Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
09-10-2023 04:51
Static task
static1
Behavioral task
behavioral1
Sample
70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe
Resource
win7-20230831-en
General
-
Target
70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe
-
Size
15.7MB
-
MD5
3141032e3b1e4f3ee0d0a1fe68ccc6e8
-
SHA1
37adc7f63e2c38b2ad803c49d2782be701da9b56
-
SHA256
70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d
-
SHA512
d063301b2c07d8722594dd2eec9fbcb100385bcaac9843c5f329537845888803c3a6ae68ac33983b9ea429bb15d74b43a189ef4bc359c80dbb19e46ae938f0e5
-
SSDEEP
393216:g8EDE090yXtcYODN8EDE090yXtcYODCef/GyF3ibKL4BCXtU/PS:gjg09jtcYyjg09jtcYyxFSbi4StU6
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Glupteba payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/4376-89-0x00000000047D0000-0x00000000050BB000-memory.dmp family_glupteba behavioral2/memory/4376-98-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2032-106-0x0000000004790000-0x000000000507B000-memory.dmp family_glupteba behavioral2/memory/2032-107-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4376-229-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2032-246-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4376-267-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4376-706-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2032-717-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4376-728-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2032-731-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4376-735-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2032-737-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4108-849-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4108-1566-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/1920-1569-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/4108-1865-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/1920-1869-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
Processes:
latestX.exeupdater.exedescription pid process target process PID 3264 created 3232 3264 latestX.exe Explorer.EXE PID 3264 created 3232 3264 latestX.exe Explorer.EXE PID 3264 created 3232 3264 latestX.exe Explorer.EXE PID 3264 created 3232 3264 latestX.exe Explorer.EXE PID 3264 created 3232 3264 latestX.exe Explorer.EXE PID 2576 created 3232 2576 updater.exe Explorer.EXE PID 2576 created 3232 2576 updater.exe Explorer.EXE PID 2576 created 3232 2576 updater.exe Explorer.EXE PID 2576 created 3232 2576 updater.exe Explorer.EXE PID 2576 created 3232 2576 updater.exe Explorer.EXE PID 2576 created 3232 2576 updater.exe Explorer.EXE -
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exe31839b57a4f11171d6abc8bbc4451ee4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e0cbefcb1af40c7d4aff4aca26621a98.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe -
Drops file in Drivers directory 2 IoCs
Processes:
latestX.exeupdater.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 19 IoCs
Processes:
toolspub2.exee0cbefcb1af40c7d4aff4aca26621a98.exekos1.exelatestX.exe31839b57a4f11171d6abc8bbc4451ee4.exeset16.exekos.exeis-HNJ75.tmptoolspub2.exepreviewer.exepreviewer.exee0cbefcb1af40c7d4aff4aca26621a98.exe31839b57a4f11171d6abc8bbc4451ee4.exeupdater.execsrss.exeinjector.exewindefender.exewindefender.exef801950a962ddba14caaa44bf084b55c.exepid process 3484 toolspub2.exe 4376 e0cbefcb1af40c7d4aff4aca26621a98.exe 1976 kos1.exe 3264 latestX.exe 2032 31839b57a4f11171d6abc8bbc4451ee4.exe 2548 set16.exe 4872 kos.exe 4876 is-HNJ75.tmp 1184 toolspub2.exe 1136 previewer.exe 4240 previewer.exe 4108 e0cbefcb1af40c7d4aff4aca26621a98.exe 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 2576 updater.exe 4160 csrss.exe 5032 injector.exe 1152 windefender.exe 3216 windefender.exe 2820 f801950a962ddba14caaa44bf084b55c.exe -
Loads dropped DLL 3 IoCs
Processes:
is-HNJ75.tmppid process 4876 is-HNJ75.tmp 4876 is-HNJ75.tmp 4876 is-HNJ75.tmp -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 51.159.66.125 -
