Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2023, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe
Resource
win10v2004-20230915-en
General
-
Target
110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe
-
Size
196KB
-
MD5
d246b71e5df1eb4c2a7e617404aee3d4
-
SHA1
57ae3ea47c9b3ac954a69ea0272d0b311e97c129
-
SHA256
110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6
-
SHA512
c1cf471a2e3c80ccd51d1b91f931008a660ccf9566340d31426a800c31db79c6dc0978f2a19b9131380e3c8a7d5cc2162775e13db5cef992e5e9fb6a4dacd731
-
SSDEEP
3072:TOhzzLL/JYhibm2wUgur/U5f0vgbqu8FlpO56VpPT3R49:GzzLzOh6VwxuzU5fbbp8fbvPTh4
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/raud/get.php
http://zexeq.com/lancer/get.php
-
extension
.ooza
-
offline_id
dhL6XvokZotUzL67Na5WfNIBufODsob7eYc3mzt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-XA1LckrLRP Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0785Okhu
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
smokeloader
pub1
Signatures
-
Detected Djvu ransomware 25 IoCs
resource yara_rule behavioral2/memory/848-22-0x00000000024F0000-0x000000000260B000-memory.dmp family_djvu behavioral2/memory/2512-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2512-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2512-30-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2512-33-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2512-66-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3292-73-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3292-74-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3292-76-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3208-95-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3208-96-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3208-97-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3208-107-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2204-125-0x0000000002490000-0x00000000025AB000-memory.dmp family_djvu behavioral2/memory/444-128-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/444-132-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2288-133-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2288-131-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2288-135-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2288-127-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/444-124-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2288-139-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1440-176-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1440-159-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1440-154-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/2876-199-0x0000000002820000-0x000000000282D000-memory.dmp family_lgoogloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 2 IoCs
resource yara_rule behavioral2/memory/4744-209-0x0000000002D90000-0x000000000367B000-memory.dmp family_glupteba behavioral2/memory/4744-218-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3376 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 38BE.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 5A73.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 6013.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 707F.exe -
Executes dropped EXE 28 IoCs
pid Process 848 38BE.exe 3012 3A46.exe 2912 3B51.exe 2512 38BE.exe 3400 3D07.exe 2804 38BE.exe 3292 38BE.exe 2192 Conhost.exe 3208 5A73.exe 2204 6013.exe 2120 5A73.exe 444 5A73.exe 2288 6013.exe 5084 6013.exe 3588 707F.exe 1440 6013.exe 4464 aafg31.exe 2552 toolspub2.exe 1136 766C.exe 4744 31839b57a4f11171d6abc8bbc4451ee4.exe 2616 7AD2.exe 4928 809F.exe 3772 toolspub2.exe 2284 31839b57a4f11171d6abc8bbc4451ee4.exe 1476 csrss.exe 4324 injector.exe 4184 gjtgjst 3204 tjtgjst -
Loads dropped DLL 3 IoCs
