Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2023, 04:48
Static task
static1
General
-
Target
ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe
-
Size
4.6MB
-
MD5
f22632a300878ae7ab5bc865e8b4b804
-
SHA1
572a142b5ef1533555dfe31ee88d86b38a3235fb
-
SHA256
ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830
-
SHA512
6f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5
-
SSDEEP
98304:t8BC6yVL7GCxSTwu6GZMpOOQbvw7L97u:oS3xSx62OPNC
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2864-35-0x00000000037B0000-0x00000000038E1000-memory.dmp family_fabookie behavioral2/memory/2864-115-0x00000000037B0000-0x00000000038E1000-memory.dmp family_fabookie -
Glupteba payload 36 IoCs
resource yara_rule behavioral2/memory/4984-29-0x0000000002EF0000-0x00000000037DB000-memory.dmp family_glupteba behavioral2/memory/4984-31-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4984-67-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4984-71-0x0000000002EF0000-0x00000000037DB000-memory.dmp family_glupteba behavioral2/memory/4984-346-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4984-348-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-350-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-592-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-595-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-868-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-1095-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1344-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1695-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1844-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1850-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1857-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1859-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1860-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1861-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1862-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1863-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1864-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1865-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1866-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1867-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1868-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1869-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1870-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1871-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1872-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1873-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1874-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1875-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1876-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1877-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4896-1878-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4200 netsh.exe -
Executes dropped EXE 9 IoCs
pid Process 2864 aafg31.exe 4488 toolspub2.exe 4984 31839b57a4f11171d6abc8bbc4451ee4.exe 3364 toolspub2.exe 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 4896 csrss.exe 672 injector.exe 3800 cjvsdgd 4852 cjvsdgd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4488 set thread context of 3364 4488 toolspub2.exe 73 PID 3800 set thread context of 4852 3800 cjvsdgd 107 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjvsdgd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjvsdgd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjvsdgd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3816 schtasks.exe 3908 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3364 toolspub2.exe 3364 toolspub2.exe 4516 powershell.exe 4516 powershell.exe 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 4516 powershell.exe 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found 3328 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3328 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3364 toolspub2.exe 4852 cjvsdgd -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 4516 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeDebugPrivilege 4984 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 4984 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeDebugPrivilege 1512 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeDebugPrivilege 5076 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeDebugPrivilege 4836 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeDebugPrivilege 3040 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeDebugPrivilege 4572 powershell.