Analysis
-
max time kernel
129s -
max time network
158s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
13-11-2023 11:40
Static task
static1
Behavioral task
behavioral1
Sample
226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe
Resource
win10-20231025-en
General
-
Target
226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe
-
Size
932KB
-
MD5
dfe17c2a93b3ee33922b6747cda290df
-
SHA1
d8c30a1915f07d7939216a78ba98f6095adb0aeb
-
SHA256
226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e
-
SHA512
74e2d7038bae910c47f83cc9b5165269921d375fdcc0b33a2c00a7ef8f85bcd11c85b847cf75faecfe47cbc34994111dba429043a746436959bfa0f0bbe7c167
-
SSDEEP
24576:SylIua2tyLB4XeE6OwPKecu3+mofN5Hb:5eua2cthOWncu3TYN
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
smokeloader
up3
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/200-62-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/200-67-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/200-68-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/200-70-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Detect ZGRat V1 10 IoCs
resource yara_rule behavioral1/memory/4340-169-0x0000020E14B80000-0x0000020E14C64000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-173-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-174-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-176-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-178-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-180-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-182-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-184-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-186-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 behavioral1/memory/4340-188-0x0000020E14B80000-0x0000020E14C60000-memory.dmp family_zgrat_v1 -
Glupteba payload 2 IoCs
resource yara_rule behavioral1/memory/232-241-0x0000000002F40000-0x000000000382B000-memory.dmp family_glupteba behavioral1/memory/232-248-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2MF2237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2MF2237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2MF2237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2MF2237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2MF2237.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/2536-79-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/3344-106-0x0000000000540000-0x000000000059A000-memory.dmp family_redline behavioral1/memory/3344-108-0x0000000000400000-0x0000000000467000-memory.dmp family_redline behavioral1/files/0x000800000001abdf-1339.dat family_redline behavioral1/files/0x000800000001abdf-1354.dat family_redline behavioral1/files/0x000800000001abea-2598.dat family_redline behavioral1/files/0x000800000001abea-2599.dat family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000001abdf-1339.dat family_sectoprat behavioral1/files/0x000800000001abdf-1354.dat family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 37 4172 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3764 netsh.exe -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/3720-22-0x0000000002330000-0x0000000002350000-memory.dmp net_reactor behavioral1/memory/3720-24-0x00000000023D0000-0x00000000023EE000-memory.dmp net_reactor