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7

                                                            SHA512

                                                            54129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a

                                                          • C:\ProgramData\SHelperTrack\SHelperTrack.exe
                                                            Filesize

                                                            2.6MB

                                                            MD5

                                                            ef9b854c3bf29138d9d24292a50def6e

                                                            SHA1

                                                            8d498781213415902226843bde3b008266ebb5f5

                                                            SHA256

                                                            d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84

                                                            SHA512

                                                            401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef

                                                          • C:\Users\Admin\AppData\Local\Temp\B805.exe
                                                            Filesize

                                                            237KB

                                                            MD5

                                                            22a51b329fa194d51f68705a25d7396d

                                                            SHA1

                                                            aada03d8b7f1e28dbf6d72c1503981ccc5bb94da

                                                            SHA256

                                                            82857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742

                                                            SHA512

                                                            0d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821

                                                          • C:\Users\Admin\AppData\Local\Temp\B805.exe
                                                            Filesize

                                                            237KB

                                                            MD5

                                                            22a51b329fa194d51f68705a25d7396d

                                                            SHA1

                                                            aada03d8b7f1e28dbf6d72c1503981ccc5bb94da

                                                            SHA256

                                                            82857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742

                                                            SHA512

                                                            0d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821

                                                          • C:\Users\Admin\AppData\Local\Temp\BD75.dll
                                                            Filesize

                                                            3.0MB

                                                            MD5

                                                            18356cbd55de61190244f9be22cf2f6d

                                                            SHA1

                                                            98510c90b004e98090a1462bf056fa916f1f2e0a

                                                            SHA256

                                                            fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8

                                                            SHA512

                                                            5c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe

                                                          • C:\Users\Admin\AppData\Local\Temp\BD75.dll
                                                            Filesize

                                                            3.0MB

                                                            MD5

                                                            18356cbd55de61190244f9be22cf2f6d

                                                            SHA1

                                                            98510c90b004e98090a1462bf056fa916f1f2e0a

                                                            SHA256

                                                            fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8

                                                            SHA512

                                                            5c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe

                                                          • C:\Users\Admin\AppData\Local\Temp\C7E6.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            33c6731fb7512630217f405efc5c71b4

                                                            SHA1

                                                            bf483f230f4bbaf53e0610182ef9f94a95dcb67a

                                                            SHA256

                                                            0fb245e80fdb23c83dcef3ee510e7633acb208c1b07b825f0b6764c8faf5700b

                                                            SHA512

                                                            eea6ee3169b2eaecaf84e78e42372d1000938f7eefb0bfb75a1b87a612676f89b1473fdbf1c7c4caf3949dae6eecbb9e39f85fb2abc2d702bdbc8ee3ce60fd55

                                                          • C:\Users\Admin\AppData\Local\Temp\C7E6.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            33c6731fb7512630217f405efc5c71b4

                                                            SHA1

                                                            bf483f230f4bbaf53e0610182ef9f94a95dcb67a

                                                            SHA256

                                                            0fb245e80fdb23c83dcef3ee510e7633acb208c1b07b825f0b6764c8faf5700b

                                                            SHA512

                                                            eea6ee3169b2eaecaf84e78e42372d1000938f7eefb0bfb75a1b87a612676f89b1473fdbf1c7c4caf3949dae6eecbb9e39f85fb2abc2d702bdbc8ee3ce60fd55

                                                          • C:\Users\Admin\AppData\Local\Temp\D7B6.exe
                                                            Filesize

                                                            340KB

                                                            MD5

                                                            80f0d2f7eab0b8bb7e32284c8a3fcf27

                                                            SHA1

                                                            6d469130a0dcb848d22ce24fd51f0bd9ef305e31

                                                            SHA256

                                                            55ea853e07226a70d1ba7dc03909ad8bf9ee661b9f040648a4d4dc298253e9ac

                                                            SHA512

                                                            56057f9c3ccaba0ccb4978ec87dca1cbe24ba2d2bab423de62dbcb6a9bd4ba395edb542ec38b16f29c3871a0e7beedbdb29bb669d0f1841f7f339989572bd965

                                                          • C:\Users\Admin\AppData\Local\Temp\D7B6.exe
                                                            Filesize

