Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-04-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe
Resource
win10v2004-20240412-en
General
-
Target
b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe
-
Size
3.3MB
-
MD5
09bd16d82a747ef0621aa367c0e14a9c
-
SHA1
da57e4b192b7cb50b6e71b48d5f233d2a6b5a4f1
-
SHA256
b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48
-
SHA512
7365b17d9ec7264941b88d61e69ea1214ef44b9b8bff9ebc8227794b696142050f267635cdb4e588ba121259b2f2a07519df8053f143db58ebc1a048d08b49a1
-
SSDEEP
49152:9UIbNigeVE2MD7ZDAgUftcgFEptOkf8Ug:jI3bg5W
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/3392-46-0x0000000003FA0000-0x000000000488B000-memory.dmp family_glupteba behavioral2/memory/3392-47-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4992-98-0x0000000003F30000-0x000000000481B000-memory.dmp family_glupteba behavioral2/memory/4992-100-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/3392-150-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4964-152-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4964-287-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4964-323-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1764-324-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1764-425-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-426-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-449-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-484-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-492-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-500-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-507-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1028-514-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
3TjNPrHEYJsK2j9r745JhVKu.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 3TjNPrHEYJsK2j9r745JhVKu.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
3TjNPrHEYJsK2j9r745JhVKu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3TjNPrHEYJsK2j9r745JhVKu.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 4076 netsh.exe 2420 netsh.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3TjNPrHEYJsK2j9r745JhVKu.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3TjNPrHEYJsK2j9r745JhVKu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3TjNPrHEYJsK2j9r745JhVKu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 6 IoCs
Processes:
regasm.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NyofvXFfcXuVowWekV7ZsJaA.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOuncpWZh1dYLrJt7hfuh5xU.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5wdFLtc5gpYNPt1ZubtEZJ4V.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bBHeOvyiIzbCpeyN17TtXHis.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpgu3sDCXkGoOzGmLYQ3UkCD.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ySPrkEDiq8t3oaZy3iXDuzLe.bat regasm.exe -
Executes dropped EXE 16 IoCs
Processes:
6I64hwjvO3cAghk7nmA7AYb8.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exeu2h0.0.exexB1b1HYzvYnKePltQbtD12eL.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exexB1b1HYzvYnKePltQbtD12eL.execsrss.exeinjector.exe3TjNPrHEYJsK2j9r745JhVKu.exewindefender.exewindefender.exePGlMgFtEp0LNDygGTntTwmJD.exeInstall.exeQg_Appv5.exeUniversalInstaller.exeUniversalInstaller.exepid process 3204 6I64hwjvO3cAghk7nmA7AYb8.exe 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 3232 u2h0.0.exe 4992 xB1b1HYzvYnKePltQbtD12eL.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1028 csrss.exe 2404 injector.exe 2000 3TjNPrHEYJsK2j9r745JhVKu.exe 1932 windefender.exe 2092 windefender.exe 4808 PGlMgFtEp0LNDygGTntTwmJD.exe 1096 Install.exe 2416 Qg_Appv5.exe 3648 UniversalInstaller.exe 3988 UniversalInstaller.exe -
Loads dropped DLL 4 IoCs
Processes:
UniversalInstaller.exeUniversalInstaller.exepid process 3648 UniversalInstaller.exe 3648 UniversalInstaller.exe 3988 UniversalInstaller.exe 3988 UniversalInstaller.exe -
Processes:
