Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2023 06:20
Static task
static1
Behavioral task
behavioral1
Sample
1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe
-
Size
273KB
-
MD5
996b3793420857f2c380c78fddced836
-
SHA1
70f60fefe59754f8c34c7697eb2fbc21e1593ad1
-
SHA256
1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24
-
SHA512
c9e7d42e449619be405a7c1f3a1632d1e146746cff185fb86367c32f75c63540b8061d063205fcd1e2ac4feced1e93e63cadba049ddb878d08fe69abd67db86b
-
SSDEEP
3072:EBqVc+MvXLxnMjT1o4qCx7iPcGr5PY9drsk1Np:YqUvXLxnMjT1zqAvuPG1
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/raud/get.php
http://zexeq.com/lancer/get.php
-
extension
.ooza
-
offline_id
dhL6XvokZotUzL67Na5WfNIBufODsob7eYc3mzt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-XA1LckrLRP Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0785Okhu
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
smokeloader
pub1
Extracted
smokeloader
up3
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/3736-226-0x0000000002CB0000-0x0000000002DE1000-memory.dmp family_fabookie -
Detected Djvu ransomware 28 IoCs
resource yara_rule behavioral2/memory/1068-34-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1068-37-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1068-30-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1068-40-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4884-25-0x0000000002510000-0x000000000262B000-memory.dmp family_djvu behavioral2/memory/3168-54-0x00000000024E0000-0x00000000025FB000-memory.dmp family_djvu behavioral2/memory/3184-63-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3184-61-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3184-57-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3184-66-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1068-92-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2008-104-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2008-105-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2008-107-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3184-128-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2604-150-0x0000000002A00000-0x0000000002DFE000-memory.dmp family_djvu behavioral2/memory/1112-157-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1112-160-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1112-162-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1112-192-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1144-200-0x00000000009B0000-0x0000000000A50000-memory.dmp family_djvu behavioral2/memory/5100-203-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5100-205-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5100-207-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2604-210-0x0000000002A00000-0x0000000002DFE000-memory.dmp family_djvu behavioral2/memory/3184-215-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2768-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2768-233-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/4020-193-0x0000000002950000-0x000000000295D000-memory.dmp family_lgoogloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 4 IoCs
resource yara_rule behavioral2/memory/2604-151-0x0000000002E00000-0x00000000036EB000-memory.dmp family_glupteba behavioral2/memory/2604-153-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2604-213-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2604-214-0x0000000002E00000-0x00000000036EB000-memory.dmp family_glupteba -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4280 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation DC75.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation CC.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 8BC.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation E19A.exe -
Executes dropped EXE 25 IoCs