                                                            340KB

                                                            MD5

                                                            80f0d2f7eab0b8bb7e32284c8a3fcf27

                                                            SHA1

                                                            6d469130a0dcb848d22ce24fd51f0bd9ef305e31

                                                            SHA256

                                                            55ea853e07226a70d1ba7dc03909ad8bf9ee661b9f040648a4d4dc298253e9ac

                                                            SHA512

                                                            56057f9c3ccaba0ccb4978ec87dca1cbe24ba2d2bab423de62dbcb6a9bd4ba395edb542ec38b16f29c3871a0e7beedbdb29bb669d0f1841f7f339989572bd965

                                                          • C:\Users\Admin\AppData\Local\Temp\DCA8.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            18830592a0999545b8178136c3d9e630

                                                            SHA1

                                                            c8cf60a1bfda9aa529dcc3513b5575b04b61d31b

                                                            SHA256

                                                            a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902

                                                            SHA512

                                                            3d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2

                                                          • C:\Users\Admin\AppData\Local\Temp\DCA8.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            18830592a0999545b8178136c3d9e630

                                                            SHA1

                                                            c8cf60a1bfda9aa529dcc3513b5575b04b61d31b

                                                            SHA256

                                                            a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902

                                                            SHA512

                                                            3d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2

                                                          • C:\Users\Admin\AppData\Local\Temp\DCA8.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            18830592a0999545b8178136c3d9e630

                                                            SHA1

                                                            c8cf60a1bfda9aa529dcc3513b5575b04b61d31b

                                                            SHA256

                                                            a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902

                                                            SHA512

                                                            3d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2

                                                          • C:\Users\Admin\AppData\Local\Temp\E3FC.exe
                                                            Filesize

                                                            7.3MB

                                                            MD5

                                                            e8c0437da3e93b86a42e2b791b1a9130

                                                            SHA1

                                                            746c2032d786ffb969729fc837786bd1a11ea643

                                                            SHA256

                                                            936483a1f1a96b272c7a1e10d3a1fb755303ab8005ba685aae04f5cc35b8cabb

                                                            SHA512

                                                            a838206dff9222771e744d6583ff75d0cab21fc764ff4564be23754b36d1920ecd1f5b2de790ece61564ca513d74d219a518a8f05b793c981344467578d6ac99

                                                          • C:\Users\Admin\AppData\Local\Temp\E3FC.exe
                                                            Filesize

                                                            7.3MB

                                                            MD5

                                                            e8c0437da3e93b86a42e2b791b1a9130

                                                            SHA1

                                                            746c2032d786ffb969729fc837786bd1a11ea643

                                                            SHA256

                                                            936483a1f1a96b272c7a1e10d3a1fb755303ab8005ba685aae04f5cc35b8cabb

                                                            SHA512

                                                            a838206dff9222771e744d6583ff75d0cab21fc764ff4564be23754b36d1920ecd1f5b2de790ece61564ca513d74d219a518a8f05b793c981344467578d6ac99

                                                          • C:\Users\Admin\AppData\Local\Temp\EA56.exe
                                                            Filesize

                                                            1.9MB

                                                            MD5

                                                            095bb001734cdc89303a8783e4f6b2d1

                                                            SHA1

                                                            f985cefe530475b936ed292f1d5b424c1202bee6

                                                            SHA256

                                                            77954d2ba5d002af2dc7ebd549f21ff012a60f37182a3d4fc91d2f973d759f72

                                                            SHA512

                                                            99306e7ff0f2c99f60ce762488b9af12ee58a7384ee076e40b3a03f43131590fed03379a520acb5191cb4d28f157f319b9d648e8fd16a6596d0cdf385bb15478

                                                          • C:\Users\Admin\AppData\Local\Temp\EA56.exe
                                                            Filesize

                                                            1.9MB

                                                            MD5

                                                            095bb001734cdc89303a8783e4f6b2d1

                                                            SHA1

                                                            f985cefe530475b936ed292f1d5b424c1202bee6

                                                            SHA256

                                                            77954d2ba5d002af2dc7ebd549f21ff012a60f37182a3d4fc91d2f973d759f72

                                                            SHA512

                                                            99306e7ff0f2c99f60ce762488b9af12ee58a7384ee076e40b3a03f43131590fed03379a520acb5191cb4d28f157f319b9d648e8fd16a6596d0cdf385bb15478

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dvhufzgj.ukj.ps1
                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                            Filesize

                                                            281KB

                                                            MD5

                                                            d98e33b66343e7c96158444127a117f6

                                                            SHA1

                                                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                            SHA256