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exe31839b57a4f11171d6abc8bbc4451ee4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e0cbefcb1af40c7d4aff4aca26621a98.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exe31839b57a4f11171d6abc8bbc4451ee4.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 14 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execmd.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive cmd.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
toolspub2.exeupdater.exedescription pid process target process PID 3484 set thread context of 1184 3484 toolspub2.exe toolspub2.exe PID 2576 set thread context of 4804 2576 updater.exe conhost.exe PID 2576 set thread context of 1380 2576 updater.exe explorer.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exe31839b57a4f11171d6abc8bbc4451ee4.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN e0cbefcb1af40c7d4aff4aca26621a98.exe File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 9 IoCs
Processes:
is-HNJ75.tmplatestX.exeupdater.exedescription ioc process File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-HNJ75.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files (x86)\PA Previewer\unins000.dat is-HNJ75.tmp File created C:\Program Files (x86)\PA Previewer\is-9F4TO.tmp is-HNJ75.tmp File created C:\Program Files (x86)\PA Previewer\is-TMS0L.tmp is-HNJ75.tmp File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-HNJ75.tmp File created C:\Program Files (x86)\PA Previewer\is-UAS95.tmp is-HNJ75.tmp File created C:\Program Files (x86)\PA Previewer\is-9B8C7.tmp is-HNJ75.tmp File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 6 IoCs
Processes:
31839b57a4f11171d6abc8bbc4451ee4.execsrss.exee0cbefcb1af40c7d4aff4aca26621a98.exedescription ioc process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss e0cbefcb1af40c7d4aff4aca26621a98.exe File created C:\Windows\rss\csrss.exe e0cbefcb1af40c7d4aff4aca26621a98.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 5096 sc.exe 2204 sc.exe 2224 sc.exe 3288 sc.exe 3272 sc.exe 4668 sc.exe 168 sc.exe 2568 sc.exe 1640 sc.exe 4700 sc.exe 3844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3384 schtasks.exe 4988 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
e0cbefcb1af40c7d4aff4aca26621a98.exepowershell.exewindefender.exepowershell.exepowershell.execmd.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeexplorer.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub2.exeConhost.exepowershell.exeExplorer.EXEpid process 1184 toolspub2.exe 1184 toolspub2.exe 4776 Conhost.exe 5012 powershell.exe 5012 powershell.exe 3232 Explorer.EXE 3232 Explorer.EXE 4776 Conhost.exe 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 4776 Conhost.exe 5012 powershell.exe 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3232 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 628 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
toolspub2.exepid process 1184 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
kos.exepreviewer.exepreviewer.exeConhost.exepowershell.exeExplorer.EXEpowershell.exe31839b57a4f11171d6abc8bbc4451ee4.exee0cbefcb1af40c7d4aff4aca26621a98.exepowershell.exepowershell.exepowershell.exepowercfg.exewmiprvse.exepowercfg.exeConhost.exedescription pid process Token: SeDebugPrivilege 4872 kos.exe Token: SeDebugPrivilege 1136 previewer.exe Token: SeDebugPrivilege 4240 previewer.exe Token: SeDebugPrivilege 4776 Conhost.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 2032 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 4376 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeImpersonatePrivilege 2032 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 4376 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeIncreaseQuotaPrivilege 4932 powershell.exe Token: SeSecurityPrivilege 4932 powershell.exe Token: SeTakeOwnershipPrivilege 4932 powershell.exe Token: SeLoadDriverPrivilege 4932 powershell.exe Token: SeSystemProfilePrivilege 4932 powershell.exe Token: SeSystemtimePrivilege 4932 powershell.exe Token: SeProfSingleProcessPrivilege 4932 powershell.exe Token: SeIncBasePriorityPrivilege 4932 powershell.exe Token: SeCreatePagefilePrivilege 4932 powershell.exe Token: SeBackupPrivilege 4932 powershell.exe