behavioral1/memory/3720-25-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-26-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-28-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-30-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-32-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-34-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-36-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-38-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-40-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-42-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-44-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-46-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-48-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-50-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-52-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-54-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor behavioral1/memory/3720-56-0x00000000023D0000-0x00000000023E9000-memory.dmp net_reactor -
Executes dropped EXE 22 IoCs
pid Process 3028 Uh4KC29.exe 2996 eU6Ae86.exe 3720 2MF2237.exe 336 3pm54fr.exe 4764 4hU432Ov.exe 3484 7qk1BQ77.exe 3344 2CC8.exe 3300 3B30.exe 4156 41C9.exe 3208 InstallSetup5.exe 4492 toolspub2.exe 232 31839b57a4f11171d6abc8bbc4451ee4.exe 2928 Broom.exe 4340 41C9.exe 2900 toolspub2.exe 624 BF47.exe 1708 C3CC.exe 1212 31839b57a4f11171d6abc8bbc4451ee4.exe 4252 2882.exe 4172 powershell.exe 4880 38EF.exe 452 csrss.exe -
Loads dropped DLL 1 IoCs
pid Process 4880 38EF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2MF2237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2MF2237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Uh4KC29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" eU6Ae86.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 336 set thread context of 200 336 3pm54fr.exe 77 PID 4764 set thread context of 4068 4764 4hU432Ov.exe 83 PID 3484 set thread context of 2536 3484 7qk1BQ77.exe 86 PID 4156 set thread context of 4340 4156 41C9.exe 96 PID 4492 set thread context of 2900 4492 toolspub2.exe 97 PID 4880 set thread context of 3952 4880 38EF.exe 118 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3024 200 WerFault.exe 77 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4632 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3720 2MF2237.exe 3720 2MF2237.exe 4068 AppLaunch.exe 4068 AppLaunch.exe 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3348 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4068 AppLaunch.exe 2900 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3720 2MF2237.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 4156 41C9.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 3344 2CC8.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 248 powershell.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 1708 C3CC.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 232 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 232 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 4172 powershell.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeDebugPrivilege 4428 powershell.exe Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2928 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3028 4572 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe 71 PID 4572 wrote to memory of 3028 4572 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe 71 PID 4572 wrote to memory of 3028 4572 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe 71 PID 3028 wrote to memory of 2996 3028 Uh4KC29.exe 72 PID 3028 wrote to memory of 2996 3028 Uh4KC29.exe 72 PID 3028 wrote to memory of 2996 3028 Uh4KC29.exe 72 PID 2996 wrote to