pid Process 4280 regsvr32.exe 4320 InstallUtil.exe 4320 InstallUtil.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 908 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\4bff54de-845c-4ce7-8c29-efd1a4f7eedd\\38BE.exe\" --AutoStart" 38BE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 api.2ip.ua 64 api.2ip.ua 68 api.2ip.ua 49 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 848 set thread context of 2512 848 38BE.exe 96 PID 2804 set thread context of 3292 2804 38BE.exe 101 PID 3400 set thread context of 2984 3400 3D07.exe 105 PID 2192 set thread context of 3208 2192 Conhost.exe 107 PID 2120 set thread context of 444 2120 5A73.exe 112 PID 2204 set thread context of 2288 2204 6013.exe 113 PID 5084 set thread context of 1440 5084 6013.exe 118 PID 1136 set thread context of 2876 1136 766C.exe 127 PID 2552 set thread context of 3772 2552 Process not Found 131 PID 4928 set thread context of 4320 4928 809F.exe 132 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1060 3292 WerFault.exe 101 3156 444 WerFault.exe 112 5088 1440 WerFault.exe 118 3304 4320 WerFault.exe 132 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AD2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AD2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AD2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InstallUtil.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1452 schtasks.exe 524 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4100 110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe 4100 110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4100 110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe 2616 7AD2.exe 3772 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 3012 3A46.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 2984 AppLaunch.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 4928 809F.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 4472 powershell.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 4744 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 4744 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 848 3136 Process not Found 89 PID 3136 wrote to memory of 848 3136 Process not Found 89 PID 3136 wrote to memory of 848 3136 Process not Found 89 PID 3136 wrote to memory of 3012 3136 Process not Found 90 PID 3136 wrote to memory of 3012 3136 Process not Found 90 PID 3136 wrote to memory of 3012 3136 Process not Found 90 PID 3136 wrote to memory of 2912 3136 Process not Found 92 PID 3136 wrote to memory of 2912 3136 Process not Found 92 PID 3136 wrote to memory of 2912 3136 Process not Found 92 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 848 wrote to memory of 2512 848 38BE.exe 96 PID 3136 wrote to memory of 3400 3136 Process not Found 94 PID 3136 wrote to memory of 3400 3136 Process not Found 94 PID 3136 wrote to memory of 3400 3136 Process not Found 94 PID 2512 wrote to memory of 908 2512 38BE.exe 98 PID 2512 wrote to memory of 908 2512 38BE.exe 98 PID 2512 wrote to memory of 908 2512 38BE.exe 98 PID 2512 wrote to memory of 2804 2512 38BE.exe 99 PID 2512 wrote to memory of 2804 2512 38BE.exe 99 PID 2512 wrote to memory of 2804 2512 38BE.exe 99 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 2804 wrote to memory of 3292 2804 38BE.exe 101 PID 3400 wrote to memory of 4480 3400 3D07.exe 104 PID 3400 wrote to memory of 4480 3400 3D07.exe 104 PID 3400 wrote to memory of 4480 3400 3D07.exe 104 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3400 wrote to memory of 2984 3400 3D07.exe 105 PID 3136 wrote to memory of 2192 3136 Process not Found 130 PID 3136 wrote to memory of 2192 3136 Process not Found 130 PID 3136 wrote to memory of 2192 3136 Process not Found 130 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 2192 wrote to memory of 3208 2192 Conhost.exe 107 PID 3136 wrote to memory of 5028 3136 Process not Found 108 PID 3136 wrote to memory of 5028 3136 Process not Found 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe"C:\Users\Admin\AppData\Local\Temp\110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4100
-
C:\Users\Admin\AppData\Local\Temp\38BE.exeC:\Users\Admin\AppData\Local\Temp\38BE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\38BE.exeC:\Users\Admin\AppData\Local\Temp\38BE.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\4bff54de-845c-4ce7-8c29-efd1a4f7eedd" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\38BE.exe"C:\Users\Admin\AppData\Local\Temp\38BE.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\38BE.exe"C:\Users\Admin\AppData\Local\Temp\38BE.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 5845⤵