                                                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                            SHA512

                                                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                            Filesize

                                                            281KB

                                                            MD5

                                                            d98e33b66343e7c96158444127a117f6

                                                            SHA1

                                                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                            SHA256

                                                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                            SHA512

                                                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                          • C:\Users\Admin\AppData\Local\Temp\is-E983L.tmp\_isetup\_iscrypt.dll
                                                            Filesize

                                                            2KB

                                                            MD5

                                                            a69559718ab506675e907fe49deb71e9

                                                            SHA1

                                                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                            SHA256

                                                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                            SHA512

                                                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                          • C:\Users\Admin\AppData\Local\Temp\is-E983L.tmp\_isetup\_isdecmp.dll
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            3adaa386b671c2df3bae5b39dc093008

                                                            SHA1

                                                            067cf95fbdb922d81db58432c46930f86d23dded

                                                            SHA256

                                                            71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

                                                            SHA512

                                                            bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

                                                          • C:\Users\Admin\AppData\Local\Temp\is-E983L.tmp\_isetup\_isdecmp.dll
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            3adaa386b671c2df3bae5b39dc093008

                                                            SHA1

                                                            067cf95fbdb922d81db58432c46930f86d23dded

                                                            SHA256

                                                            71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

                                                            SHA512

                                                            bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

                                                          • C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmp
                                                            Filesize

                                                            687KB

                                                            MD5

                                                            f448d7f4b76e5c9c3a4eaff16a8b9b73

                                                            SHA1

                                                            31808f1ffa84c954376975b7cdb0007e6b762488

                                                            SHA256

                                                            7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

                                                            SHA512

                                                            f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

                                                          • C:\Users\Admin\AppData\Local\Temp\is-K3RL2.tmp\E3FC.tmp
                                                            Filesize

                                                            687KB

                                                            MD5

                                                            f448d7f4b76e5c9c3a4eaff16a8b9b73

                                                            SHA1

                                                            31808f1ffa84c954376975b7cdb0007e6b762488

                                                            SHA256

                                                            7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

                                                            SHA512

                                                            f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

                                                          • C:\Users\Admin\AppData\Local\Temp\mi.exe
                                                            Filesize

                                                            8.0MB

                                                            MD5

                                                            07bd860504c44b4f4be2b4749fd05550

                                                            SHA1

                                                            563325377c1d144d06d06052e9adf7f8c8048668

                                                            SHA256

                                                            7a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7

                                                            SHA512

                                                            54129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a

                                                          • C:\Users\Admin\AppData\Local\Temp\mi.exe
                                                            Filesize

                                                            8.0MB

                                                            MD5

                                                            07bd860504c44b4f4be2b4749fd05550

                                                            SHA1

                                                            563325377c1d144d06d06052e9adf7f8c8048668

                                                            SHA256

                                                            7a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7

                                                            SHA512

                                                            54129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a

                                                          • C:\Users\Admin\AppData\Local\Temp\mi.exe
                                                            Filesize

                                                            8.0MB

                                                            MD5

                                                            07bd860504c44b4f4be2b4749fd05550

                                                            SHA1

                                                            563325377c1d144d06d06052e9adf7f8c8048668

                                                            SHA256

                                                            7a266521a933c96b8ff775273860b8a4f545f4304bebf056c72eb33da9abc5c7

                                                            SHA512

                                                            54129142a075e581b5fa884a6ee6f130dc0c25c1f8e5656a7653f6a7751151be2f5aeec3c9abbe84e8cad20a8fe58e31cd109b79b1ff0e50a961ee36bb71600a

                                                          • C:\Users\Admin\AppData\Roaming\jtfescd
                                                            Filesize

                                                            340KB

                                                            MD5

                                                            80f0d2f7eab0b8bb7e32284c8a3fcf27

                                                            SHA1

                                                            6d469130a0dcb848d22ce24fd51f0bd9ef305e31

                                                            SHA256

                                                            55ea853e07226a70d1ba7dc03909ad8bf9ee661b9f040648a4d4dc298253e9ac

                                                            SHA512

                                                            56057f9c3ccaba0ccb4978ec87dca1cbe24ba2d2bab423de62dbcb6a9bd4ba395edb542ec38b16f29c3871a0e7beedbdb29bb669d0f1841f7f339989572bd965