memory of 3720 2996 eU6Ae86.exe 73 PID 2996 wrote to memory of 3720 2996 eU6Ae86.exe 73 PID 2996 wrote to memory of 3720 2996 eU6Ae86.exe 73 PID 2996 wrote to memory of 336 2996 eU6Ae86.exe 74 PID 2996 wrote to memory of 336 2996 eU6Ae86.exe 74 PID 2996 wrote to memory of 336 2996 eU6Ae86.exe 74 PID 336 wrote to memory of 3012 336 3pm54fr.exe 76 PID 336 wrote to memory of 3012 336 3pm54fr.exe 76 PID 336 wrote to memory of 3012 336 3pm54fr.exe 76 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 336 wrote to memory of 200 336 3pm54fr.exe 77 PID 3028 wrote to memory of 4764 3028 Uh4KC29.exe 78 PID 3028 wrote to memory of 4764 3028 Uh4KC29.exe 78 PID 3028 wrote to memory of 4764 3028 Uh4KC29.exe 78 PID 4764 wrote to memory of 436 4764 4hU432Ov.exe 82 PID 4764 wrote to memory of 436 4764 4hU432Ov.exe 82 PID 4764 wrote to memory of 436 4764 4hU432Ov.exe 82 PID 4764 wrote to memory of 4068 4764 4hU432Ov.exe 83 PID 4764 wrote to memory of 4068 4764 4hU432Ov.exe 83 PID 4764 wrote to memory of 4068 4764 4hU432Ov.exe 83 PID 4764 wrote to memory of 4068 4764 4hU432Ov.exe 83 PID 4764 wrote to memory of 4068 4764 4hU432Ov.exe 83 PID 4764 wrote to memory of 4068 4764 4hU432Ov.exe 83 PID 4572 wrote to memory of 3484 4572 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe 84 PID 4572 wrote to memory of 3484 4572 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe 84 PID 4572 wrote to memory of 3484 4572 226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe 84 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3484 wrote to memory of 2536 3484 7qk1BQ77.exe 86 PID 3348 wrote to memory of 3344 3348 Process not Found 87 PID 3348 wrote to memory of 3344 3348 Process not Found 87 PID 3348 wrote to memory of 3344 3348 Process not Found 87 PID 3348 wrote to memory of 3300 3348 Process not Found 90 PID 3348 wrote to memory of 3300 3348 Process not Found 90 PID 3348 wrote to memory of 3300 3348 Process not Found 90 PID 3348 wrote to memory of 4156 3348 Process not Found 91 PID 3348 wrote to memory of 4156 3348 Process not Found 91 PID 3300 wrote to memory of 3208 3300 3B30.exe 92 PID 3300 wrote to memory of 3208 3300 3B30.exe 92 PID 3300 wrote to memory of 3208 3300 3B30.exe 92 PID 3300 wrote to memory of 4492 3300 3B30.exe 93 PID 3300 wrote to memory of 4492 3300 3B30.exe 93 PID 3300 wrote to memory of 4492 3300 3B30.exe 93 PID 3300 wrote to memory of 232 3300 3B30.exe 94 PID 3300 wrote to memory of 232 3300 3B30.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe"C:\Users\Admin\AppData\Local\Temp\226cc95628524ae867a564907767a054637d59c59063ba9480b07b6f9466652e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uh4KC29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uh4KC29.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eU6Ae86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eU6Ae86.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2MF2237.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2MF2237.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3pm54fr.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3pm54fr.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 200 -s 5686⤵
- Program crash
PID:3024
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4hU432Ov.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4hU432Ov.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7qk1BQ77.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7qk1BQ77.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\2CC8.exeC:\Users\Admin\AppData\Local\Temp\2CC8.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