resource yara_rule C:\Users\Admin\Pictures\3TjNPrHEYJsK2j9r745JhVKu.exe themida behavioral2/memory/2000-451-0x00007FF66B590000-0x00007FF66C099000-memory.dmp themida behavioral2/memory/2000-457-0x00007FF66B590000-0x00007FF66C099000-memory.dmp themida behavioral2/memory/2000-458-0x00007FF66B590000-0x00007FF66C099000-memory.dmp themida behavioral2/memory/2000-459-0x00007FF66B590000-0x00007FF66C099000-memory.dmp themida behavioral2/memory/2000-461-0x00007FF66B590000-0x00007FF66C099000-memory.dmp themida behavioral2/memory/2000-485-0x00007FF66B590000-0x00007FF66C099000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/1932-479-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2092-488-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2092-504-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
HZ6p8GlFhdUDKSUiYOEyZl6j.exexB1b1HYzvYnKePltQbtD12eL.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" xB1b1HYzvYnKePltQbtD12eL.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
3TjNPrHEYJsK2j9r745JhVKu.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3TjNPrHEYJsK2j9r745JhVKu.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.myip.com 20 ipinfo.io 33 api.myip.com 34 ipinfo.io -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 14 IoCs
Processes:
3TjNPrHEYJsK2j9r745JhVKu.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 3TjNPrHEYJsK2j9r745JhVKu.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy 3TjNPrHEYJsK2j9r745JhVKu.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 3TjNPrHEYJsK2j9r745JhVKu.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 3TjNPrHEYJsK2j9r745JhVKu.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
3TjNPrHEYJsK2j9r745JhVKu.exepid process 2000 3TjNPrHEYJsK2j9r745JhVKu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exeUniversalInstaller.exedescription pid process target process PID 2992 set thread context of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 3988 set thread context of 4548 3988 UniversalInstaller.exe cmd.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
HZ6p8GlFhdUDKSUiYOEyZl6j.exexB1b1HYzvYnKePltQbtD12eL.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN HZ6p8GlFhdUDKSUiYOEyZl6j.exe File opened (read-only) \??\VBoxMiniRdrDN xB1b1HYzvYnKePltQbtD12eL.exe -
Drops file in Windows directory 7 IoCs
Processes:
xB1b1HYzvYnKePltQbtD12eL.execsrss.exeschtasks.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exedescription ioc process File created C:\Windows\rss\csrss.exe xB1b1HYzvYnKePltQbtD12eL.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\bWycNackLSywaqkmgR.job schtasks.exe File opened for modification C:\Windows\rss HZ6p8GlFhdUDKSUiYOEyZl6j.exe File created C:\Windows\rss\csrss.exe HZ6p8GlFhdUDKSUiYOEyZl6j.exe File opened for modification C:\Windows\rss xB1b1HYzvYnKePltQbtD12eL.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3528 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1068 3232 WerFault.exe u2h0.0.exe 3220 2404 WerFault.exe powershell.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 3756 schtasks.exe 3012 schtasks.exe 2400 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exepowershell.exepowershell.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" HZ6p8GlFhdUDKSUiYOEyZl6j.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exepowershell.exexB1b1HYzvYnKePltQbtD12eL.exepowershell.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exepowershell.exexB1b1HYzvYnKePltQbtD12eL.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 2404 powershell.exe 2404 powershell.exe 4976 powershell.exe 4976 powershell.exe 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4428 powershell.exe 4428 powershell.exe 4992 xB1b1HYzvYnKePltQbtD12eL.exe 4992 xB1b1HYzvYnKePltQbtD12eL.exe 632 powershell.exe 632 powershell.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe 4008 powershell.exe 4008 powershell.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1764 xB1b1HYzvYnKePltQbtD12eL.exe 1188 powershell.exe 1188 powershell.exe 3580 powershell.exe 3580 powershell.exe 4836 powershell.exe 4836 powershell.exe 1308 powershell.exe 1308 powershell.exe 1812 powershell.exe 1812 powershell.exe 3052 powershell.exe 3052 powershell.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 1028 csrss.exe 1028 csrss.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 2404 injector.exe 1028 csrss.exe 1028 csrss.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
