Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
222KB
-
MD5
46bfcb0bea42b9ba083113bd6a045646
-
SHA1
a1f6f7777b40bb525313c102b6e39cdd197bc8dd
-
SHA256
41149a13c406c1a151bcbc10227ed9dc6a9df2496d6d04bea25d48f86342987a
-
SHA512
acb400050b9633ea4612a1ae975ae4d3362e7f550cb5e8e4f6daf4bd826b8419b2c9047b18bf98298915a8cc2dfdc70f973b41bdc84411027bd3034681441ac7
-
SSDEEP
6144:TkOOL1+QsuV0Ri88xxQO6/36eii34YseKRTd:Tkl5+Qs00+xxX6Ci342KV
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
djvu
http://zexeq.com/lancer/get.php
http://zexeq.com/raud/get.php
-
extension
.wwhu
-
offline_id
LtYnlJvK0hICyOCeum6Tv4pbia9jcIGHVgA3Xht1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xoUXGr6cqT Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0788JOsie
Extracted
smokeloader
pub1
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4368-179-0x0000000003750000-0x0000000003881000-memory.dmp family_fabookie behavioral2/memory/4368-192-0x0000000003750000-0x0000000003881000-memory.dmp family_fabookie -
Detected Djvu ransomware 19 IoCs
resource yara_rule behavioral2/memory/3860-67-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3860-70-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4584-72-0x0000000002270000-0x000000000238B000-memory.dmp family_djvu behavioral2/memory/3860-73-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4204-90-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4144-97-0x00000000022D0000-0x00000000023EB000-memory.dmp family_djvu behavioral2/memory/3860-98-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4204-99-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4204-93-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4204-87-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4204-153-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3860-170-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3860-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5104-199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5104-200-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5104-202-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2364-213-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2364-214-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2364-216-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/324-194-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral2/memory/324-195-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/324-196-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/324-224-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral2/memory/324-240-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/324-247-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3596 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 9D3.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 4335.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 385.exe -
Executes dropped EXE 20 IoCs
pid Process 4144 385.exe 3152 4A0.exe 4712 618.exe 4428 84B.exe 4584 9D3.exe 2356 1955.exe 3860 9D3.exe 2060 4335.exe 4204 385.exe 4368 aafg31.exe 3232 toolspub2.exe 324 31839b57a4f11171d6abc8bbc4451ee4.exe 1608 385.exe 4724 9D3.exe 3632 toolspub2.exe 5104 385.exe 2364 9D3.exe 4696 31839b57a4f11171d6abc8bbc4451ee4.exe 388 csrss.exe 2504 injector.exe -
Loads dropped DLL 3 IoCs
pid Process 4712 618.exe 4712 618.exe 2052 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1224 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8c356720-b6c9-4d5f-8351-9aabf1dbc8cf\\9D3.exe\" --AutoStart" 9D3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 api.2ip.ua 54 api.2ip.ua 48 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4584 set thread context of 3860 4584 9D3.exe 102 PID 4144 set thread context of 4204 4144 385.exe 105 PID 4428 set thread context of 4592 4428 84B.exe 112 PID 3232 set thread context of 3632 3232 toolspub2.exe 114 PID 1608 set thread context of 5104 1608 385.exe 115 PID 4724 set thread context of 2364 4724 9D3.exe 118 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 224 4712 WerFault.exe 90 4684 5104 WerFault.exe 115 2308 2364 WerFault.exe 118 3304 4696 WerFault.exe 126 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1955.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1955.