C:\Users\Admin\AppData\Local\Temp\3B30.exeC:\Users\Admin\AppData\Local\Temp\3B30.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:248
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3620
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:3764
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4632
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2184
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:3908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41C9.exeC:\Users\Admin\AppData\Local\Temp\41C9.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\41C9.exeC:\Users\Admin\AppData\Local\Temp\41C9.exe2⤵
- Executes dropped EXE
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\BF47.exeC:\Users\Admin\AppData\Local\Temp\BF47.exe1⤵
- Executes dropped EXE
PID:624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\C3CC.exeC:\Users\Admin\AppData\Local\Temp\C3CC.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2882.exeC:\Users\Admin\AppData\Local\Temp\2882.exe1⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\2C2D.exeC:\Users\Admin\AppData\Local\Temp\2C2D.exe1⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\38EF.exeC:\Users\Admin\AppData\Local\Temp\38EF.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\CanReuseTransform\cmepvadzk\_NewEnum.exeC:\Users\Admin\AppData\Local\CanReuseTransform\cmepvadzk\_NewEnum.exe1⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c8c92a207e2a92499a19f26f04b3d8b2
SHA170192227c5ff60823cea250e0031221885454f86
SHA256795e333056f12db05a5c212318e3f1e3d915a8e7f88737fc34321465a6c1bfad
SHA51249033480576e9d93e7690d4cbd0c8d029fd7016ec5cad721c0e5f542e68ce73951e8356682e1bd351215e3ecd0dbb3866f29dec9f47502ed647aa76800850ca5
-
Filesize
1.4MB
MD5c8c92a207e2a92499a19f26f04b3d8b2
SHA170192227c5ff60823cea250e0031221885454f86
SHA256795e333056f12db05a5c212318e3f1e3d915a8e7f88737fc34321465a6c1bfad
SHA51249033480576e9d93e7690d4cbd0c8d029fd7016ec5cad721c0e5f542e68ce73951e8356682e1bd351215e3ecd0dbb3866f29dec9f47502ed647aa76800850ca5
-
Filesize
1KB
MD534cb83de9d8d99a31fa837dc05aedb05
SHA1b1757ff9c600b575543993ea8409ad95d65fcc27
SHA2564283e061bb4933a9ed3c13d8e18d36e30ebdf3a5347824fe42a4ffff1820d6c3
SHA512187c575732e994d8335946de491360d9de7486b72209fea33884f05f0f191d4398ca31bb05bd7a57ae6bba4b07ebe3ac00875cf37a17c6c7b863dcf7c445e554
-
Filesize
16.3MB
MD5d43f533b64aad56fd57f9495a148799f
SHA13055cdcf5144702017c4cd434039c4beab212ad4
SHA256e0f318560fad28284276f0827816f0c69fbbeb8691069f74520ca89caa0285cf
SHA512be996d12603896c81c67f7bd9b862834592057153ffb85d2b39f4bc8cdf10f468d2ba54f1080bc856df959f84e7d9ec0badfcc49be8034282647c1861aa2f1bf
-
Filesize
16.3MB
MD5d43f533b64aad56fd57f9495a148799f
SHA13055cdcf5144702017c4cd434039c4beab212ad4
SHA256e0f318560fad28284276f0827816f0c69fbbeb8691069f74520ca89caa0285cf
SHA512be996d12603896c81c67f7bd9b862834592057153ffb85d2b39f4bc8cdf10f468d2ba54f1080bc856df959f84e7d9ec0badfcc49be8034282647c1861aa2f1bf
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
399KB
MD5e42c895858029541827c3d671bb40428
SHA11544919f93796d0c18202ecd6d71ea90e795ee6e
SHA256fb3946aa443e59af11ecef144d3dfc114e33560e8ba71b68f3079099c57fd653
SHA512e7b78de3b178facd4e6215607b4139e2ede45a75c2965337313f80bcc507580649d99157494e00678c189bd8d60806bb0211863047bc5a4fc37ed209f82504ab
-
Filesize
399KB
MD5e42c895858029541827c3d671bb40428
SHA11544919f93796d0c18202ecd6d71ea90e795ee6e