pid Process 4884 DC75.exe 3128 DDBE.exe 1168 DE9A.exe 3364 DF86.exe 1068 DC75.exe 3168 E19A.exe 3184 E19A.exe 4604 DC75.exe 2008 DC75.exe 4568 CC.exe 3736 aafg31.exe 2876 toolspub2.exe 2604 31839b57a4f11171d6abc8bbc4451ee4.exe 2740 8BC.exe 1112 8BC.exe 3392 134D.exe 3796 1755.exe 1144 8BC.exe 5100 8BC.exe 3760 E19A.exe 2768 E19A.exe 1328 toolspub2.exe 1520 31839b57a4f11171d6abc8bbc4451ee4.exe 3944 csrss.exe 2844 injector.exe -
Loads dropped DLL 1 IoCs
pid Process 4268 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3448 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c34ef6dd-4275-4e21-a266-e793344d7272\\E19A.exe\" --AutoStart" E19A.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 api.2ip.ua 37 api.2ip.ua 39 api.2ip.ua 70 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4884 set thread context of 1068 4884 DC75.exe 94 PID 3168 set thread context of 3184 3168 E19A.exe 96 PID 3364 set thread context of 1004 3364 DF86.exe 103 PID 4604 set thread context of 2008 4604 DC75.exe 105 PID 2740 set thread context of 1112 2740 8BC.exe 114 PID 3392 set thread context of 4020 3392 134D.exe 118 PID 1144 set thread context of 5100 1144 8BC.exe 120 PID 3760 set thread context of 2768 3760 E19A.exe 124 PID 2876 set thread context of 1328 2876 toolspub2.exe 128 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1908 2008 WerFault.exe 105 756 5100 WerFault.exe 120 2952 2768 WerFault.exe 124 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1755.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1755.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3356 schtasks.exe 4180 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe 4220 1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4220 1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe 3796 1755.exe 1328 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeDebugPrivilege 1004 AppLaunch.exe Token: SeDebugPrivilege 3128 DDBE.exe Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeDebugPrivilege 1168 DE9A.exe Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeDebugPrivilege 3928 powershell.exe Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeDebugPrivilege 2604 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 2604 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3176 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4884 3176 Process not Found 87 PID 3176 wrote to memory of 4884 3176 Process not Found 87 PID 3176 wrote to memory of 4884 3176 Process not Found 87 PID 3176 wrote to memory of 3128 3176 Process not Found 88 PID 3176 wrote to memory of 3128 3176 Process not Found 88 PID 3176 wrote to memory of 3128 3176 Process not Found 88 PID 3176 wrote to memory of 1168 3176 Process not Found 90 PID 3176 wrote to memory of 1168 3176 Process not Found 90 PID 3176 wrote to memory of 1168 3176 Process not Found 90 PID 3176 wrote to memory of 3364 3176 Process not Found 92 PID 3176 wrote to memory of 3364 3176 Process not Found 92 PID 3176 wrote to memory of 3364 3176 Process not Found 92 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 4884 wrote to memory of 1068 4884 DC75.exe 94 PID 3176 wrote to memory of 3168 3176 Process not Found 95 PID 3176 wrote to memory of 3168 3176 Process not Found 95 PID 3176 wrote to memory of 3168 3176 Process not Found 95 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3176 wrote to memory of 2356 3176 Process not Found 97 PID 3176 wrote to memory of 2356 3176 Process not Found 97 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 3168 wrote to memory of 3184 3168 E19A.exe 96 PID 2356 wrote to memory of 4268 2356 regsvr32.exe 98 PID 2356 wrote to memory of 4268 2356 regsvr32.exe 98 PID 2356 wrote to memory of 4268 2356 regsvr32.exe 98 PID 3184 wrote to memory of 3448 3184 E19A.exe 99 PID 3184 wrote to memory of 3448 3184 E19A.exe 99 PID 3184 wrote to memory of 3448 3184 E19A.exe 99 PID 1068 wrote to memory of 4604 1068 DC75.exe 102 PID 1068 wrote to memory of 4604 1068 DC75.exe 102 PID 1068 wrote to memory of 4604 1068 DC75.exe 102 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 3364 wrote to memory of 1004 3364 DF86.exe 103 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 PID 4604 wrote to memory of 2008 4604 DC75.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe"C:\Users\Admin\AppData\Local\Temp\1622294a3a1c2d8bceb95fa40a2d7ce3c9d22c719726f967b002e1dda5f3af24_JC.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4220