UniversalInstaller.exepid process 3988 UniversalInstaller.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
regasm.exepowershell.exepowershell.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exepowershell.exexB1b1HYzvYnKePltQbtD12eL.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exepowershell.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2152 regasm.exe Token: SeDebugPrivilege 2404 powershell.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeDebugPrivilege 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe Token: SeImpersonatePrivilege 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 4992 xB1b1HYzvYnKePltQbtD12eL.exe Token: SeImpersonatePrivilege 4992 xB1b1HYzvYnKePltQbtD12eL.exe Token: SeDebugPrivilege 632 powershell.exe Token: SeDebugPrivilege 4008 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeDebugPrivilege 3580 powershell.exe Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeSystemEnvironmentPrivilege 1028 csrss.exe Token: SeSecurityPrivilege 3528 sc.exe Token: SeSecurityPrivilege 3528 sc.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeIncreaseQuotaPrivilege 3660 WMIC.exe Token: SeSecurityPrivilege 3660 WMIC.exe Token: SeTakeOwnershipPrivilege 3660 WMIC.exe Token: SeLoadDriverPrivilege 3660 WMIC.exe Token: SeSystemProfilePrivilege 3660 WMIC.exe Token: SeSystemtimePrivilege 3660 WMIC.exe Token: SeProfSingleProcessPrivilege 3660 WMIC.exe Token: SeIncBasePriorityPrivilege 3660 WMIC.exe Token: SeCreatePagefilePrivilege 3660 WMIC.exe Token: SeBackupPrivilege 3660 WMIC.exe Token: SeRestorePrivilege 3660 WMIC.exe Token: SeShutdownPrivilege 3660 WMIC.exe Token: SeDebugPrivilege 3660 WMIC.exe Token: SeSystemEnvironmentPrivilege 3660 WMIC.exe Token: SeRemoteShutdownPrivilege 3660 WMIC.exe Token: SeUndockPrivilege 3660 WMIC.exe Token: SeManageVolumePrivilege 3660 WMIC.exe Token: 33 3660 WMIC.exe Token: 34 3660 WMIC.exe Token: 35 3660 WMIC.exe Token: 36 3660 WMIC.exe Token: SeIncreaseQuotaPrivilege 3660 WMIC.exe Token: SeSecurityPrivilege 3660 WMIC.exe Token: SeTakeOwnershipPrivilege 3660 WMIC.exe Token: SeLoadDriverPrivilege 3660 WMIC.exe Token: SeSystemProfilePrivilege 3660 WMIC.exe Token: SeSystemtimePrivilege 3660 WMIC.exe Token: SeProfSingleProcessPrivilege 3660 WMIC.exe Token: SeIncBasePriorityPrivilege 3660 WMIC.exe Token: SeCreatePagefilePrivilege 3660 WMIC.exe Token: SeBackupPrivilege 3660 WMIC.exe Token: SeRestorePrivilege 3660 WMIC.exe Token: SeShutdownPrivilege 3660 WMIC.exe Token: SeDebugPrivilege 3660 WMIC.exe Token: SeSystemEnvironmentPrivilege 3660 WMIC.exe Token: SeRemoteShutdownPrivilege 3660 WMIC.exe Token: SeUndockPrivilege 3660 WMIC.exe Token: SeManageVolumePrivilege 3660 WMIC.exe Token: 33 3660 WMIC.exe Token: 34 3660 WMIC.exe Token: 35 3660 WMIC.exe Token: 36 3660 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
Qg_Appv5.exeUniversalInstaller.exeUniversalInstaller.exepid process 2416 Qg_Appv5.exe 3648 UniversalInstaller.exe 3648 UniversalInstaller.exe 3988 UniversalInstaller.exe 3988 UniversalInstaller.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exeregasm.exe6I64hwjvO3cAghk7nmA7AYb8.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exexB1b1HYzvYnKePltQbtD12eL.exeHZ6p8GlFhdUDKSUiYOEyZl6j.exexB1b1HYzvYnKePltQbtD12eL.execmd.execmd.execsrss.exedescription pid process target process PID 2992 wrote to memory of 2020 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe jsc.exe PID 2992 wrote to memory of 2020 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe jsc.exe PID 2992 wrote to memory of 2020 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe jsc.