- Program crash
PID:1060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3A46.exeC:\Users\Admin\AppData\Local\Temp\3A46.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
C:\Users\Admin\AppData\Local\Temp\3B51.exeC:\Users\Admin\AppData\Local\Temp\3B51.exe1⤵
- Executes dropped EXE
PID:2912
-
C:\Users\Admin\AppData\Local\Temp\3D07.exeC:\Users\Admin\AppData\Local\Temp\3D07.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3292 -ip 32921⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\5A73.exeC:\Users\Admin\AppData\Local\Temp\5A73.exe1⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\5A73.exeC:\Users\Admin\AppData\Local\Temp\5A73.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\5A73.exe"C:\Users\Admin\AppData\Local\Temp\5A73.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\5A73.exe"C:\Users\Admin\AppData\Local\Temp\5A73.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 5685⤵
- Program crash
PID:3156
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5F08.dll1⤵PID:5028
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5F08.dll2⤵
- Loads dropped DLL
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\6013.exeC:\Users\Admin\AppData\Local\Temp\6013.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\6013.exeC:\Users\Admin\AppData\Local\Temp\6013.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\6013.exe"C:\Users\Admin\AppData\Local\Temp\6013.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\6013.exe"C:\Users\Admin\AppData\Local\Temp\6013.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 5685⤵
- Program crash
PID:5088
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 444 -ip 4441⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\707F.exeC:\Users\Admin\AppData\Local\Temp\707F.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3008
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2116
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:3376
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4960
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:208
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:1476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1452
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:3012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:4324
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:524
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1440 -ip 14401⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\766C.exeC:\Users\Admin\AppData\Local\Temp\766C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\7AD2.exeC:\Users\Admin\AppData\Local\Temp\7AD2.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2616
-
C:\Users\Admin\AppData\Local\Temp\809F.exeC:\Users\Admin\AppData\Local\Temp\809F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 18283⤵
- Program crash
PID:3304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4320 -ip 43201⤵PID:3496
-
C:\Users\Admin\AppData\Roaming\gjtgjstC:\Users\Admin\AppData\Roaming\gjtgjst1⤵
- Executes dropped EXE
PID:4184
-
C:\Users\Admin\AppData\Roaming\tjtgjstC:\Users\Admin\AppData\Roaming\tjtgjst1⤵
- Executes dropped EXE
PID:3204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5bcf9c82a8e06cd4dbc7c6f8166b03d62
SHA1aa072fd0adc30bc7d45952443a137972eaea0499
SHA25632b64ccb43add6147056e3f68bd46c762c8b38dea72735355fc422160a0f417d
SHA5127a26e9797da034f01a08a1b62e4e7e39de67526257d015a0ef7590968af690fecb1852a0f3ee05f64bbf571344eb74ef4d404d2f145f7e7dd36f6a21816ba4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5fa4ae5fcb44bfaf845b845961180d250
SHA18257ee68bdd2bc3ea2723eda7aeba404195d46bf
SHA256574c66c19561773196a88f115168cf5d73b71fd26f9034606fe38a5535d4df96
SHA512ad1de0c1d0f5a4a7e3615b48537f75250779368b388520b001d96367d5aa19fa88a9f471d1212e679ab9eaae854374445807877891bf1b803fa6c7886877d253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5327c39483b1b26c9fa0c8d9c2cca9ef3