-
C:\Users\Admin\AppData\Local\Temp\DC75.exeC:\Users\Admin\AppData\Local\Temp\DC75.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\DC75.exeC:\Users\Admin\AppData\Local\Temp\DC75.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\DC75.exe"C:\Users\Admin\AppData\Local\Temp\DC75.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\DC75.exe"C:\Users\Admin\AppData\Local\Temp\DC75.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 5685⤵
- Program crash
PID:1908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DDBE.exeC:\Users\Admin\AppData\Local\Temp\DDBE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
C:\Users\Admin\AppData\Local\Temp\DE9A.exeC:\Users\Admin\AppData\Local\Temp\DE9A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
C:\Users\Admin\AppData\Local\Temp\DF86.exeC:\Users\Admin\AppData\Local\Temp\DF86.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\E19A.exeC:\Users\Admin\AppData\Local\Temp\E19A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\E19A.exeC:\Users\Admin\AppData\Local\Temp\E19A.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c34ef6dd-4275-4e21-a266-e793344d7272" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\E19A.exe"C:\Users\Admin\AppData\Local\Temp\E19A.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\E19A.exe"C:\Users\Admin\AppData\Local\Temp\E19A.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 5685⤵
- Program crash
PID:2952
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\E6EA.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\E6EA.dll2⤵
- Loads dropped DLL
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2008 -ip 20081⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\CC.exeC:\Users\Admin\AppData\Local\Temp\CC.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:796
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5004
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4280
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2392
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:3944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2188
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:364
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2844
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8BC.exeC:\Users\Admin\AppData\Local\Temp\8BC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\8BC.exeC:\Users\Admin\AppData\Local\Temp\8BC.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\8BC.exe"C:\Users\Admin\AppData\Local\Temp\8BC.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\8BC.exe"C:\Users\Admin\AppData\Local\Temp\8BC.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 5685⤵
- Program crash
PID:756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\134D.exeC:\Users\Admin\AppData\Local\Temp\134D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\1755.exeC:\Users\Admin\AppData\Local\Temp\1755.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5100 -ip 51001⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2768 -ip 27681⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5bcf9c82a8e06cd4dbc7c6f8166b03d62
SHA1aa072fd0adc30bc7d45952443a137972eaea0499
SHA25632b64ccb43add6147056e3f68bd46c762c8b38dea72735355fc422160a0f417d
SHA5127a26e9797da034f01a08a1b62e4e7e39de67526257d015a0ef7590968af690fecb1852a0f3ee05f64bbf571344eb74ef4d404d2f145f7e7dd36f6a21816ba4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5fa4ae5fcb44bfaf845b845961180d250