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2992 wrote to memory of 2152 2992 b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe regasm.exe PID 2152 wrote to memory of 3204 2152 regasm.exe 6I64hwjvO3cAghk7nmA7AYb8.exe PID 2152 wrote to memory of 3204 2152 regasm.exe 6I64hwjvO3cAghk7nmA7AYb8.exe PID 2152 wrote to memory of 3204 2152 regasm.exe 6I64hwjvO3cAghk7nmA7AYb8.exe PID 2152 wrote to memory of 3392 2152 regasm.exe HZ6p8GlFhdUDKSUiYOEyZl6j.exe PID 2152 wrote to memory of 3392 2152 regasm.exe HZ6p8GlFhdUDKSUiYOEyZl6j.exe PID 2152 wrote to memory of 3392 2152 regasm.exe HZ6p8GlFhdUDKSUiYOEyZl6j.exe PID 3204 wrote to memory of 3232 3204 6I64hwjvO3cAghk7nmA7AYb8.exe u2h0.0.exe PID 3204 wrote to memory of 3232 3204 6I64hwjvO3cAghk7nmA7AYb8.exe u2h0.0.exe PID 3204 wrote to memory of 3232 3204 6I64hwjvO3cAghk7nmA7AYb8.exe u2h0.0.exe PID 3392 wrote to memory of 2404 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 3392 wrote to memory of 2404 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 3392 wrote to memory of 2404 3392 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 2152 wrote to memory of 4992 2152 regasm.exe xB1b1HYzvYnKePltQbtD12eL.exe PID 2152 wrote to memory of 4992 2152 regasm.exe xB1b1HYzvYnKePltQbtD12eL.exe PID 2152 wrote to memory of 4992 2152 regasm.exe xB1b1HYzvYnKePltQbtD12eL.exe PID 4992 wrote to memory of 4976 4992 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 4992 wrote to memory of 4976 4992 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 4992 wrote to memory of 4976 4992 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 4964 wrote to memory of 4428 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 4964 wrote to memory of 4428 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 4964 wrote to memory of 4428 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 1764 wrote to memory of 632 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 1764 wrote to memory of 632 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 1764 wrote to memory of 632 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 4964 wrote to memory of 2900 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe cmd.exe PID 4964 wrote to memory of 2900 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe cmd.exe PID 2900 wrote to memory of 4076 2900 cmd.exe netsh.exe PID 2900 wrote to memory of 4076 2900 cmd.exe netsh.exe PID 4964 wrote to memory of 4008 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 4964 wrote to memory of 4008 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 4964 wrote to memory of 4008 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 1764 wrote to memory of 4308 1764 xB1b1HYzvYnKePltQbtD12eL.exe cmd.exe PID 1764 wrote to memory of 4308 1764 xB1b1HYzvYnKePltQbtD12eL.exe cmd.exe PID 4308 wrote to memory of 2420 4308 cmd.exe netsh.exe PID 4308 wrote to memory of 2420 4308 cmd.exe netsh.exe PID 1764 wrote to memory of 1188 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 1764 wrote to memory of 1188 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 1764 wrote to memory of 1188 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 4964 wrote to memory of 3580 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 4964 wrote to memory of 3580 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 4964 wrote to memory of 3580 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe powershell.exe PID 1764 wrote to memory of 4836 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 1764 wrote to memory of 4836 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 1764 wrote to memory of 4836 1764 xB1b1HYzvYnKePltQbtD12eL.exe powershell.exe PID 4964 wrote to memory of 1028 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe csrss.exe PID 4964 wrote to memory of 1028 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe csrss.exe PID 4964 wrote to memory of 1028 4964 HZ6p8GlFhdUDKSUiYOEyZl6j.exe csrss.exe PID 1028 wrote to memory of 1308 1028 csrss.exe powershell.exe PID 1028 wrote to memory of 1308 1028 csrss.exe powershell.exe PID 1028 wrote to memory of 1308 1028 csrss.exe powershell.exe PID 1028 wrote to memory of 1812 1028 csrss.exe powershell.exe PID 1028 wrote to memory of 1812 1028 csrss.exe powershell.exe PID 1028 wrote to memory of 1812 1028 csrss.