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1955.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4492 schtasks.exe 4992 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3284 file.exe 3284 file.exe 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3096 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3284 file.exe 2356 1955.exe 3632 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 3152 4A0.exe Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 4592 AppLaunch.exe Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 324 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 324 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 4568 powershell.exe Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 4596 powershell.exe Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 3108 powershell.exe Token: SeShutdownPrivilege 3096 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3096 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4144 3096 Process not Found 87 PID 3096 wrote to memory of 4144 3096 Process not Found 87 PID 3096 wrote to memory of 4144 3096 Process not Found 87 PID 3096 wrote to memory of 3152 3096 Process not Found 88 PID 3096 wrote to memory of 3152 3096 Process not Found 88 PID 3096 wrote to memory of 3152 3096 Process not Found 88 PID 3096 wrote to memory of 4712 3096 Process not Found 90 PID 3096 wrote to memory of 4712 3096 Process not Found 90 PID 3096 wrote to memory of 4712 3096 Process not Found 90 PID 3096 wrote to memory of 4428 3096 Process not Found 92 PID 3096 wrote to memory of 4428 3096 Process not Found 92 PID 3096 wrote to memory of 4428 3096 Process not Found 92 PID 3096 wrote to memory of 4584 3096 Process not Found 94 PID 3096 wrote to memory of 4584 3096 Process not Found 94 PID 3096 wrote to memory of 4584 3096 Process not Found 94 PID 3096 wrote to memory of 1380 3096 Process not Found 97 PID 3096 wrote to memory of 1380 3096 Process not Found 97 PID 1380 wrote to memory of 2052 1380 regsvr32.exe 99 PID 1380 wrote to memory of 2052 1380 regsvr32.exe 99 PID 1380 wrote to memory of 2052 1380 regsvr32.exe 99 PID 3096 wrote to memory of 2356 3096 Process not Found 101 PID 3096 wrote to memory of 2356 3096 Process not Found 101 PID 3096 wrote to memory of 2356 3096 Process not Found 101 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 4584 wrote to memory of 3860 4584 9D3.exe 102 PID 3096 wrote to memory of 2060 3096 Process not Found 104 PID 3096 wrote to memory of 2060 3096 Process not Found 104 PID 3096 wrote to memory of 2060 3096 Process not Found 104 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 4144 wrote to memory of 4204 4144 385.exe 105 PID 2060 wrote to memory of 4368 2060 4335.exe 106 PID 2060 wrote to memory of 4368 2060 4335.exe 106 PID 2060 wrote to memory of 3232 2060 4335.exe 107 PID 2060 wrote to memory of 3232 2060 4335.exe 107 PID 2060 wrote to memory of 3232 2060 4335.exe 107 PID 2060 wrote to memory of 324 2060 4335.exe 108 PID 2060 wrote to memory of 324 2060 4335.exe 108 PID 2060 wrote to memory of 324 2060 4335.exe 108 PID 3860 wrote to memory of 1224 3860 9D3.exe 109 PID 3860 wrote to memory of 1224 3860 9D3.exe 109 PID 3860 wrote to memory of 1224 3860 9D3.exe 109 PID 4204 wrote to memory of 1608 4204 385.exe 111 PID 4204 wrote to memory of 1608 4204 385.exe 111 PID 4204 wrote to memory of 1608 4204 385.exe 111 PID 4428 wrote to memory of 4592 4428 84B.exe 112 PID 4428 wrote to memory of 4592 4428 84B.exe 112 PID 4428 wrote to memory of 4592 4428 84B.exe 112 PID 4428 wrote to memory of 4592 4428 84B.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3284
-
C:\Users\Admin\AppData\Local\Temp\385.exeC:\Users\Admin\AppData\Local\Temp\385.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\385.exeC:\Users\Admin\AppData\Local\Temp\385.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\385.exe"C:\Users\Admin\AppData\Local\Temp\385.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\385.exe"C:\Users\Admin\AppData\Local\Temp\385.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 5725⤵
- Program crash
PID:4684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4A0.exeC:\Users\Admin\AppData\Local\Temp\4A0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