SHA18257ee68bdd2bc3ea2723eda7aeba404195d46bf
SHA256574c66c19561773196a88f115168cf5d73b71fd26f9034606fe38a5535d4df96
SHA512ad1de0c1d0f5a4a7e3615b48537f75250779368b388520b001d96367d5aa19fa88a9f471d1212e679ab9eaae854374445807877891bf1b803fa6c7886877d253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD51237a0ef85ce046572149737b108f83b
SHA18de09fba3a7f15a057865b455133e7bfc615dccb
SHA256c5478cbc21f984eb72d4cbc31a4f523eaaf958c589fa2d646da64f744f79fce5
SHA5129d43906a8270ec62a16f896f8766171c529e238fba75eb47cb1aba3323fe5de9dbc336f3f70cc625346ed6c3420f07f8164d9dde3892e519f19aae4a61b80023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD51237a0ef85ce046572149737b108f83b
SHA18de09fba3a7f15a057865b455133e7bfc615dccb
SHA256c5478cbc21f984eb72d4cbc31a4f523eaaf958c589fa2d646da64f744f79fce5
SHA5129d43906a8270ec62a16f896f8766171c529e238fba75eb47cb1aba3323fe5de9dbc336f3f70cc625346ed6c3420f07f8164d9dde3892e519f19aae4a61b80023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD51237a0ef85ce046572149737b108f83b
SHA18de09fba3a7f15a057865b455133e7bfc615dccb
SHA256c5478cbc21f984eb72d4cbc31a4f523eaaf958c589fa2d646da64f744f79fce5
SHA5129d43906a8270ec62a16f896f8766171c529e238fba75eb47cb1aba3323fe5de9dbc336f3f70cc625346ed6c3420f07f8164d9dde3892e519f19aae4a61b80023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD539fe9ab18d4da7c596eac6786c776b90
SHA109dc7cea4e918efb8773dbdf1bd12b7ea3dde739
SHA2565a37515e74f141cf6b7b4dfc0a5415c7ed121053f21a0b0c2ec4891eeee5ac1c
SHA512faa0d97dec3e3e4816ebd3955a69d3da220b5f47375607e11a7ce3323702794e7387e1384b828b60832bb0efe8c3cd246612ffdd5910bda314d98093779b461f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5f31ffebb6a9dad843566c387fff9008a
SHA134ca4822661718d614545650c1a55c46cc950e43
SHA2568d86d2acb0cd8cc8c7e4cb6ec70d5618a176a5f349b6e449fd4244b0fdcfef06
SHA5124442dfe3751f28b5abf57475c6bc206a8611c7be17ec90b3c1d88bcde19c9a2d30f33da21413dcffad2918514cb43ca6ae95497384fe0ba204338c36c05c82c8
-
Filesize
2KB
MD59b756bc85e5324eb8f87a69e3f9959ab
SHA11778b2e2d6a00c421578a284db1e743931611d66
SHA256e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e
SHA512c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8
-
Filesize
3.4MB
MD5bba7cf3a70a424ea0626bb9a8bb9295b
SHA1a001759346c5a9f799fac6b1d6b35d286131d4df
SHA256f5a6cabc167d6ae3999dc047e6d45076468446f334cbb334e3f5220365acec63
SHA51298f766637cf46baa26e9490363148edd7b15d15eb57a3ba81626c409d3dc509d74ded40a1acdc1df14875b3e509dc8cce0fed0cd61286e6cd0be2b8a1f7e51c4
-
Filesize
3.4MB
MD5bba7cf3a70a424ea0626bb9a8bb9295b
SHA1a001759346c5a9f799fac6b1d6b35d286131d4df
SHA256f5a6cabc167d6ae3999dc047e6d45076468446f334cbb334e3f5220365acec63
SHA51298f766637cf46baa26e9490363148edd7b15d15eb57a3ba81626c409d3dc509d74ded40a1acdc1df14875b3e509dc8cce0fed0cd61286e6cd0be2b8a1f7e51c4
-
Filesize
253KB
MD5c8278d0f330c9815e8ecd7b564a450af
SHA15a4ccf0a0e0c7a0cbe6ae68a6efe445c9cbcaef6
SHA2567aa75c5d77d17af70d3d6f5ef1d52f38b919bf19ba7931ca5d330597536f208f
SHA512fee330d26d9b64298165b0ed209e501dbfe7860cccf37361f77250b3ec2e2e7827e3a2ad5445cdcb8a42aaebafaca7b77d849abd680a43a433981853c0e699bd
-
Filesize
253KB
MD5c8278d0f330c9815e8ecd7b564a450af
SHA15a4ccf0a0e0c7a0cbe6ae68a6efe445c9cbcaef6
SHA2567aa75c5d77d17af70d3d6f5ef1d52f38b919bf19ba7931ca5d330597536f208f
SHA512fee330d26d9b64298165b0ed209e501dbfe7860cccf37361f77250b3ec2e2e7827e3a2ad5445cdcb8a42aaebafaca7b77d849abd680a43a433981853c0e699bd
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
760KB
MD5c6151a4c996f7b027475f9520b6ea15e
SHA1f9df90d184aa6865ca9d0fd44e47338f327a418a
SHA2566db6e0c709bd2bbeec5a5e6a5ff76b322af67e5d35ee2bda87cff5389f1a3aad
SHA512d199a74a4b28946421793fb0e918ae682abf5fb0e5e0bd5d1c7f927d9e26dd499ac2e9fa7d27e8ab004fba6ac50b7c37dec8464dea58004a7484dc317d949b2b
-
Filesize
261KB
MD5eda1b6f6e01f038267413b3ae9d3eb23
SHA16e71d68c3496b513ba4f1b924fd46ddfdfb2c305