Token: SeRestorePrivilege 4932 powershell.exe Token: SeShutdownPrivilege 4932 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeSystemEnvironmentPrivilege 4932 powershell.exe Token: SeRemoteShutdownPrivilege 4932 powershell.exe Token: SeUndockPrivilege 4932 powershell.exe Token: SeManageVolumePrivilege 4932 powershell.exe Token: 33 4932 powershell.exe Token: 34 4932 powershell.exe Token: 35 4932 powershell.exe Token: 36 4932 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 4740 powershell.exe Token: SeShutdownPrivilege 2744 powercfg.exe Token: SeCreatePagefilePrivilege 2744 powercfg.exe Token: SeShutdownPrivilege 4492 wmiprvse.exe Token: SeCreatePagefilePrivilege 4492 wmiprvse.exe Token: SeShutdownPrivilege 2968 powercfg.exe Token: SeCreatePagefilePrivilege 2968 powercfg.exe Token: SeShutdownPrivilege 4728 Conhost.exe Token: SeCreatePagefilePrivilege 4728 Conhost.exe Token: SeIncreaseQuotaPrivilege 4740 powershell.exe Token: SeSecurityPrivilege 4740 powershell.exe Token: SeTakeOwnershipPrivilege 4740 powershell.exe Token: SeLoadDriverPrivilege 4740 powershell.exe Token: SeSystemProfilePrivilege 4740 powershell.exe Token: SeSystemtimePrivilege 4740 powershell.exe Token: SeProfSingleProcessPrivilege 4740 powershell.exe Token: SeIncBasePriorityPrivilege 4740 powershell.exe Token: SeCreatePagefilePrivilege 4740 powershell.exe Token: SeBackupPrivilege 4740 powershell.exe Token: SeRestorePrivilege 4740 powershell.exe Token: SeShutdownPrivilege 4740 powershell.exe Token: SeDebugPrivilege 4740 powershell.exe Token: SeSystemEnvironmentPrivilege 4740 powershell.exe Token: SeRemoteShutdownPrivilege 4740 powershell.exe Token: SeUndockPrivilege 4740 powershell.exe Token: SeManageVolumePrivilege 4740 powershell.exe Token: 33 4740 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exekos1.exeset16.exetoolspub2.exeis-HNJ75.tmpnet.exe31839b57a4f11171d6abc8bbc4451ee4.exee0cbefcb1af40c7d4aff4aca26621a98.exee0cbefcb1af40c7d4aff4aca26621a98.exe31839b57a4f11171d6abc8bbc4451ee4.execmd.execmd.exedescription pid process target process PID 3048 wrote to memory of 3484 3048 70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe toolspub2.exe PID 3048 wrote to memory of 3484 3048 70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe toolspub2.exe PID 3048 wrote to memory of 3484 3048 70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe toolspub2.exe PID 3048 wrote to memory of 4376 3048 e0cbefcb1af40c7d4aff4aca26621a98.exe PID 3048 wrote to memory of 4376 3048 e0cbefcb1af40c7d4aff4aca26621a98.exe PID 3048 wrote to memory of 4376 3048 e0cbefcb1af40c7d4aff4aca26621a98.exe PID 3048 wrote to memory of 1976 3048 kos1.exe PID 3048 wrote to memory of 1976 3048 kos1.exe PID 3048 wrote to memory of 1976 3048 kos1.exe PID 3048 wrote to memory of 3264 3048 latestX.exe PID 3048 wrote to memory of 3264 3048 latestX.exe PID 3048 wrote to memory of 2032 3048 31839b57a4f11171d6abc8bbc4451ee4.exe PID 3048 wrote to memory of 2032 3048 31839b57a4f11171d6abc8bbc4451ee4.exe PID 3048 wrote to memory of 2032 3048 31839b57a4f11171d6abc8bbc4451ee4.exe PID 1976 wrote to memory of 2548 1976 kos1.exe set16.exe PID 1976 wrote to memory of 2548 1976 kos1.exe set16.exe PID 1976 wrote to memory of 2548 1976 kos1.exe set16.exe PID 1976 wrote to memory of 4872 1976 kos1.exe kos.exe PID 1976 wrote to memory of 4872 1976 kos1.exe kos.exe PID 2548 wrote to memory of 4876 2548 set16.exe is-HNJ75.tmp PID 2548 wrote to memory of 4876 2548 set16.exe is-HNJ75.tmp PID 2548 wrote to memory of 4876 2548 set16.exe is-HNJ75.tmp PID 3484 wrote to memory of 1184 3484 toolspub2.exe toolspub2.exe PID 3484 wrote to memory of 1184 3484 toolspub2.exe toolspub2.exe PID 3484 wrote to memory of 1184 3484 toolspub2.exe toolspub2.exe PID 3484 wrote to memory of 1184 3484 toolspub2.exe toolspub2.exe PID 3484 wrote to memory of 1184 3484 toolspub2.exe toolspub2.exe PID 3484 wrote to memory of 1184 3484 toolspub2.exe toolspub2.exe PID 4876 wrote to memory of 2452 4876 is-HNJ75.tmp net.exe PID 4876 wrote to memory of 2452 4876 is-HNJ75.tmp net.exe PID 4876 wrote to memory of 2452 4876 is-HNJ75.tmp net.exe PID 4876 wrote to