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe"C:\Users\Admin\AppData\Local\Temp\b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\6I64hwjvO3cAghk7nmA7AYb8.exe"C:\Users\Admin\Pictures\6I64hwjvO3cAghk7nmA7AYb8.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\u2h0.0.exe"C:\Users\Admin\AppData\Local\Temp\u2h0.0.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 13405⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\ZXB_tls\UniversalInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZXB_tls\UniversalInstaller.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\ZXB_tls\UniversalInstaller.exeC:\Users\Admin\AppData\Roaming\ZXB_tls\UniversalInstaller.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
-
C:\Users\Admin\Pictures\HZ6p8GlFhdUDKSUiYOEyZl6j.exe"C:\Users\Admin\Pictures\HZ6p8GlFhdUDKSUiYOEyZl6j.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 25485⤵
- Program crash
-
C:\Users\Admin\Pictures\HZ6p8GlFhdUDKSUiYOEyZl6j.exe"C:\Users\Admin\Pictures\HZ6p8GlFhdUDKSUiYOEyZl6j.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\xB1b1HYzvYnKePltQbtD12eL.exe"C:\Users\Admin\Pictures\xB1b1HYzvYnKePltQbtD12eL.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\xB1b1HYzvYnKePltQbtD12eL.exe"C:\Users\Admin\Pictures\xB1b1HYzvYnKePltQbtD12eL.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\3TjNPrHEYJsK2j9r745JhVKu.exe"C:\Users\Admin\Pictures\3TjNPrHEYJsK2j9r745JhVKu.exe"3⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\PGlMgFtEp0LNDygGTntTwmJD.exe"C:\Users\Admin\Pictures\PGlMgFtEp0LNDygGTntTwmJD.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS9E9.tmp\Install.exe.\Install.exe /nxdidQZJ "385118" /S4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 05:16:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\qdcgIGr.exe\" em /pqsite_idaqM 385118 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3232 -ip 32321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2404 -ip 24041⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Virtualization/Sandbox Evasion
1Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS9E9.tmp\Install.exeFilesize
6.8MB
MD5e77964e011d8880eae95422769249ca4
SHA18e15d7c4b7812a1da6c91738c7178adf0ff3200f
SHA256f200984380d291051fc4b342641cd34e7560cadf4af41b2e02b8778f14418f50
SHA5128feb3dc4432ec0a87416cbc75110d59efaf6504b4de43090fc90286bd37f98fc0a5fb12878bb33ac2f6cd83252e8dfd67dd96871b4a224199c1f595d33d4cade
-
C:\Users\Admin\AppData\Local\Temp\9fd8d771Filesize
5.8MB
MD5b96e10e36a9ef9a31b805f9749e57ae3
SHA1bc39aa27931f264be23c4d603d5dbaf09ca8f37e
SHA256ba11437b4ceb6ce1493ec4428eac92404425a4da52cfbe1292e4b2b325c90d02
SHA512cb1c82e0ab8d89a0fe05ec5953fc0dbe16f38439155b6a585fdb2577c86dcfa55bfea0c88145123d9d3ab70ac7af09f6a5ee428e8aab0c1d184bbfdd836afda5
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exeFilesize
14.6MB
MD59eba9ca5f06b484cbbe41ed6fb4a8768
SHA1b52ea3b800254b0b1ae2f19e442fe98cc575eb18
SHA2565836b09135b1b8060226a6dd32b23a3985cbef5ca17b97102a851d8b8aa2c689
SHA512827f380f0d552b75be688c0de1bb6051c8d4cecf3784c6b396ce710b4c20b1b57c7eb16335cab93f451d7f69110df83f580dd562d1f26bbd2d7ca902e5c6ea74
-
C:\Users\Admin\AppData\Local\Temp\ZXB_tls\UIxMarketPlugin.dllFilesize
1.6MB
MD58f75e17a8bf3de6e22e77b5586f8a869
SHA1e0bf196cfc19a8772e003b9058bdc211b419b261
SHA2565f10a9fdcac32e93b1cebc365868ee3266f80c2734524b4aa7b6ea54e123f985
SHA5125a1e78613ad90cb0dc855d8a935b136722749889b66d4d8fc0f52438f0a4f4c8c31fbb981e9c6a13ffb2cc2b77fe0747204b63a91c6fff4646eed915387c8d7d
-
C:\Users\Admin\AppData\Local\Temp\ZXB_tls\UniversalInstaller.exeFilesize
2.4MB
MD59fb4770ced09aae3b437c1c6eb6d7334