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                                                            Filesize

                                                            2KB

                                                            MD5

                                                            3d086a433708053f9bf9523e1d87a4e8

                                                            SHA1

                                                            b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                                            SHA256

                                                            6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                                            SHA512

                                                            931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            8facf334bb263090f16a0360f9d366ce

                                                            SHA1

                                                            6c634648d902435ef4286189969ca98908b219a1

                                                            SHA256

                                                            6b2dbb2c304c68725d9e17ad8c998150a462b72c72799d3c0f5645e1e31f5911

                                                            SHA512

                                                            b2db2444b64b32e39d4d90b69a02740c3a567378144ef1f03844b2399dc3524d326ec1182981606695f300f955f1dd907a598fd4bdcdda0f2625b32242d6fe81

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            491ff5f74d63c4bbc6e9657dc7781e57

                                                            SHA1

                                                            a888cc2afe7a853ff8f3bdd6b57c6197145a99dd

                                                            SHA256

                                                            9246b79b289a6c18d33195dc52ee0f86e6218b351903f855655f1e9f8e8b0798

                                                            SHA512

                                                            72e639544a837819eef1802cd952e750e289f05057d544c8f24928de690d9c623a57f57c73066445f9ec420f514b5e190d4797d226884a703c57ab92c3b32f3e

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            db1c1488ee1546e6ee44bafa060e6212

                                                            SHA1

                                                            67f662b4904ff27b97cd1b83ddafec9a75753e09

                                                            SHA256

                                                            c125ab6baa63a7ee3cc9e95068ff9825a92bde1c8a7bc8e2f76b270db13f6b66

                                                            SHA512

                                                            596e3885b6c08d9d9857e6f4dd638b82e33d11f62fd50d5b8ffc23db967826683ab095290963fa24209b24d9631806fd6d6c17258493e0664c0ddf4f0ad90537

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            349c40c494fa2edb610792faa678caa6

                                                            SHA1

                                                            77dccf1b49c40122583edf0d4b0ae696c90e6892

                                                            SHA256

                                                            aafefc48947e505e0e7e62e50a51055f8c42a7c76fcc6080582a391af22e1269

                                                            SHA512

                                                            95c07821e19979c3f571c5f04b3b4cce6f928480c38a91123f907bbdc3b347ad7abfea15cf04c2be31eefa476160d2da1fee39dc0948be56ae8179f3a344eb98

                                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                                            Filesize

                                                            19KB

                                                            MD5

                                                            6be5444a0314ff3bbee7880e149ad70a

                                                            SHA1

                                                            45e48cb857d9c52df579fee03053088803ffc0e5

                                                            SHA256

                                                            916c9f8ef761dce219fc5ee3d9edd9c0612ccd8dc5c02cc22a4918ec7db30f83

                                                            SHA512

                                                            9781ba6f9bf46b22a8e08db56694a952aca4d839f5dc42a221433b55dd9acb22ccdb4084a11ee224a03b03e27979f3804be1fd4610065e9e071e30a1a7e5c8cf

                                                          • C:\Windows\rss\csrss.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            18830592a0999545b8178136c3d9e630

                                                            SHA1

                                                            c8cf60a1bfda9aa529dcc3513b5575b04b61d31b

                                                            SHA256

                                                            a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902

                                                            SHA512

                                                            3d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2

                                                          • C:\Windows\rss\csrss.exe
                                                            Filesize

                                                            4.2MB

                                                            MD5

                                                            18830592a0999545b8178136c3d9e630

                                                            SHA1

                                                            c8cf60a1bfda9aa529dcc3513b5575b04b61d31b

                                                            SHA256

                                                            a630026308623c870d8f692cefa9f5c4d6b92b699eff91b798016ca60ce9c902

                                                            SHA512

                                                            3d6d8de2f37cea344d93df72d593cd34cd377a868166b1960e75e46895bfb536cba41c24e8bc3d554478a2660fadb4d4c4970608cff2f10944a0f03d95d5cbd2

                                                          • C:\Windows\system32\drivers\etc\hosts
                                                            Filesize

                                                            3KB

                                                            MD5

                                                            2d29fd3ae57f422e2b2121141dc82253

                                                            SHA1

                                                            c2464c857779c0ab4f5e766f5028fcc651a6c6b7

                                                            SHA256

                                                            80a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4

                                                            SHA512

                                                            077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68

                                                          • C:\Windows\windefender.exe
                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8e67f58837092385dcf01e8a2b4f5783