memory of 1136 4876 is-HNJ75.tmp previewer.exe PID 4876 wrote to memory of 1136 4876 is-HNJ75.tmp previewer.exe PID 4876 wrote to memory of 1136 4876 is-HNJ75.tmp previewer.exe PID 4876 wrote to memory of 4240 4876 is-HNJ75.tmp previewer.exe PID 4876 wrote to memory of 4240 4876 is-HNJ75.tmp previewer.exe PID 4876 wrote to memory of 4240 4876 is-HNJ75.tmp previewer.exe PID 2452 wrote to memory of 4548 2452 net.exe net1.exe PID 2452 wrote to memory of 4548 2452 net.exe net1.exe PID 2452 wrote to memory of 4548 2452 net.exe net1.exe PID 2032 wrote to memory of 5012 2032 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe PID 2032 wrote to memory of 5012 2032 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe PID 2032 wrote to memory of 5012 2032 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe PID 4376 wrote to memory of 4776 4376 e0cbefcb1af40c7d4aff4aca26621a98.exe Conhost.exe PID 4376 wrote to memory of 4776 4376 e0cbefcb1af40c7d4aff4aca26621a98.exe Conhost.exe PID 4376 wrote to memory of 4776 4376 e0cbefcb1af40c7d4aff4aca26621a98.exe Conhost.exe PID 4108 wrote to memory of 2376 4108 e0cbefcb1af40c7d4aff4aca26621a98.exe powershell.exe PID 4108 wrote to memory of 2376 4108 e0cbefcb1af40c7d4aff4aca26621a98.exe powershell.exe PID 4108 wrote to memory of 2376 4108 e0cbefcb1af40c7d4aff4aca26621a98.exe powershell.exe PID 1920 wrote to memory of 4436 1920 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe PID 1920 wrote to memory of 4436 1920 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe PID 1920 wrote to memory of 4436 1920 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe PID 2840 wrote to memory of 2568 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2568 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2204 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2204 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2224 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2224 2840 cmd.exe sc.exe PID 2840 wrote to memory of 1640 2840 cmd.exe sc.exe PID 2840 wrote to memory of 1640 2840 cmd.exe sc.exe PID 2840 wrote to memory of 3288 2840 cmd.exe Conhost.exe PID 2840 wrote to memory of 3288 2840 cmd.exe Conhost.exe PID 4336 wrote to memory of 2744 4336 cmd.exe powercfg.exe PID 4336 wrote to memory of 2744 4336 cmd.exe powercfg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe"C:\Users\Admin\AppData\Local\Temp\70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4948 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:4160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4752 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4988 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:3288
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1396
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:200 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3384 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1396 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe6⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f7⤵PID:1556
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f7⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\is-1MF0P.tmp\is-HNJ75.tmp"C:\Users\Admin\AppData\Local\Temp\is-1MF0P.tmp\is-HNJ75.tmp" /SL4 $B01B4 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522245⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1136 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 86⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 87⤵PID:4548
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4692
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2568 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2204 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1640 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2224 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3288 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4492
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4728
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3268
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:220 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4900