SHA1fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256
-
C:\Users\Admin\AppData\Local\Temp\ZXB_tls\relay.dllFilesize
1.5MB
MD57d2f87123e63950159fb2c724e55bdab
SHA1360f304a6311080e1fead8591cb4659a8d135f2d
SHA256b3483bb771948ed8d3f76faaa3606c8ef72e3d2d355eaa652877e21e0651aa9a
SHA5126cb8d27ebcfdf9e472c0a6fff86e6f4ec604b8f0f21c197ba6d5b76b703296c10c8d7c4fb6b082c7e77f5c35d364bcffd76ae54137e2c8944c1ea7bb9e2e5f08
-
C:\Users\Admin\AppData\Local\Temp\ZXB_tls\somebody.rtfFilesize
24KB
MD5ff36ebcf134c8846aea77446867e5bc6
SHA153fdf2c0bec711e377edb4f97cd147728fb568f6
SHA256e1c256e5a7f17cb64740223084009f37bddccc49b05e881133412057689b04e9
SHA512b07d5065dd39843c8c7bdfccdd8d39f44b1ce9fe100a2fcf7210549ea1d46bcac54080cf91eff0a05360b26233c542daabdbd5d3f096a5bf0e366583ddb29ec1
-
C:\Users\Admin\AppData\Local\Temp\ZXB_tls\spawn.xmlFilesize
1.2MB
MD50d4b3bef832fe7d161ec85f9a3ae2033
SHA198af2a1125bf6e1890ce6dab84834eecdef30d95
SHA256422c6e1fec6485e29bbc20e3f74db6bc1d01be6acfbcaa10b7d9041e5fee8670
SHA512730d1a012eaa109a87705c2b6a53280f99ca8361ad6186df7cd7bf452cbf748bc94e894c35e6cf0590014baf025a3061bce1107fb724922061afdcedf6e7b971
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1ucnxlcx.sa5.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\ac722634Filesize
1.4MB
MD54d68b109ca7863cf9afb159392161b21
SHA1c4f0c50cf2a106419cb1f8e6631ad63af9ef51c3
SHA25641829a2a54020e78bd5aca9a6ba80f8e8be8d2297754e3af346106287378ff54
SHA5122e5a510014706f67893607ef82d43372d168f40d58c70dba3d818d00aee1f4d4aa8182cc7fa5c26ddba4d904252c578aae4f9522f8d1dc9653298cb1a75d9642
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\u2h0.0.exeFilesize
323KB
MD51d4341aa0ca4aefcb043d19eb205d8ac
SHA1c6e7a063a22e6bad72b2c81017747ab31cb59579
SHA25642af762221074082dc3aa6e4efdc2b6439cc026d6e94d6eeae97fcfafda272b4
SHA5121bcc133000feb1ab7944295a14601ff1a66432dcbe117e9e60c9f98cb8aee5b28f0ddcbbc25e2b6d91b677ca67de32a8930a1317de9b8be17524a9bea43c73a7
-
C:\Users\Admin\Pictures\3TjNPrHEYJsK2j9r745JhVKu.exeFilesize
3.9MB
MD5ffee05ea98b1d51026a44fad0841a8a9
SHA150a703329c7b9812c17a02b554cf406040079fec
SHA2564cb040696b9ffb14794955b0e56eed04fde0cae3a5ee748dd513ad42c411c823
SHA512626ddc18a906b74a231daa5bcc092a90708e0e3d42e4db645d59d19de7ef38a2d91a843f11dbc7873d379bfa14e87c5fc6d09a657e0b44abd24b9991cb971f86
-
C:\Users\Admin\Pictures\6I64hwjvO3cAghk7nmA7AYb8.exeFilesize
445KB
MD5962689a584907a91344cd3427b586a04
SHA1662bccdb6bd35082045778a68361dd3bf849dd57
SHA2566abeb832e0ebffa3c8f166620d0aba275c0d51c4f75465e79a85716aead44cb4
SHA512c9fa49f5c86498857c78ca833c847758b0e8b61db68454a5a5b3950332ac3f7238606f0ead0b1c288fcf82f7e450fb90b07f8770badac376bb8786caa755f6cb
-
C:\Users\Admin\Pictures\HZ6p8GlFhdUDKSUiYOEyZl6j.exeFilesize
4.2MB
MD512c1251ddacc8c6651573aaae2a36711
SHA1aa4a4fc95f24a847f33a0fcc22d318fe947929d0
SHA256a018166a731757f43374b0b24baecfbf31b85cf9de793b9d11b186acf887bf22
SHA512e8e9723b210254504ae06f77ed86ff5c7da0ac1ba5134cb2ab99cd42b06744cdf2379835d5e8cbd413da69b1184a0d6297d29dc8393794d8959c5a2dc94f0a69
-
C:\Users\Admin\Pictures\PGlMgFtEp0LNDygGTntTwmJD.exeFilesize
6.4MB
MD5aaa56797070369ad346fbd9bb6cc5e8b
SHA1a1d01943f0a354d3a000628262671254ca6a91b8
SHA2569d7d08ac35f0113f7c814d257bf88b8222975aaa0a3fdeda88ac7185dbc50905
SHA512e69d25a158567c6bce6e9450de17d0814b9b9c11f4bb31e5dcc3e8b4378062cc7e31da625f6ba4a2280b393034a6c832a0fc0a1e16364dc7e8c8146de245b5be
-
C:\Users\Admin\Pictures\odbuPwdi80k3YYNspErunO5j.exeFilesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5db1338e06b40e83d02804c849869fd88
SHA174faa550e54ea37c4079f12779a8cdc82ba34aa4
SHA2565db9810f1cababd73799681a1eeec006338bfbcb738c1e2d62b1a5b78e998c35
SHA512df72d7616e0ed82022adc0eb0380ccc6d028f63a3401df7514a64e174d571406fe1ef51de7761d99ac4ad2ba9fda584643af9c5c9d81a0771c13dde4b779f958
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5745899c7771eb19fc876793cca402a41
SHA16c65c6fd59799dc680b0494a2f249b417f7d74da
SHA25683b4bb22c688379bde90f00f7ff0e9c0632c30ed02fece6a7a21efb37eeb2a63