SHA19d62c7c40e1af5b1e3120b764f5c98cd9dc9d3e7
SHA25683ae5bb79de53423a4fa3ccdf30e11e068b700eecc40617ef2c5b9a6a9098c1f
SHA5126c8d1dbca48c7b294d4de6b98d499c3cbadd57402ba3a9f75f50240bab54e1fee35bf61db5772b26ebaada31ddb064e0d98346b1defb5aa0066db00179edc4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD51f38fb71758671fdb1cd552efd76dac3
SHA15c3a0995d0e1c1f42caefa53b57656f099786181
SHA256a3a5022c4f90e051b2625f5ddf8b4193b260bcfce3a513eaa5de851220b93a1d
SHA51209d38e1fd81fa627d24e5d3158b2e7b10c301fad3cd20aa63ec9f245913b5e21baf9e8472bdb8039cc201cd83c4a4dabc1284e9913d8aed0d789a3700833fd17
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
261KB
MD5eda1b6f6e01f038267413b3ae9d3eb23
SHA16e71d68c3496b513ba4f1b924fd46ddfdfb2c305
SHA2567c34d3d22db889dfe3f1ab7e5810a04436330824da5a8fdecc03a987876d66da
SHA512420b4cda1ab0ce3293a4954283cb12c53882f50b5aa5f0921b1bd915257694508d79420cb680ba36ef88636bc479e98e054549ca67d17f0e63d8f38d384b0c30
-
Filesize
261KB
MD5eda1b6f6e01f038267413b3ae9d3eb23
SHA16e71d68c3496b513ba4f1b924fd46ddfdfb2c305
SHA2567c34d3d22db889dfe3f1ab7e5810a04436330824da5a8fdecc03a987876d66da
SHA512420b4cda1ab0ce3293a4954283cb12c53882f50b5aa5f0921b1bd915257694508d79420cb680ba36ef88636bc479e98e054549ca67d17f0e63d8f38d384b0c30
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
393KB
MD5556da5275de73a738b146b51fea5a4ec
SHA1da32df559ab4da0348c51cc4126fe2a105e0062d
SHA256ef13668ac68ff21d2e3c7e4d00cbc953a82702042b7562d04ddbb9a25e4e8edd
SHA512ee9395e8a5b2c24dea7cd6a414e206f55321c3cba4cb13fa2e3a88ada5d618701263b34a9f5b468b6ad5034554c36a07409d56da561c589bb3e2ebe67f49ec69
-
Filesize
393KB
MD5556da5275de73a738b146b51fea5a4ec
SHA1da32df559ab4da0348c51cc4126fe2a105e0062d
SHA256ef13668ac68ff21d2e3c7e4d00cbc953a82702042b7562d04ddbb9a25e4e8edd
SHA512ee9395e8a5b2c24dea7cd6a414e206f55321c3cba4cb13fa2e3a88ada5d618701263b34a9f5b468b6ad5034554c36a07409d56da561c589bb3e2ebe67f49ec69
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
761KB
MD563de455550db62c30b4e77469250c6f8
SHA1b401b0d3b3bd758c72df372a363b7ca6f1bd815d
SHA256e9569e9acbf5cb55edddd5e63d123933b0e007e4e617b448ac0582671eaaedb8
SHA5123fe5cb15265c59530a3f3a7aa122152e1e4c8d1db07984610e60ba8e3ddc136ac26d35d775f3bd67b2db5e4b7c8026c82adde1a15dbc74af63eda07f415318b4
-
Filesize
2.7MB
MD5e32b5d582a1ab3e2c26694b1c4012919
SHA137a66b1061dcc206b18d5e13a56432e718d76467
SHA256a65b0d905b0b9185bb2c10685b9b8c5c6adef91e5bc9b67c2e8ca48586181ee6
SHA512d017818aba5fa8c221b93648ef670ac3a32a543a9b7382cedffe4f8fae1cb230a6cffb410d51aa56f174ca49a4f1839ba05792d6e9c4104503295efc91a61aab
-
Filesize
2.7MB
MD5e32b5d582a1ab3e2c26694b1c4012919
SHA137a66b1061dcc206b18d5e13a56432e718d76467
SHA256a65b0d905b0b9185bb2c10685b9b8c5c6adef91e5bc9b67c2e8ca48586181ee6
SHA512d017818aba5fa8c221b93648ef670ac3a32a543a9b7382cedffe4f8fae1cb230a6cffb410d51aa56f174ca49a4f1839ba05792d6e9c4104503295efc91a61aab
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
3.4MB
MD5bba7cf3a70a424ea0626bb9a8bb9295b
SHA1a001759346c5a9f799fac6b1d6b35d286131d4df
SHA256f5a6cabc167d6ae3999dc047e6d45076468446f334cbb334e3f5220365acec63
SHA51298f766637cf46baa26e9490363148edd7b15d15eb57a3ba81626c409d3dc509d74ded40a1acdc1df14875b3e509dc8cce0fed0cd61286e6cd0be2b8a1f7e51c4
-
Filesize
3.4MB
MD5bba7cf3a70a424ea0626bb9a8bb9295b
SHA1a001759346c5a9f799fac6b1d6b35d286131d4df
SHA256f5a6cabc167d6ae3999dc047e6d45076468446f334cbb334e3f5220365acec63
SHA51298f766637cf46baa26e9490363148edd7b15d15eb57a3ba81626c409d3dc509d74ded40a1acdc1df14875b3e509dc8cce0fed0cd61286e6cd0be2b8a1f7e51c4
-
Filesize
252KB
MD5ac27a064e7a23ac80f1bb8e7cbe4b067
SHA101c13b49f5627069d3e737f2c528ae85c95c995d
SHA25611b725378fa36c9454f8d8c004e01aea95023f67507841f4a2d74424fbedc870
SHA512ea2132592915cb3a166e1cf173d575ffb94b2059d66ec767693fdf0bb5f796afef2669d03daff1a1bd7a9704494af70c486b1d1333c336e40e17c682278dcaad
-
Filesize
252KB
MD5ac27a064e7a23ac80f1bb8e7cbe4b067
SHA101c13b49f5627069d3e737f2c528ae85c95c995d
SHA25611b725378fa36c9454f8d8c004e01aea95023f67507841f4a2d74424fbedc870