                                                            SHA1

                                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                            SHA256

                                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                            SHA512

                                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                          • C:\Windows\windefender.exe
                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8e67f58837092385dcf01e8a2b4f5783

                                                            SHA1

                                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                            SHA256

                                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                            SHA512

                                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                          • C:\Windows\windefender.exe
                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8e67f58837092385dcf01e8a2b4f5783

                                                            SHA1

                                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                            SHA256

                                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                            SHA512

                                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                          • memory/876-619-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/876-622-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/876-621-0x00007FF74C440000-0x00007FF74D1A0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/1688-295-0x0000000000400000-0x0000000000414000-memory.dmp
                                                            Filesize

                                                            80KB

                                                          • memory/1688-80-0x0000000000400000-0x0000000000414000-memory.dmp
                                                            Filesize

                                                            80KB

                                                          • memory/1924-291-0x0000000000CA0000-0x0000000000D0B000-memory.dmp
                                                            Filesize

                                                            428KB

                                                          • memory/1924-250-0x0000000000D10000-0x0000000000D90000-memory.dmp
                                                            Filesize

                                                            512KB

                                                          • memory/1924-244-0x0000000000CA0000-0x0000000000D0B000-memory.dmp
                                                            Filesize

                                                            428KB

                                                          • memory/1924-253-0x0000000000CA0000-0x0000000000D0B000-memory.dmp
                                                            Filesize

                                                            428KB

                                                          • memory/2300-323-0x0000000029880000-0x00000000298D3000-memory.dmp
                                                            Filesize

                                                            332KB

                                                          • memory/2300-322-0x0000000000260000-0x0000000000272000-memory.dmp
                                                            Filesize

                                                            72KB

                                                          • memory/2300-305-0x0000000002650000-0x0000000002754000-memory.dmp
                                                            Filesize

                                                            1.0MB

                                                          • memory/2300-306-0x0000000002760000-0x0000000003C1D000-memory.dmp
                                                            Filesize

                                                            20.7MB

                                                          • memory/2300-307-0x0000000003C20000-0x0000000003D19000-memory.dmp
                                                            Filesize

                                                            996KB

                                                          • memory/2300-311-0x0000000003D20000-0x0000000003E18000-memory.dmp
                                                            Filesize

                                                            992KB

                                                          • memory/2300-25-0x00000000005D0000-0x00000000005D6000-memory.dmp
                                                            Filesize

                                                            24KB

                                                          • memory/2300-317-0x0000000003D20000-0x0000000003E18000-memory.dmp
                                                            Filesize

                                                            992KB

                                                          • memory/2300-26-0x0000000010000000-0x00000000102FF000-memory.dmp
                                                            Filesize

                                                            3.0MB

                                                          • memory/2300-32-0x0000000002650000-0x0000000002754000-memory.dmp
                                                            Filesize

                                                            1.0MB

                                                          • memory/2300-81-0x0000000010000000-0x00000000102FF000-memory.dmp
                                                            Filesize

                                                            3.0MB

                                                          • memory/2300-30-0x0000000002650000-0x0000000002754000-memory.dmp
                                                            Filesize

                                                            1.0MB

                                                          • memory/2300-29-0x0000000002650000-0x0000000002754000-memory.dmp
                                                            Filesize

                                                            1.0MB

                                                          • memory/2300-28-0x0000000002520000-0x0000000002641000-memory.dmp
                                                            Filesize

                                                            1.1MB

                                                          • memory/2464-241-0x0000000000400000-0x00000000006A4000-memory.dmp
                                                            Filesize

                                                            2.6MB

                                                          • memory/2464-235-0x0000000000400000-0x00000000006A4000-memory.dmp
                                                            Filesize

                                                            2.6MB

                                                          • memory/2668-285-0x0000000000920000-0x000000000092C000-memory.dmp
                                                            Filesize

                                                            48KB

                                                          • memory/2668-278-0x0000000000930000-0x0000000000937000-memory.dmp
                                                            Filesize

                                                            28KB

                                                          • memory/2668-267-0x0000000000920000-0x000000000092C000-memory.dmp
                                                            Filesize

                                                            48KB

                                                          • memory/2980-236-0x0000000000BC0000-0x0000000000CC0000-memory.dmp
                                                            Filesize