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeSystemEnvironmentPrivilege 4896 csrss.exe Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found Token: SeShutdownPrivilege 3328 Process not Found Token: SeCreatePagefilePrivilege 3328 Process not Found -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 528 wrote to memory of 2864 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 70 PID 528 wrote to memory of 2864 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 70 PID 528 wrote to memory of 4488 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 71 PID 528 wrote to memory of 4488 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 71 PID 528 wrote to memory of 4488 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 71 PID 528 wrote to memory of 4984 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 72 PID 528 wrote to memory of 4984 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 72 PID 528 wrote to memory of 4984 528 ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe 72 PID 4488 wrote to memory of 3364 4488 toolspub2.exe 73 PID 4488 wrote to memory of 3364 4488 toolspub2.exe 73 PID 4488 wrote to memory of 3364 4488 toolspub2.exe 73 PID 4488 wrote to memory of 3364 4488 toolspub2.exe 73 PID 4488 wrote to memory of 3364 4488 toolspub2.exe 73 PID 4488 wrote to memory of 3364 4488 toolspub2.exe 73 PID 4984 wrote to memory of 4516 4984 31839b57a4f11171d6abc8bbc4451ee4.exe 75 PID 4984 wrote to memory of 4516 4984 31839b57a4f11171d6abc8bbc4451ee4.exe 75 PID 4984 wrote to memory of 4516 4984 31839b57a4f11171d6abc8bbc4451ee4.exe 75 PID 2208 wrote to memory of 664 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 80 PID 2208 wrote to memory of 664 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 80 PID 2208 wrote to memory of 664 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 80 PID 2208 wrote to memory of 2672 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 83 PID 2208 wrote to memory of 2672 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 83 PID 2672 wrote to memory of 4200 2672 cmd.exe 84 PID 2672 wrote to memory of 4200 2672 cmd.exe 84 PID 2208 wrote to memory of 1512 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 85 PID 2208 wrote to memory of 1512 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 85 PID 2208 wrote to memory of 1512 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 85 PID 2208 wrote to memory of 5076 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 87 PID 2208 wrote to memory of 5076 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 87 PID 2208 wrote to memory of 5076 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 87 PID 2208 wrote to memory of 4896 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 89 PID 2208 wrote to memory of 4896 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 89 PID 2208 wrote to memory of 4896 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 89 PID 4896 wrote to memory of 4836 4896 csrss.exe 90 PID 4896 wrote to memory of 4836 4896 csrss.exe 90 PID 4896 wrote to memory of 4836 4896 csrss.exe 90 PID 4896 wrote to memory of 3040 4896 csrss.exe 95 PID 4896 wrote to memory of 3040 4896 csrss.exe 95 PID 4896 wrote to memory of 3040 4896 csrss.exe 95 PID 4896 wrote to memory of 4572 4896 csrss.exe 99 PID 4896 wrote to memory of 4572 4896 csrss.exe 99 PID 4896 wrote to memory of 4572 4896 csrss.exe 99 PID 4896 wrote to memory of 672 4896 csrss.exe 101 PID 4896 wrote to memory of 672 4896 csrss.exe 101 PID 3800 wrote to memory of 4852 3800 cjvsdgd 107 PID 3800 wrote to memory of 4852 3800 cjvsdgd 107 PID 3800 wrote to memory of 4852 3800 cjvsdgd 107 PID 3800 wrote to memory of 4852 3800 cjvsdgd 107 PID 3800 wrote to memory of 4852 3800 cjvsdgd 107 PID 3800 wrote to memory of 4852 3800 cjvsdgd 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe"C:\Users\Admin\AppData\Local\Temp\ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4200
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4300
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:672
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3908
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\cjvsdgdC:\Users\Admin\AppData\Roaming\cjvsdgd1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Roaming\cjvsdgdC:\Users\Admin\AppData\Roaming\cjvsdgd2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e6dc5bbc77d53afc8ec02c6cef7dbeac
SHA192a4cc87e2330fb1dfee308892f518903272dab2
SHA256bbc0f55ee6c9a9c322468b7f3da1b2671b3044ea3ec6904924eaf14183f348a5
SHA512d44e433c794c9f2541ded6ae8b0b5cd11c4feeaf780112217a819ccd6a4c8c0839919e8ca24ecec09c6103135d1e8a04292fdbcc8efbbcc1672e574d336f343a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD540b095b1416af002c2880f11c66c6719
SHA122ccfdb234ddd7fa9455620f826276984486e9ae
SHA2566bdfd4507d7a336f05648dc04a32e17ac87c4b5d60bd221e7ad1138fdf331e52
SHA5126508f3b62cf5038436484b05230aff05d6ef4091f9f4130adab6bb043a5892a89029b49d5b8666512962d3c196fa5b522bc41bf37be446c3996396f7ecd8bb70
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD555b77597add5fa851e1c7f7c2f1ddd2f
SHA180e35f35d0d68f33d71830cd1b0f772ac2c05796
SHA256898147aedc8dfe63ddf5d94077dad540ab03df2ce5b459b3e0db5a15619ffc9b
SHA512191c86b79ae940b5f75812397ef2098bc014186e588e66eea8806baa7e4eb262b9564c252507408d2ac5db1a24055da7d05a1ce0e4e3aebc2d84407a67e85812
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c010754604a9a924883c5664976ab249
SHA123429f4955ce2b448ebf17f9e14e9ca8308724a2
SHA256007d834b39e8d8fac906c2bd5d4028d8e2a3bf612a1957a1f8ddc94c6f573da2
SHA512288a39b7ba9d3674c8c960ef0ee12415382d50c1016c96b198281cb2d4fbd0161918f2eb11f709cf77849091a9bb9e9ed150f916d96e491a348f76dfa32ef505
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50a2d9fd39c1219999d47380c77d1175e
SHA1c5200ab15b83297c978d54118b44692e12f4e774
SHA2560387a6fdb0c34ec94e59a94db38a495897c14859cf621cebc493a21861910a38
SHA51272dafb2fce2acae91e4deca7e1b829707ca0663c4a17acc402f094d6d7384a5e4fe6c11bfd079e66a710243dce99132e0680cf9503c8d67121ee4c1833d42f11
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1