SHA5128e4a242cbbdbcdd886d2b5dec36bbb1c4adcf25e776bb363353fdcf913f5f3542551b6ad8955f0e4ddb9a4a39e1f1fbcd1c9564d71c963e9ff6ff35ade20766f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD545b98e412d86aa75e7da998586779bab
SHA14dc2f97f92906ae58a0c9f1bee5d777644c0785d
SHA2560eea1aa3e5b7c65b0227fc97b480e438563d82937c70005836ed5853b4e47568
SHA51251f50ea199a3f19236d862e4827feff41d138e3f6ab58e6e358630d50daccf23eba5b0661383a72c29984c4e87feeb417cc7746a154b51a9eb4dfce19d52882b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD582c51a491781ed87a90be07d40431b59
SHA1bb09ebacf10b71980f1ac7d267f807c81bfa23fc
SHA256015bfa0793e4f37c0499702d12ece87aadb5ef13493c6f2e5795ddc896dcb601
SHA512fad757b346ef89bc59450dca39cac4a8d233ef4f9aabb09e508fc930ea3aa4cd8717cceb27bc30fd52cf7c63fbb482684bd82de98f9bb31ea9f434875d03e482
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD501621b22cd937a24bc87793665cfdf30
SHA11f8e06bb8a7c989299146ecc2e97c4153d00c8a3
SHA256fedf737f5679a26b400bdc5349589b7152f6a1ea119aeeab35183b6b71981110
SHA512fe44c06547bbb6ecefa0cad2de446c21b3fdc5b1e7ac51ff9f2f04353d0d75bbc1a55f12c3caf1e5d0965f53ab8304842103136df5632ae7ad59e76aad86f35f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD54b0ea2e114aecbc9dec16d994c0b51d1
SHA138bd1bb8ea228df3ac9c6ebc71e911255966d6be
SHA25615a9a55d478726578fca58ee95acf7ff0de6d626e5fdb2cec5a40a84438611ef
SHA512130ace8861cd7053bb1efaaf28ba17c34027c62741b5ceb78513833621e9698091b753d0c34264cc363a8505fb0a9c5fbe76371c4e9bff2205588e51f88bf208
-
C:\Windows\System32\GroupPolicy\gpt.iniFilesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/1028-507-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1028-484-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1028-492-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1028-500-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1028-426-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1028-449-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1028-514-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1764-324-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1764-176-0x0000000003B60000-0x0000000003F60000-memory.dmpFilesize
4.0MB
-
memory/1764-425-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1932-479-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2000-485-0x00007FF66B590000-0x00007FF66C099000-memory.dmpFilesize
11.0MB
-
memory/2000-451-0x00007FF66B590000-0x00007FF66C099000-memory.dmpFilesize
11.0MB
-
memory/2000-457-0x00007FF66B590000-0x00007FF66C099000-memory.dmpFilesize
11.0MB
-
memory/2000-458-0x00007FF66B590000-0x00007FF66C099000-memory.dmpFilesize
11.0MB
-
memory/2000-459-0x00007FF66B590000-0x00007FF66C099000-memory.dmpFilesize
11.0MB
-
memory/2000-461-0x00007FF66B590000-0x00007FF66C099000-memory.dmpFilesize
11.0MB
-
memory/2092-488-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2092-504-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2152-99-0x0000000005080000-0x0000000005090000-memory.dmpFilesize
64KB
-
memory/2152-0-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2152-70-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/2152-2-0x0000000005080000-0x0000000005090000-memory.dmpFilesize
64KB
-
memory/2152-1-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/2404-96-0x0000000005FD0000-0x000000000601C000-memory.dmpFilesize
304KB
-
memory/2404-132-0x0000000007580000-0x000000000759A000-memory.dmpFilesize
104KB
-
memory/2404-64-0x0000000002C00000-0x0000000002C10000-memory.dmpFilesize
64KB
-
memory/2404-63-0x0000000002790000-0x00000000027C6000-memory.dmpFilesize
216KB
-
memory/2404-66-0x00000000052F0000-0x000000000591A000-memory.dmpFilesize
6.2MB
-
memory/2404-65-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/2404-67-0x0000000005120000-0x0000000005142000-memory.dmpFilesize
136KB
-
memory/2404-68-0x00000000051C0000-0x0000000005226000-memory.dmpFilesize
408KB
-
memory/2404-69-0x0000000005A90000-0x0000000005AF6000-memory.dmpFilesize
408KB
-
memory/2404-82-0x0000000002C00000-0x0000000002C10000-memory.dmpFilesize
64KB
-