                                                            1024KB

                                                          • memory/2980-72-0x0000000000400000-0x000000000085E000-memory.dmp
                                                            Filesize

                                                            4.4MB

                                                          • memory/2980-239-0x0000000002460000-0x0000000002476000-memory.dmp
                                                            Filesize

                                                            88KB

                                                          • memory/2980-21-0x0000000000400000-0x000000000085E000-memory.dmp
                                                            Filesize

                                                            4.4MB

                                                          • memory/2980-19-0x0000000000BC0000-0x0000000000CC0000-memory.dmp
                                                            Filesize

                                                            1024KB

                                                          • memory/2980-20-0x0000000002460000-0x0000000002476000-memory.dmp
                                                            Filesize

                                                            88KB

                                                          • memory/2984-366-0x00007FF784290000-0x00007FF784FF0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/2984-367-0x00007FF784290000-0x00007FF784FF0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/2984-360-0x00007FF784290000-0x00007FF784FF0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/2984-614-0x00007FF784290000-0x00007FF784FF0000-memory.dmp
                                                            Filesize

                                                            13.4MB

                                                          • memory/3368-4-0x0000000002BE0000-0x0000000002BF6000-memory.dmp
                                                            Filesize

                                                            88KB

                                                          • memory/3368-251-0x0000000002C90000-0x0000000002CA6000-memory.dmp
                                                            Filesize

                                                            88KB

                                                          • memory/3384-300-0x00000000094E0000-0x0000000009A0C000-memory.dmp
                                                            Filesize

                                                            5.2MB

                                                          • memory/3384-289-0x0000000073010000-0x00000000737C0000-memory.dmp
                                                            Filesize

                                                            7.7MB

                                                          • memory/3384-290-0x0000000007510000-0x0000000007520000-memory.dmp
                                                            Filesize

                                                            64KB

                                                          • memory/3384-298-0x0000000008BC0000-0x0000000008C10000-memory.dmp
                                                            Filesize

                                                            320KB

                                                          • memory/3384-299-0x0000000008DE0000-0x0000000008FA2000-memory.dmp
                                                            Filesize

                                                            1.8MB

                                                          • memory/3384-262-0x0000000000400000-0x000000000043C000-memory.dmp
                                                            Filesize

                                                            240KB

                                                          • memory/3588-491-0x0000000000400000-0x0000000000F98000-memory.dmp
                                                            Filesize

                                                            11.6MB

                                                          • memory/3824-268-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-43-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-258-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-53-0x00000000055F0000-0x00000000055FA000-memory.dmp
                                                            Filesize

                                                            40KB

                                                          • memory/3824-54-0x0000000008DA0000-0x00000000093B8000-memory.dmp
                                                            Filesize

                                                            6.1MB

                                                          • memory/3824-288-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-287-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-286-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-55-0x0000000008020000-0x000000000812A000-memory.dmp
                                                            Filesize

                                                            1.0MB

                                                          • memory/3824-56-0x0000000007D90000-0x0000000007DA2000-memory.dmp
                                                            Filesize

                                                            72KB

                                                          • memory/3824-263-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-51-0x00000000081D0000-0x0000000008774000-memory.dmp
                                                            Filesize

                                                            5.6MB

                                                          • memory/3824-37-0x0000000000CD0000-0x00000000018D4000-memory.dmp
                                                            Filesize

                                                            12.0MB

                                                          • memory/3824-58-0x0000000007DC0000-0x0000000007E0C000-memory.dmp
                                                            Filesize

                                                            304KB

                                                          • memory/3824-38-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-40-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-39-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-41-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-249-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-52-0x0000000007CC0000-0x0000000007D52000-memory.dmp
                                                            Filesize

                                                            584KB

                                                          • memory/3824-45-0x0000000077134000-0x0000000077136000-memory.dmp
                                                            Filesize

                                                            8KB

                                                          • memory/3824-247-0x0000000000CD0000-0x00000000018D4000-memory.dmp
                                                            Filesize

                                                            12.0MB

                                                          • memory/3824-248-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-243-0x00000000088F0000-0x0000000008956000-memory.dmp
                                                            Filesize

                                                            408KB

                                                          • memory/3824-57-0x0000000007F10000-0x0000000007F4C000-memory.dmp
                                                            Filesize