SHA2567c34d3d22db889dfe3f1ab7e5810a04436330824da5a8fdecc03a987876d66da
SHA512420b4cda1ab0ce3293a4954283cb12c53882f50b5aa5f0921b1bd915257694508d79420cb680ba36ef88636bc479e98e054549ca67d17f0e63d8f38d384b0c30
-
Filesize
261KB
MD5eda1b6f6e01f038267413b3ae9d3eb23
SHA16e71d68c3496b513ba4f1b924fd46ddfdfb2c305
SHA2567c34d3d22db889dfe3f1ab7e5810a04436330824da5a8fdecc03a987876d66da
SHA512420b4cda1ab0ce3293a4954283cb12c53882f50b5aa5f0921b1bd915257694508d79420cb680ba36ef88636bc479e98e054549ca67d17f0e63d8f38d384b0c30
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
393KB
MD5556da5275de73a738b146b51fea5a4ec
SHA1da32df559ab4da0348c51cc4126fe2a105e0062d
SHA256ef13668ac68ff21d2e3c7e4d00cbc953a82702042b7562d04ddbb9a25e4e8edd
SHA512ee9395e8a5b2c24dea7cd6a414e206f55321c3cba4cb13fa2e3a88ada5d618701263b34a9f5b468b6ad5034554c36a07409d56da561c589bb3e2ebe67f49ec69
-
Filesize
393KB
MD5556da5275de73a738b146b51fea5a4ec
SHA1da32df559ab4da0348c51cc4126fe2a105e0062d
SHA256ef13668ac68ff21d2e3c7e4d00cbc953a82702042b7562d04ddbb9a25e4e8edd
SHA512ee9395e8a5b2c24dea7cd6a414e206f55321c3cba4cb13fa2e3a88ada5d618701263b34a9f5b468b6ad5034554c36a07409d56da561c589bb3e2ebe67f49ec69
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
2.7MB
MD5d7bc2923dc1072484904a48b0441ad27
SHA194045c24ca38394bdd8a03d9b375599d03c7999a
SHA2561905aadfc6ecfb37b7dd9170642e35b1b8d8cc9ffd04d194b166d6c2b03004e0
SHA512e4241239fff67bbf6724c4865c969cd9674788a5519e41e3dba1d068d247b9b474e3eba414150b7665cf32736d5ef9bf5385c46073832d9b05675d20e2a8fe71
-
Filesize
2.7MB
MD5d7bc2923dc1072484904a48b0441ad27
SHA194045c24ca38394bdd8a03d9b375599d03c7999a
SHA2561905aadfc6ecfb37b7dd9170642e35b1b8d8cc9ffd04d194b166d6c2b03004e0
SHA512e4241239fff67bbf6724c4865c969cd9674788a5519e41e3dba1d068d247b9b474e3eba414150b7665cf32736d5ef9bf5385c46073832d9b05675d20e2a8fe71
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
253KB
MD5c8278d0f330c9815e8ecd7b564a450af
SHA15a4ccf0a0e0c7a0cbe6ae68a6efe445c9cbcaef6
SHA2567aa75c5d77d17af70d3d6f5ef1d52f38b919bf19ba7931ca5d330597536f208f
SHA512fee330d26d9b64298165b0ed209e501dbfe7860cccf37361f77250b3ec2e2e7827e3a2ad5445cdcb8a42aaebafaca7b77d849abd680a43a433981853c0e699bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57841b74a33c85ca631ca01bd56610cca
SHA17d59e52d1fcd801e4165b6bcf2f33dcdb2bb756a
SHA256ae1caa3ad8b768a9b391029c76be74874bd07e5c4086631681f74ead42314d35
SHA512c06745baf5a04df151d261c79ea691e9283e939d056378733b6ef43dbb563dfb866e1a412d0b462ac06025c183bddb320f6337fe78eccde9252105249d8e4dc8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50eeddc185bce73c40d2ea488143c653e
SHA14a2f8877830c81c9c1e7373f55f30763dfd67a2e
SHA256c6bce010b685e418cb02b397856b98243cf92bcff972e78b9de3b7d07ae5d452
SHA5128a053ad8ef74c8fe932bae88153fa3819fc68bcb0e3d922324744ae6334e53e80975713912081e20c56005671e63115b8e9d379582c46d8798c516d25e77cf30
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55b6d5daa611fb24d70cda8b7129a75e1
SHA17196fbfdf9dcafd5631a61ded17a3d9eeda4af33
SHA256ac409841514adbac7caebc82d14a7cc00fdf531de41f6974a4f372dd3e455123
SHA51232796f74744eeec768e5fb5a6ebf3e806c7b1a5f4c87651fd6f685922e796438e96b81f1d6234e36e5c7d4d83e44d8c6d5b7c514b44da4994afbe6fbe9fb8697
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5772d0408d5598a794adf323932dc64cb
SHA1d34be2f3e55cb34b3d6209b7d979cda01b361fb4
SHA2560d7eca1da3d4fdd98a447c93614cc602242f8a8974a380f3e737065bd5e34bc9
SHA51231ba2f8f10b17442c8c4b01b1afa1d099054d7023174a1fd09689349b41840083f90570af2cf96a8f786fbd67098329ac72076dc01c6c3e2cd16f29a9c0f6fed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD579b4e9a6c3034fbcbef163e13275bf39
SHA1e5db48039706c3df979ee4be7783bc50b7fe5988
SHA256b5afed0f2a2bb66e704ab06e738eb6e4902220f4ab0be7e5cf462fbfecc91705
SHA512fa86bfe98d4c8b883a53959965679356ad427976416c68b6ae569ca55b686af5d2d7c0c7ade81c154b22eed8504b1eb48f3e428fefa175506f4b27362ecd2eee
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80