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3272 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4700 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4668 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:168 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3844 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4216 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:236
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2164
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1580
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2688
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:828
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4804
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies data under HKEY_USERS
PID:1380
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:2576
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
19KB
MD57171feff5f920c38285b78920f52b8b5
SHA143257fc6444dcaa983fb078d85deb5aa296867db
SHA2563e3c33317f6e7efd4ae6ebb80644ea07d6699594abe421648950e5b9bb7f95df
SHA5127fd39d3129155702c6face30ba921ae8281c14087854ab9831b7c10009317848a5b88fe5c5de05267bb38fb08937f56e95686457ad340e91dcbb75e647851bf1
-
Filesize
1KB
MD562c0fa5391a77a355ed11f2d2c2a50b2
SHA1a5ae5639e4a3b52b1d26eaf091553f5e30f10c02
SHA256169394e3bcb4e78e6e7197ea35e46dc7a204c3d61ec40473a3484a77a4666416
SHA512f8d56fa749c7c9cc1a5b7c986abe286327acf2055c9a647f188787de4c6634e831d3796a6677b22f8cad34a3d74792281c77428e4858e06f571212f9ac514075
-
Filesize
4.2MB
MD5906e8dd59115761a98c0308313a2ad3b
SHA1b2f9debeea9624b2e64e8062bf40382318cc42bd
SHA25656d6788b4b40af4a7c0329a9d91b1b4407beef8bd9395ef852851f53a3d36dcf
SHA51218cbbddc8e85acb236cd15c122adaa9537efc18216c394ba368ab0e391afe40b3dd6130dc1c60bb812da616f37897725c0ea6a695a93e9b25eb665f82bca870e
-
Filesize
4.2MB
MD5906e8dd59115761a98c0308313a2ad3b
SHA1b2f9debeea9624b2e64e8062bf40382318cc42bd
SHA25656d6788b4b40af4a7c0329a9d91b1b4407beef8bd9395ef852851f53a3d36dcf
SHA51218cbbddc8e85acb236cd15c122adaa9537efc18216c394ba368ab0e391afe40b3dd6130dc1c60bb812da616f37897725c0ea6a695a93e9b25eb665f82bca870e
-
Filesize
4.2MB
MD5906e8dd59115761a98c0308313a2ad3b
SHA1b2f9debeea9624b2e64e8062bf40382318cc42bd
SHA25656d6788b4b40af4a7c0329a9d91b1b4407beef8bd9395ef852851f53a3d36dcf
SHA51218cbbddc8e85acb236cd15c122adaa9537efc18216c394ba368ab0e391afe40b3dd6130dc1c60bb812da616f37897725c0ea6a695a93e9b25eb665f82bca870e
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4.2MB
MD54c05c54dd3007dced398eb41ab68992f
SHA11a737edff587c6acc830c8897ccf6128c718530c
SHA2567a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a
SHA51271c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0
-
Filesize
4.2MB
MD54c05c54dd3007dced398eb41ab68992f
SHA11a737edff587c6acc830c8897ccf6128c718530c
SHA2567a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a
SHA51271c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0
-
Filesize
4.2MB
MD54c05c54dd3007dced398eb41ab68992f
SHA11a737edff587c6acc830c8897ccf6128c718530c
SHA2567a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a
SHA51271c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
292KB
MD539baa178f1fc5ec2111eb95008ee6e38
SHA18a36b6d95d6453e9eed8df12eaed71580384f2a3
SHA2560990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74
SHA5123b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74
-
Filesize
292KB
MD539baa178f1fc5ec2111eb95008ee6e38
SHA18a36b6d95d6453e9eed8df12eaed71580384f2a3
SHA2560990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74
SHA5123b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74
-
Filesize
292KB
MD539baa178f1fc5ec2111eb95008ee6e38
SHA18a36b6d95d6453e9eed8df12eaed71580384f2a3
SHA2560990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74
SHA5123b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74
-
Filesize
292KB
MD539baa178f1fc5ec2111eb95008ee6e38
SHA18a36b6d95d6453e9eed8df12eaed71580384f2a3
SHA2560990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74
SHA5123b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50c35e53486f6b3e4979197ea3378589a
SHA165bed070e76a054bc9c017e3140836e57c1e8729
SHA256a43d4ede5f2c56f839772477c9491b1d52aa5813a74055509e762050248a24be