                                                            240KB

                                                          • memory/3824-47-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-48-0x00000000758B0000-0x00000000759A0000-memory.dmp
                                                            Filesize

                                                            960KB

                                                          • memory/3824-49-0x0000000000CD0000-0x00000000018D4000-memory.dmp
                                                            Filesize

                                                            12.0MB

                                                          • memory/3824-50-0x0000000000CD0000-0x00000000018D4000-memory.dmp
                                                            Filesize

                                                            12.0MB

                                                          • memory/3936-1-0x0000000000E40000-0x0000000000F40000-memory.dmp
                                                            Filesize

                                                            1024KB

                                                          • memory/3936-5-0x0000000000400000-0x0000000000BB2000-memory.dmp
                                                            Filesize

                                                            7.7MB

                                                          • memory/3936-3-0x0000000000400000-0x0000000000BB2000-memory.dmp
                                                            Filesize

                                                            7.7MB

                                                          • memory/3936-2-0x00000000028F0000-0x00000000028FB000-memory.dmp
                                                            Filesize

                                                            44KB

                                                          • memory/4272-103-0x0000000000600000-0x0000000000601000-memory.dmp
                                                            Filesize

                                                            4KB

                                                          • memory/4272-296-0x0000000000400000-0x00000000004BC000-memory.dmp
                                                            Filesize

                                                            752KB

                                                          • memory/4436-66-0x0000000000400000-0x0000000000BB2000-memory.dmp
                                                            Filesize

                                                            7.7MB

                                                          • memory/4436-64-0x0000000000D70000-0x0000000000E70000-memory.dmp
                                                            Filesize

                                                            1024KB

                                                          • memory/4436-65-0x0000000000C30000-0x0000000000C3B000-memory.dmp
                                                            Filesize

                                                            44KB

                                                          • memory/4436-255-0x0000000000400000-0x0000000000BB2000-memory.dmp
                                                            Filesize

                                                            7.7MB

                                                          • memory/4548-312-0x0000000002E60000-0x0000000002E96000-memory.dmp
                                                            Filesize

                                                            216KB

                                                          • memory/4548-318-0x0000000073010000-0x00000000737C0000-memory.dmp
                                                            Filesize

                                                            7.7MB

                                                          • memory/4548-315-0x0000000005AE0000-0x0000000006108000-memory.dmp
                                                            Filesize

                                                            6.2MB

                                                          • memory/4548-319-0x0000000002F40000-0x0000000002F50000-memory.dmp
                                                            Filesize

                                                            64KB

                                                          • memory/4548-320-0x0000000002F40000-0x0000000002F50000-memory.dmp
                                                            Filesize

                                                            64KB

                                                          • memory/4876-74-0x00000000030E0000-0x00000000039CB000-memory.dmp
                                                            Filesize

                                                            8.9MB

                                                          • memory/4876-75-0x0000000000400000-0x0000000000F98000-memory.dmp
                                                            Filesize

                                                            11.6MB

                                                          • memory/4876-73-0x0000000002BD0000-0x0000000002FD6000-memory.dmp
                                                            Filesize

                                                            4.0MB

                                                          • memory/4876-443-0x0000000000400000-0x0000000000F98000-memory.dmp
                                                            Filesize

                                                            11.6MB

                                                          • memory/4876-316-0x0000000000400000-0x0000000000F98000-memory.dmp
                                                            Filesize

                                                            11.6MB

                                                          • memory/4876-294-0x0000000000400000-0x0000000000F98000-memory.dmp
                                                            Filesize

                                                            11.6MB

                                                          • memory/4876-303-0x0000000000400000-0x0000000000F98000-memory.dmp
                                                            Filesize

                                                            11.6MB

                                                          • memory/4876-297-0x0000000002BD0000-0x0000000002FD6000-memory.dmp
                                                            Filesize

                                                            4.0MB

                                                          • memory/4904-526-0x0000000000400000-0x00000000006A4000-memory.dmp
                                                            Filesize

                                                            2.6MB

                                                          • memory/4904-359-0x0000000000400000-0x00000000006A4000-memory.dmp
                                                            Filesize

                                                            2.6MB

                                                          • memory/4904-256-0x0000000000400000-0x00000000006A4000-memory.dmp
                                                            Filesize

                                                            2.6MB

                                                          • memory/4904-304-0x0000000000400000-0x00000000006A4000-memory.dmp
                                                            Filesize

                                                            2.6MB