SHA256fb3946aa443e59af11ecef144d3dfc114e33560e8ba71b68f3079099c57fd653
SHA512e7b78de3b178facd4e6215607b4139e2ede45a75c2965337313f80bcc507580649d99157494e00678c189bd8d60806bb0211863047bc5a4fc37ed209f82504ab
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
1.4MB
MD5c8c92a207e2a92499a19f26f04b3d8b2
SHA170192227c5ff60823cea250e0031221885454f86
SHA256795e333056f12db05a5c212318e3f1e3d915a8e7f88737fc34321465a6c1bfad
SHA51249033480576e9d93e7690d4cbd0c8d029fd7016ec5cad721c0e5f542e68ce73951e8356682e1bd351215e3ecd0dbb3866f29dec9f47502ed647aa76800850ca5
-
Filesize
1.4MB
MD5c8c92a207e2a92499a19f26f04b3d8b2
SHA170192227c5ff60823cea250e0031221885454f86
SHA256795e333056f12db05a5c212318e3f1e3d915a8e7f88737fc34321465a6c1bfad
SHA51249033480576e9d93e7690d4cbd0c8d029fd7016ec5cad721c0e5f542e68ce73951e8356682e1bd351215e3ecd0dbb3866f29dec9f47502ed647aa76800850ca5
-
Filesize
1.4MB
MD5c8c92a207e2a92499a19f26f04b3d8b2
SHA170192227c5ff60823cea250e0031221885454f86
SHA256795e333056f12db05a5c212318e3f1e3d915a8e7f88737fc34321465a6c1bfad
SHA51249033480576e9d93e7690d4cbd0c8d029fd7016ec5cad721c0e5f542e68ce73951e8356682e1bd351215e3ecd0dbb3866f29dec9f47502ed647aa76800850ca5
-
Filesize
18.0MB
MD595357230a99689a58f8d89c1acdc6bf2
SHA1f89ed22d1139d2d5049d09db778702b40f466b4d
SHA2568f572436d4a7b8ea6f2a3e0cb987fb609afb575133d706938c9fd4b4a3117d2d
SHA5124e5311c2a6ab8810b26400b7d478b7241ed376dfe8212919a3e6925fad86de5d9c336dbec8456f3c7d56e124ae3547fa492a6a95a0d8ba9414fb72c99d8f7281
-
Filesize
18.0MB
MD595357230a99689a58f8d89c1acdc6bf2
SHA1f89ed22d1139d2d5049d09db778702b40f466b4d
SHA2568f572436d4a7b8ea6f2a3e0cb987fb609afb575133d706938c9fd4b4a3117d2d
SHA5124e5311c2a6ab8810b26400b7d478b7241ed376dfe8212919a3e6925fad86de5d9c336dbec8456f3c7d56e124ae3547fa492a6a95a0d8ba9414fb72c99d8f7281
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
408KB
MD5be6ebd2421a102a4478407a3d0fc51d8
SHA1a0c638da879baebcad3aa3f17bb9a41d0202b4d9
SHA25671a45484d9d50f05b3c79a3a61e24150332634a77cd88ee0fcde85f97482c34b
SHA5125ab7c6d6ae6c262f0d0b01cf2389e350e095eb6aff1d3b8cc6c04cf7e7e7a8ce1b081adcb8f5c0b7137e0e46dcdcb426020a8f3566e7e8c6de01904d0087b7c4
-
Filesize
408KB
MD5be6ebd2421a102a4478407a3d0fc51d8
SHA1a0c638da879baebcad3aa3f17bb9a41d0202b4d9
SHA25671a45484d9d50f05b3c79a3a61e24150332634a77cd88ee0fcde85f97482c34b
SHA5125ab7c6d6ae6c262f0d0b01cf2389e350e095eb6aff1d3b8cc6c04cf7e7e7a8ce1b081adcb8f5c0b7137e0e46dcdcb426020a8f3566e7e8c6de01904d0087b7c4
-
Filesize
668KB
MD5b4bef785be57804c1e24834a6ab4350d
SHA1f3d72a3e355d8ac49cdb9a1a6edcda419fddd59d
SHA256556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310
SHA512bbfab441a3be6e3932a6b4c2f5d72d02db063932a6953f187e62e8f1e74949dad45e8a95feab54cc6dc08559528f54da8acd7592c7db2c6bdde35a04a0949af8
-
Filesize
668KB
MD5b4bef785be57804c1e24834a6ab4350d
SHA1f3d72a3e355d8ac49cdb9a1a6edcda419fddd59d
SHA256556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310
SHA512bbfab441a3be6e3932a6b4c2f5d72d02db063932a6953f187e62e8f1e74949dad45e8a95feab54cc6dc08559528f54da8acd7592c7db2c6bdde35a04a0949af8
-
Filesize
225KB
MD5c2b301177da3c4cffb319dc3f9e3ff0c
SHA1fd17ee3d3a0ac2e7505d3be02523846b657797c0
SHA25665923603a6f117c7460b8cc69009105208bdfa544b90446580915db8fe127ae8
SHA51212c835674007561a0419d5026dcfc4e060c4b9eb5ebf252e5afc85aa22cb7ee1e58dd21b99d086b1780e639904240340bea55d9c7fd34a7388e214e0990727e5
-
Filesize
225KB
MD5c2b301177da3c4cffb319dc3f9e3ff0c
SHA1fd17ee3d3a0ac2e7505d3be02523846b657797c0
SHA25665923603a6f117c7460b8cc69009105208bdfa544b90446580915db8fe127ae8