SHA51259a321b862dd6c999f50a64caee51ce8d51844e7f63220f66852de13214c007ea6769dc22ea47a9ef382d9e1ad449c08892a7b360a8865b3f95fc36e77c917f5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50c35e53486f6b3e4979197ea3378589a
SHA165bed070e76a054bc9c017e3140836e57c1e8729
SHA256a43d4ede5f2c56f839772477c9491b1d52aa5813a74055509e762050248a24be
SHA51259a321b862dd6c999f50a64caee51ce8d51844e7f63220f66852de13214c007ea6769dc22ea47a9ef382d9e1ad449c08892a7b360a8865b3f95fc36e77c917f5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD592c7f7f693b18bc8604c5451c35e89e8
SHA1e00d7e87abf6d4da52536af1929dfee384015040
SHA256223db522b6884ea4a7e14596ee54e413c0929170fcea6b70305ed7db8c257718
SHA512e6c5efba925ba98e974afd295bfbe7d33c166afe6221b4020c7995f935b5b5834eddeba58e1ed02b3c65e6b17f2459e1de0a5bebb621b23ac716808b59084a57
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD592c7f7f693b18bc8604c5451c35e89e8
SHA1e00d7e87abf6d4da52536af1929dfee384015040
SHA256223db522b6884ea4a7e14596ee54e413c0929170fcea6b70305ed7db8c257718
SHA512e6c5efba925ba98e974afd295bfbe7d33c166afe6221b4020c7995f935b5b5834eddeba58e1ed02b3c65e6b17f2459e1de0a5bebb621b23ac716808b59084a57
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e3225e36f8ca62cb890965e95db539dc
SHA17b64d69bc9dde1bdb7822680dfba423b243556d4
SHA256d26e650e0f8109d5dba30ef4215270eb2c1a555772488c68fc5e6e84147a4cd1
SHA512b8ab14c22bca63ba60647f3b42c0198b2a7393425cdac7c53606f3e236a1465d9deaaacaef76fb86574caaea7131dd5423e57d2b9c7affdc8d0e67c1724efc23
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e3225e36f8ca62cb890965e95db539dc
SHA17b64d69bc9dde1bdb7822680dfba423b243556d4
SHA256d26e650e0f8109d5dba30ef4215270eb2c1a555772488c68fc5e6e84147a4cd1
SHA512b8ab14c22bca63ba60647f3b42c0198b2a7393425cdac7c53606f3e236a1465d9deaaacaef76fb86574caaea7131dd5423e57d2b9c7affdc8d0e67c1724efc23
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD579491be6b7b83a2896161ec037a86b16
SHA158bc7910d391c671507e637fc937c7d1f5b00cf0
SHA25651c0543ce4c77fa8efbefd89b0c69698329cf3589115916544b1a478e44e7fa7
SHA51203cf7ffc577168b051319e78db3ae6ee492d5f90c26b5a51901a1fb5920eb95534238560f208755ab7e299babe6fcf364f09c99f982a0c709853f1fe3a9f1907
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD509b404583f88cf93cbe493a408d8edce
SHA190de24b87499ca2e29551a583b7479bb2dbdc3c8
SHA256e109924044925370c9e96168482e1d026c34156a1d4e9a54ad6588a74fd5594e
SHA512caec244307ad1534db39779a0c618d36e92e5c813219381abf07b2278ab1803eea08047a50fb8f32c5b545a411e3025c9cefa031b6891a0897fd9e9adff0674f
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
4.2MB
MD54c05c54dd3007dced398eb41ab68992f
SHA11a737edff587c6acc830c8897ccf6128c718530c
SHA2567a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a
SHA51271c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0
-
Filesize
4.2MB
MD54c05c54dd3007dced398eb41ab68992f
SHA11a737edff587c6acc830c8897ccf6128c718530c
SHA2567a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a
SHA51271c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0
-
Filesize
4.2MB
MD54c05c54dd3007dced398eb41ab68992f
SHA11a737edff587c6acc830c8897ccf6128c718530c
SHA2567a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a
SHA51271c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5573d77d4e77a445f5db769812a0be865
SHA17473d15ef2d3c6894edefd472f411c8e3209a99c
SHA2565ec3f268845a50e309ae0d80bcee4f4dd4cd1b279ab1e64b523a057c11074f1c
SHA512af2422a9790a91cdcbe39e6ef6d17899c2cbd4159b1b71ac56f633015068d3afc678fcef34892575bf59bdf7d5914ec6070864940d44130263fe84e28abba2dc
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize10KB
MD546dd239c95c8186b5347a900ce231eae
SHA1733674325a8ad34a0147479f0510bd8bc824e879
SHA256e9abb69b1483c5e1c26d6fb755cd7147b885154a653e188f34401930d89c4116
SHA51241ce13eee4ae7a3475e220ed224d44f2e6b03eedaea52a6119e5ebbc6751734a03cf059b94b24e052358166dca34a3a6890b626313f4b24b1d517057919941b6
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5631f4b3792b263fdda6b265e93be4747
SHA11d6916097d419198bfdf78530d59d0d9f3e12d45
SHA2564e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976
SHA512e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6