C:\Users\Admin\AppData\Local\Temp\618.exeC:\Users\Admin\AppData\Local\Temp\618.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 8522⤵
- Program crash
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\84B.exeC:\Users\Admin\AppData\Local\Temp\84B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\9D3.exeC:\Users\Admin\AppData\Local\Temp\9D3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\9D3.exeC:\Users\Admin\AppData\Local\Temp\9D3.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8c356720-b6c9-4d5f-8351-9aabf1dbc8cf" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\9D3.exe"C:\Users\Admin\AppData\Local\Temp\9D3.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\9D3.exe"C:\Users\Admin\AppData\Local\Temp\9D3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 5685⤵
- Program crash
PID:2308
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4712 -ip 47121⤵PID:1352
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ED5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ED5.dll2⤵
- Loads dropped DLL
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\1955.exeC:\Users\Admin\AppData\Local\Temp\1955.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2356
-
C:\Users\Admin\AppData\Local\Temp\4335.exeC:\Users\Admin\AppData\Local\Temp\4335.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3632
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3152
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:3596
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4492
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2504
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 5964⤵
- Program crash
PID:3304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5104 -ip 51041⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2364 -ip 23641⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4696 -ip 46961⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD59b667ecf8c64e80b6ba550371dc3149c
SHA1dd7dd3675307f72562b20d01e86baf619798accf
SHA25601376f194051bd65ab162ec35c24d005c179d01d28657eb1f339bb2ededfb886
SHA51260daf11cfac79900c5e7c988606570a45a9b170b500acc203c0a12c0683914b745442a177017acc3a4a7df3fd99847768a264e2f0fd4aec76c92b5ecd870fc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD55318d6a902beaba43fd3af656c2e3cb0
SHA10202ac2d3e3ad69f1456c6de198b462cdba0edda
SHA256bad155252d58babc8824eb5e5bc5efd49ba946a2d7f2aaf27dae16d157c7646e
SHA51214b17ce0850c83ade52982c2c3d3d65bc621c2c09dae2f84cd44890a560811d5c25627e582c7dfa544f2a05665562f48f3b2cc4941bac688242eb13ff0944cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD57b9b69ff50cca866e3f544c132ccd54a
SHA1cdedfe9108e27b1d1594b056d11231705b298451
SHA256b5b7c48488d9cb65b6090f8c6030f3c1b36d1051e1ba82a9314760b274e2197a
SHA5127696bcdf969d85cf8f26f6206ed1c9c39dddbd330be6665328791f601dcd3525ce248d749aa93c3138d757cfc3ff13baa33de1bb8fda8b2ad93a979a5770239d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5725a7a6059f8c212516472d7ca74ace7
SHA11eab794db1189235f1b28f9aaa53a2143a9f1992
SHA2568068ab48743304437cd52b11330dc71d05625fd839b81c4310d495bcddc35fdd
SHA5128e4ce165f1b121d5b5ecb8304929ecea2708f1bb6527a2672191ec0169bcd981e0d489fb4de1ba1c9c04b65e938edfec69eb53901708adc3211ceef0d23d7271
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
222KB
MD5052b83d1683f5413971c373b86be1dab
SHA12d7377aa3f339f0c9c91d34713ed728e4cc0cdae
SHA256a7de121b8dbf0e6d67164c662f73e46c94a25ad916e6dd01874dafef5ecca86d
SHA5126c4c301dda838f5cb732f7f16e2032dd541234a4cdb121fbab09219a2bd93d4b17a68cf798e92d8a67990b8387d81100243fdb207710dd2749c43672776205e2
-
Filesize
222KB
MD5052b83d1683f5413971c373b86be1dab
SHA12d7377aa3f339f0c9c91d34713ed728e4cc0cdae
SHA256a7de121b8dbf0e6d67164c662f73e46c94a25ad916e6dd01874dafef5ecca86d
SHA5126c4c301dda838f5cb732f7f16e2032dd541234a4cdb121fbab09219a2bd93d4b17a68cf798e92d8a67990b8387d81100243fdb207710dd2749c43672776205e2
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
4.6MB
MD5f22632a300878ae7ab5bc865e8b4b804
SHA1572a142b5ef1533555dfe31ee88d86b38a3235fb
SHA256ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830
SHA5126f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5
-
Filesize
4.6MB