memory/2404-90-0x0000000005B00000-0x0000000005E57000-memory.dmpFilesize
3.3MB
-
memory/2404-91-0x0000000005FA0000-0x0000000005FBE000-memory.dmpFilesize
120KB
-
memory/2404-101-0x00000000063D0000-0x0000000006416000-memory.dmpFilesize
280KB
-
memory/2404-115-0x00000000073C0000-0x00000000073F4000-memory.dmpFilesize
208KB
-
memory/2404-117-0x000000006F360000-0x000000006F6B7000-memory.dmpFilesize
3.3MB
-
memory/2404-129-0x000000007F800000-0x000000007F810000-memory.dmpFilesize
64KB
-
memory/2404-130-0x0000000007440000-0x00000000074E4000-memory.dmpFilesize
656KB
-
memory/2404-128-0x0000000007420000-0x000000000743E000-memory.dmpFilesize
120KB
-
memory/2404-116-0x000000006F310000-0x000000006F35C000-memory.dmpFilesize
304KB
-
memory/2404-134-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/2404-131-0x0000000007BD0000-0x000000000824A000-memory.dmpFilesize
6.5MB
-
memory/2404-133-0x00000000075C0000-0x00000000075CA000-memory.dmpFilesize
40KB
-
memory/3204-118-0x0000000000400000-0x0000000001A3A000-memory.dmpFilesize
22.2MB
-
memory/3204-102-0x0000000001DD0000-0x0000000001ED0000-memory.dmpFilesize
1024KB
-
memory/3204-17-0x0000000001DD0000-0x0000000001ED0000-memory.dmpFilesize
1024KB
-
memory/3204-19-0x0000000000400000-0x0000000001A3A000-memory.dmpFilesize
22.2MB
-
memory/3204-18-0x0000000003770000-0x00000000037DE000-memory.dmpFilesize
440KB
-
memory/3232-60-0x0000000001C80000-0x0000000001D80000-memory.dmpFilesize
1024KB
-
memory/3232-114-0x0000000000400000-0x0000000001A1C000-memory.dmpFilesize
22.1MB
-
memory/3232-62-0x0000000000400000-0x0000000001A1C000-memory.dmpFilesize
22.1MB
-
memory/3232-61-0x0000000003620000-0x0000000003647000-memory.dmpFilesize
156KB
-
memory/3392-47-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/3392-45-0x0000000003B90000-0x0000000003F94000-memory.dmpFilesize
4.0MB
-
memory/3392-46-0x0000000003FA0000-0x000000000488B000-memory.dmpFilesize
8.9MB
-
memory/3392-119-0x0000000003B90000-0x0000000003F94000-memory.dmpFilesize
4.0MB
-
memory/3392-150-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4428-159-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/4428-162-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/4428-157-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/4964-323-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4964-152-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4964-287-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4964-151-0x0000000003BD0000-0x0000000003FC9000-memory.dmpFilesize
4.0MB
-
memory/4976-148-0x00000000077C0000-0x0000000007864000-memory.dmpFilesize
656KB
-
memory/4976-112-0x0000000004ED0000-0x0000000004EE0000-memory.dmpFilesize
64KB
-
memory/4976-153-0x00000000079E0000-0x0000000007A76000-memory.dmpFilesize
600KB
-
memory/4976-156-0x0000000007990000-0x000000000799E000-memory.dmpFilesize
56KB
-
memory/4976-173-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/4976-170-0x0000000007A90000-0x0000000007A98000-memory.dmpFilesize
32KB
-
memory/4976-138-0x000000006F360000-0x000000006F6B7000-memory.dmpFilesize
3.3MB
-
memory/4976-169-0x0000000007AA0000-0x0000000007ABA000-memory.dmpFilesize
104KB
-
memory/4976-149-0x0000000004ED0000-0x0000000004EE0000-memory.dmpFilesize
64KB
-
memory/4976-139-0x000000007F3C0000-0x000000007F3D0000-memory.dmpFilesize
64KB
-
memory/4976-137-0x000000006F310000-0x000000006F35C000-memory.dmpFilesize
304KB
-
memory/4976-108-0x0000000074D70000-0x0000000075521000-memory.dmpFilesize
7.7MB
-
memory/4976-113-0x0000000004ED0000-0x0000000004EE0000-memory.dmpFilesize
64KB
-
memory/4976-154-0x0000000007950000-0x0000000007961000-memory.dmpFilesize
68KB
-
memory/4976-158-0x00000000079A0000-0x00000000079B5000-memory.dmpFilesize
84KB
-
memory/4992-100-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4992-177-0x0000000003B20000-0x0000000003F25000-memory.dmpFilesize
4.0MB
-
memory/4992-98-0x0000000003F30000-0x000000000481B000-memory.dmpFilesize
8.9MB
-
memory/4992-97-0x0000000003B20000-0x0000000003F25000-memory.dmpFilesize
4.0MB