SHA512ea2132592915cb3a166e1cf173d575ffb94b2059d66ec767693fdf0bb5f796afef2669d03daff1a1bd7a9704494af70c486b1d1333c336e40e17c682278dcaad
-
Filesize
1.3MB
MD56ed26ec1d8a9d3ed42d80185987b1009
SHA1954ab6cfff1eda72177bba3d6ae69a977d29d47a
SHA256ca41ebaca85e65918a21ea5a2c2d3a7e72772484578b21019037dc4acb9c53cb
SHA5120230c3c38fb682fc7a107287e12c71cff730bf3a03c11ab58fc8772eeb57d91b54b199a8f1c802f7523832e71a1d913b821b023abce256333a85fc0cefceec35
-
Filesize
1.3MB
MD56ed26ec1d8a9d3ed42d80185987b1009
SHA1954ab6cfff1eda72177bba3d6ae69a977d29d47a
SHA256ca41ebaca85e65918a21ea5a2c2d3a7e72772484578b21019037dc4acb9c53cb
SHA5120230c3c38fb682fc7a107287e12c71cff730bf3a03c11ab58fc8772eeb57d91b54b199a8f1c802f7523832e71a1d913b821b023abce256333a85fc0cefceec35
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
252KB
MD5ac27a064e7a23ac80f1bb8e7cbe4b067
SHA101c13b49f5627069d3e737f2c528ae85c95c995d
SHA25611b725378fa36c9454f8d8c004e01aea95023f67507841f4a2d74424fbedc870
SHA512ea2132592915cb3a166e1cf173d575ffb94b2059d66ec767693fdf0bb5f796afef2669d03daff1a1bd7a9704494af70c486b1d1333c336e40e17c682278dcaad
-
Filesize
252KB
MD5ac27a064e7a23ac80f1bb8e7cbe4b067
SHA101c13b49f5627069d3e737f2c528ae85c95c995d
SHA25611b725378fa36c9454f8d8c004e01aea95023f67507841f4a2d74424fbedc870
SHA512ea2132592915cb3a166e1cf173d575ffb94b2059d66ec767693fdf0bb5f796afef2669d03daff1a1bd7a9704494af70c486b1d1333c336e40e17c682278dcaad
-
Filesize
252KB
MD5ac27a064e7a23ac80f1bb8e7cbe4b067
SHA101c13b49f5627069d3e737f2c528ae85c95c995d
SHA25611b725378fa36c9454f8d8c004e01aea95023f67507841f4a2d74424fbedc870
SHA512ea2132592915cb3a166e1cf173d575ffb94b2059d66ec767693fdf0bb5f796afef2669d03daff1a1bd7a9704494af70c486b1d1333c336e40e17c682278dcaad
-
Filesize
196KB
MD5d246b71e5df1eb4c2a7e617404aee3d4
SHA157ae3ea47c9b3ac954a69ea0272d0b311e97c129
SHA256110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6
SHA512c1cf471a2e3c80ccd51d1b91f931008a660ccf9566340d31426a800c31db79c6dc0978f2a19b9131380e3c8a7d5cc2162775e13db5cef992e5e9fb6a4dacd731
-
Filesize
196KB
MD5d246b71e5df1eb4c2a7e617404aee3d4
SHA157ae3ea47c9b3ac954a69ea0272d0b311e97c129
SHA256110ca627ec28db642faf112f5ff6d36694b68b3616510dca552a04c05cfa1cc6
SHA512c1cf471a2e3c80ccd51d1b91f931008a660ccf9566340d31426a800c31db79c6dc0978f2a19b9131380e3c8a7d5cc2162775e13db5cef992e5e9fb6a4dacd731
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a0fe24ca99dcab1ebbf2bc38ebf54497
SHA16212a1e383c716e7849b547496b631f4d80c31bf
SHA256470e45faf45cd1268a0b6b8f8a818e45105c02a276914108f25641535e620f29
SHA512aa68ef7daf30fd19c99e4583d49e9182cd944c6f5421b38a20c9cd9fc0cfadc9339aca4e0011a01dd7a7b616b792935f29c69bf61b1b92327059a1661dd5b6df
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56e6f94f170b7eb0cfd81c53952e5c0ae
SHA12f5390b56caf9792bdc83fcbcb3ba1ae4bc1775d
SHA256ad3b8bd4e6799db8d6137196fecdf072b64d2f932136a65fcf2c421dc5c8df88
SHA512dcb840224b84eaec935ec2d7c2371815a267d9bbc7bb3948c2bab1174270e6b8f6b3e68dfeb9e96fcbafbef344d68225bf8916a8ffe53f0d19c2b38bf75e398f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b0e396af537f4b575b383278f7c27145
SHA18830a2838ae79bc60868adab0a8986ec4b5dbbb9
SHA2563b66cf41b54b8f242877d41683ce06393446146a65b3dd73f2202559475e76c0
SHA512e9eec0c020d35342f03662f180a97b5c34958c0f30d0b51a094d9fa2117cad9ae06f5cf9197d3b2c6c97f675b61b2abd83ed9455bb0e29578fdbc0e221661118
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d3343255e2348c1ff41562d8fcf66663
SHA1531831582b77ff5e9fb67d0ba84223f74bed97ab
SHA256bc6e382fa7ee9f621510c17daf391bb84cba206e276b21a129010aed693b0c24
SHA5128d64f6f4afe85e599a281af6d20aa3fe207566f2bc8a7b54b164207c40b330630cab70ce3e0622e2dad497a2e7ac541209892ec6ef9d234e59958e93b48f3a24
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cb4d23d08c3c8014d9d0772db3c28359
SHA128b986c7155a3846e059beb56d96fa2ca8f241b6
SHA2564b96103d1ff8ef32ddbf5ff2af8d886bedec5b2b30197da1772a8ec069f7022e
SHA5121cee9ead79ce196be2759acc33d6c4d78674b96da22acf2bf44b8c31d90f5fad57735a89a1048118158bd15a2c1ee95a7001d602ac2417891f1f552ca9981266
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80