MD5f22632a300878ae7ab5bc865e8b4b804
SHA1572a142b5ef1533555dfe31ee88d86b38a3235fb
SHA256ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830
SHA5126f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5
-
Filesize
249KB
MD53f63565f2340a7378449971906111843
SHA101bc7e7e6f7d0414ccfda087213f137862052363
SHA25660268b3bb9ddc3353219eef23bce63f73bf2b4e398a1357d15c93ad63c21289a
SHA5129bb94b205a219e3b82c2f163d73abddda4e20c0bd0b247bc8558b7d8b7eb597e08e0f881902b1850a7bf06b448285984dd96873ae024ee4ce9adc2f9f633c7a2
-
Filesize
249KB
MD53f63565f2340a7378449971906111843
SHA101bc7e7e6f7d0414ccfda087213f137862052363
SHA25660268b3bb9ddc3353219eef23bce63f73bf2b4e398a1357d15c93ad63c21289a
SHA5129bb94b205a219e3b82c2f163d73abddda4e20c0bd0b247bc8558b7d8b7eb597e08e0f881902b1850a7bf06b448285984dd96873ae024ee4ce9adc2f9f633c7a2
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
399KB
MD57f6e5e08d9fb67128f7fccc77e294011
SHA1ba918aa4180417de13f9fba10eef72b87bf8c21f
SHA25637333c4e8cab40f04954ed9dcd231f8eeea9eadc6d86e4f90aed014f21ac2528
SHA5124164b2bfc311b09e588f9d6ec58e31a39e1e4eb0c9337e25951ec70844ae15d8da8d8c76801cfef82eccd4074831f71b6cdef22a2658236e1618b726a1895afc
-
Filesize
399KB
MD57f6e5e08d9fb67128f7fccc77e294011
SHA1ba918aa4180417de13f9fba10eef72b87bf8c21f
SHA25637333c4e8cab40f04954ed9dcd231f8eeea9eadc6d86e4f90aed014f21ac2528
SHA5124164b2bfc311b09e588f9d6ec58e31a39e1e4eb0c9337e25951ec70844ae15d8da8d8c76801cfef82eccd4074831f71b6cdef22a2658236e1618b726a1895afc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
1.4MB
MD59b1d9a3ce645a872a66dd45fc1e8bc46
SHA1a0268f9c1d3e66112e1ac9d857b7b12764a2901d
SHA2566ccd11a1236b38e19e975b070f64ed0ebbb8325e9367e93e863e8600e4e473bb
SHA5120d81a0d3de19bfae1a879f01383e7bfb89d97cbc1ae57e8cd0ad57fa0a614624ecaca07c549554ace8a5c8573ace1ddc9f3db7611825e2ceec3d5b1449d2cb40
-
Filesize
1.4MB
MD59b1d9a3ce645a872a66dd45fc1e8bc46
SHA1a0268f9c1d3e66112e1ac9d857b7b12764a2901d
SHA2566ccd11a1236b38e19e975b070f64ed0ebbb8325e9367e93e863e8600e4e473bb
SHA5120d81a0d3de19bfae1a879f01383e7bfb89d97cbc1ae57e8cd0ad57fa0a614624ecaca07c549554ace8a5c8573ace1ddc9f3db7611825e2ceec3d5b1449d2cb40
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
222KB
MD5052b83d1683f5413971c373b86be1dab
SHA12d7377aa3f339f0c9c91d34713ed728e4cc0cdae
SHA256a7de121b8dbf0e6d67164c662f73e46c94a25ad916e6dd01874dafef5ecca86d
SHA5126c4c301dda838f5cb732f7f16e2032dd541234a4cdb121fbab09219a2bd93d4b17a68cf798e92d8a67990b8387d81100243fdb207710dd2749c43672776205e2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50ddec2d08deb2044f53288f25bec35fb
SHA136b189d21bac9e90c1d51cba663b9d9f0420ddc3
SHA256882c5f906cb6c21e51061f471b4795e69f8abf5f614d275ea39c7a4b87c739de
SHA51239ea69667bf70ed4542b4730c040266320d41c3afad1218b5ff6251b80cb2fe3bedd9a4ad6461b27bc3887ebdb9576a329eb9ab8aeff44ec88d3b30af30965fe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51d391b18b939ea10bcfb9cdfd90204b8
SHA182b8d2ca306e1f18b95c415486e2bf223b0c7221
SHA25698c20697df227c64becc8c790ea34bbe3dbe5dc75da06596db5c42e5aa401d0d
SHA5120a846d1cc41127a9483bcbfffa197fb6cfcffe135f46879036a8130b7b5805678b411eb6394c4a8091ab1aa649a80c08578a6bb3eaf0128d94480695f4d33ff6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c83d4c9bdb20f3ef009afcbab77da944
SHA1fd769759f399c9d969a664301cfa68640f64ab9a
SHA256b6645c78d285ffa6acb1082d5e3549e533956931cfd66cb56d3eb863410fe83b
SHA5124b2ffad922965cf705c1167a12a164b637d68493696f8cb7410198225ce9a7e6b86421b1ad4ba080a883d127575024e9da21d7cdeb84dfd1dbd1e02ce08f4b85
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56dd21374234c1412d056d563303fd7a4
SHA108c22b57f35f0a8eb5ec4a3e9f4ce09294cc15a2
SHA256e62c785c1560a65f80b1b5e75c79a00e4e9e2cd495938419cc2e46afbc759177
SHA5128a8380efc1d77554c2cb84463ac66c6c11ccca1d8ff846ebcfdc053a7d9d9a99db726e712ea6020c3253a0d24baa3d1d9d44f9bbbfb2df139183d89595ee5001
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b56f0bd4041153ca19dd6d29908e99d4
SHA19d9d6443f348f6b4d5f8d7d51af93f3c18c7892e
SHA2566f0c6e4ac4b99b2c460fbfebfe191a9cba00421061c022bbffddb6500e4486b0
SHA5128b552837667007764784c68bbdb3009a70a6c07ba46adf2f87821d09069f0b433e2fd7e048d47e72c30b5c3e218b4cf84e20b816e74f5ddb0e3bb6a6dba6a98d
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1