SHA51212c835674007561a0419d5026dcfc4e060c4b9eb5ebf252e5afc85aa22cb7ee1e58dd21b99d086b1780e639904240340bea55d9c7fd34a7388e214e0990727e5
-
Filesize
454KB
MD5eabd7adc8ded1f1acaee81b36c58138f
SHA1e420e3efab20697bea34223e60ec53d99da59ca8
SHA256f3ed6911da5361709ae34f486285416b7dee7a09ccd607ea1938956a97dd2710
SHA5125a723a031385b323e9306c46c3f9e2432edd08dde47512a7c6c7fb1c62df97e18b41d2676fd4dc91633f3504e461225991b25e5f2885ab5e7cc9483a597d534f
-
Filesize
454KB
MD5eabd7adc8ded1f1acaee81b36c58138f
SHA1e420e3efab20697bea34223e60ec53d99da59ca8
SHA256f3ed6911da5361709ae34f486285416b7dee7a09ccd607ea1938956a97dd2710
SHA5125a723a031385b323e9306c46c3f9e2432edd08dde47512a7c6c7fb1c62df97e18b41d2676fd4dc91633f3504e461225991b25e5f2885ab5e7cc9483a597d534f
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
369KB
MD5ca09344fbf4a1dbaffe18eb4a00a931a
SHA181d5ed2e00d4d297cda4882641e957eb75d9f9a9
SHA2566113e109ebd9701ce5c91d223394bf22a027534a4dc46f654afabe53efd16c35
SHA512c8663715e54d8618464aa2f1edfa3b4d1a6deac744d6fa39a5656937610bdd5af9c9ae6b405a329dc0b965c983330e875f691e2b5c7b9a891cd0bc013df6187f
-
Filesize
369KB
MD5ca09344fbf4a1dbaffe18eb4a00a931a
SHA181d5ed2e00d4d297cda4882641e957eb75d9f9a9
SHA2566113e109ebd9701ce5c91d223394bf22a027534a4dc46f654afabe53efd16c35
SHA512c8663715e54d8618464aa2f1edfa3b4d1a6deac744d6fa39a5656937610bdd5af9c9ae6b405a329dc0b965c983330e875f691e2b5c7b9a891cd0bc013df6187f
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD55962032f5f9ef10ad7afb6c595abf5c6
SHA1fe47554bacd8ac1f3b9c249eb36c50aa0a8fd241
SHA2560a5f892414b30f17d2a99466c400da50eef364501550d1835578042b084baa1e
SHA512c4fb5d51f9b973f331a381577c7e5df57a92547d8192dfa100f41d0e1f5c1075dc04709372f7de929d433ac2a2b8c432c876744a41718b2005fc3453d2260f8e
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c2aaefdaa2dd2ffc4f279532e3f6fad9
SHA1f9a62c492413136e32a660d8d7d3cac3ef9dd762
SHA2563c28b5ae2de5c4b363658bead31a2753df549d9205022494023d440eb5e4f92a
SHA512afd66232e94beddab85e2de17b93b74e9d077468bb6a0153d01546dc3ef6660e9212d05c9c38ec30f741ab743af99349ef6f3966f7a9a135c56988e4ad1a8b5b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b69b336e00ac69e3fd6da6600aafa406
SHA18176b5ef844201b181796b0ddfca6128be2ee641
SHA2562c7fe7ddb1656f0a3bb7e9d0895c95c5391faed5f86ddd9eef85ad61a0e98d58
SHA5125fbd69691e243c392a6fd25b6509c6394602ec1be68cc72dcf0888c3dad023f9f315ed40b0725b40edfcb33e62d958b7abb4f2a72a16d810adadb495ca4c4a2e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a63754da42b5ec6b5083e5f7639992fd
SHA1a4449d9139f9223b8e3f1b1e903c850f06d3e8bb
SHA2562998553e02f5da8b8a10d6adb306b36dc56289539cc50ee4c275be917facc994
SHA512f734c5f7ed299435e2031097064387072b8fb67cef699d3a499819a294bcb3c249f3df1b0853ce81dd44513971d750cfc154ad933f3bf3bfa79538e6a4a2aa88
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55d307b0a651180aabd3af3e0cca5a324
SHA13687ef0c014619e77e99b95d5e786cade12351ac
SHA2567399831b9471e7b50b8eb9252d84d9610d0f033ecc55158039649f7f49817e6c
SHA51250b9cffa2493e84192c93f9f4de84f30c3b2c969159a59cba6b1430726a1beb849a8bc3f4dc2ed84c353c9396431771798d9c0f386cd9b4bad8dce0016198d04
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b721e69c22b9324ae83938d61985f215
SHA145f3a163cf74ea869ed671cdf2cd44c099987e52
SHA256b22df41430cf621bc8d6045359f2f24bf46ffc04da420ea1f3fb37881419e89b
SHA512ca585d329caddf4f483bce2ff97a8292ec394a5fef3e375872fc9bb52e6862d967e76d93076d35d6e1731fcb2b4f708908a33c931e38e8ed66832377f19d5c4a
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719