Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
13-11-2023 14:27
Static task
static1
Behavioral task
behavioral1
Sample
494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe
Resource
win10-20231023-en
General
-
Target
494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe
-
Size
934KB
-
MD5
60d4305b14863902a827b85b817a2355
-
SHA1
bbedd0b1785d7c343a6a9ab666bc3c80fc65ce90
-
SHA256
494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a
-
SHA512
a1e68718d324246be32c16166cea484928e84f44734821e7c1da8ff220c6c29a4d8851665cd737bff9ec3d25aa474dab29e7e811e9c5d6c8e83e6ea1b3bca3bf
-
SSDEEP
12288:EMrSy90yEUzdLGHRIWIVZy9RimXm65eFTd7CWmI+ORJ00SOp86BlWNnOujppHV3:Gy7EdaS9RE65e2WZ0gpHQf77MOJ5GH
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
redline
LiveTraffic
195.10.205.16:1056
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1556-62-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1556-67-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1556-68-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1556-71-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Glupteba payload 9 IoCs
resource yara_rule behavioral1/memory/868-156-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral1/memory/868-157-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/868-437-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/868-468-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/868-469-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral1/memory/3960-473-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3960-742-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3960-1079-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3960-1365-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2uT3566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2uT3566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2uT3566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2uT3566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2uT3566.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral1/memory/2564-72-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/3316-114-0x0000000000400000-0x0000000000467000-memory.dmp family_redline behavioral1/memory/3316-113-0x0000000000540000-0x000000000059A000-memory.dmp family_redline behavioral1/files/0x000800000001ac48-588.dat family_redline behavioral1/files/0x000800000001ac48-591.dat family_redline behavioral1/memory/2056-1094-0x0000000001310000-0x000000000134C000-memory.dmp family_redline behavioral1/files/0x000900000001ac54-1316.dat family_redline behavioral1/files/0x000900000001ac54-1315.dat family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000001ac48-588.dat family_sectoprat behavioral1/files/0x000800000001ac48-591.dat family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 484 netsh.exe -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/4172-22-0x00000000006C0000-0x00000000006E0000-memory.dmp net_reactor behavioral1/memory/4172-24-0x00000000024D0000-0x00000000024EE000-memory.dmp net_reactor behavioral1/memory/4172-25-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-26-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-28-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-30-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-32-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-34-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-38-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-36-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-40-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-44-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-46-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-42-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-48-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-50-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-52-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-54-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor behavioral1/memory/4172-56-0x00000000024D0000-0x00000000024E9000-memory.dmp net_reactor -
Executes dropped EXE 24 IoCs
pid Process 624 Zm2WC16.exe 4468 qb4si59.exe 4172 2uT3566.exe 4108 3sb23zT.exe 3680 6bS2oD5.exe 2952 7kA8Ax34.exe 3316 3A26.exe 1360 464C.exe 3424 InstallSetup5.exe 2736 toolspub2.exe 868 31839b57a4f11171d6abc8bbc4451ee4.exe 3172 Broom.exe 1088 toolspub2.exe 3960 31839b57a4f11171d6abc8bbc4451ee4.exe 3104 B265.exe 1544 B4F6.exe 2736 FE35.exe 916 D6.exe 3512 csrss.exe 820 D6A.exe 3176 injector.exe 4372 windefender.exe 2196 tor.exe 684 windefender.exe -
Loads dropped DLL 12 IoCs
pid Process 3316 3A26.exe 3316 3A26.exe 820 D6A.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe 2196 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000600000001ac6e-2198.dat upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2uT3566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2uT3566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Zm2WC16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qb4si59.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4108 set thread context of 1556 4108 3sb23zT.exe 76 PID 3680 set thread context of 2564 3680 6bS2oD5.exe 83 PID 2952 set thread context of 3468 2952 7kA8Ax34.exe 86 PID 2736 set thread context of 1088 2736 toolspub2.exe 95 PID 3104 set thread context of 2056 3104 B265.exe 114 PID 2736 set thread context of 2904 2736 FE35.exe 128 PID 820 set thread context of 3964 820 D6A.exe 129 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4792 sc.exe 1244 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3988 1556 WerFault.exe 76 2764 3316 WerFault.exe 87 292 820 WerFault.exe 118 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4856 schtasks.exe 4936 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4172 2uT3566.exe 4172 2uT3566.exe 3468 AppLaunch.exe 3468 AppLaunch.exe 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3280 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3468 AppLaunch.exe 1088 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4172 2uT3566.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 3764 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 868 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 868 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 1544 B4F6.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 4040 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 4236 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3172 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3340 wrote to memory of 624 3340 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe 71 PID 3340 wrote to memory of 624 3340 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe 71 PID 3340 wrote to memory of 624 3340 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe 71 PID 624 wrote to memory of 4468 624 Zm2WC16.exe 72 PID 624 wrote to memory of 4468 624 Zm2WC16.exe 72 PID 624 wrote to memory of 4468 624 Zm2WC16.exe 72 PID 4468 wrote to memory of 4172 4468 qb4si59.exe 73 PID 4468 wrote to memory of 4172 4468 qb4si59.exe 73 PID 4468 wrote to memory of 4172 4468 qb4si59.exe 73 PID 4468 wrote to memory of 4108 4468 qb4si59.exe 74 PID 4468 wrote to memory of 4108 4468 qb4si59.exe 74 PID 4468 wrote to memory of 4108 4468 qb4si59.exe 74 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 4108 wrote to memory of 1556 4108 3sb23zT.exe 76 PID 624 wrote to memory of 3680 624 Zm2WC16.exe 77 PID 624 wrote to memory of 3680 624 Zm2WC16.exe 77 PID 624 wrote to memory of 3680 624 Zm2WC16.exe 77 PID 3680 wrote to memory of 3516 3680 6bS2oD5.exe 81 PID 3680 wrote to memory of 3516 3680 6bS2oD5.exe 81 PID 3680 wrote to memory of 3516 3680 6bS2oD5.exe 81 PID 3680 wrote to memory of 1860 3680 6bS2oD5.exe 82 PID 3680 wrote to memory of 1860 3680 6bS2oD5.exe 82 PID 3680 wrote to memory of 1860 3680 6bS2oD5.exe 82 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3680 wrote to memory of 2564 3680 6bS2oD5.exe 83 PID 3340 wrote to memory of 2952 3340 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe 84 PID 3340 wrote to memory of 2952 3340 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe 84 PID 3340 wrote to memory of 2952 3340 494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe 84 PID 2952 wrote to memory of 3468 2952 7kA8Ax34.exe 86 PID 2952 wrote to memory of 3468 2952 7kA8Ax34.exe 86 PID 2952 wrote to memory of 3468 2952 7kA8Ax34.exe 86 PID 2952 wrote to memory of 3468 2952 7kA8Ax34.exe 86 PID 2952 wrote to memory of 3468 2952 7kA8Ax34.exe 86 PID 2952 wrote to memory of 3468 2952 7kA8Ax34.exe 86 PID 3280 wrote to memory of 3316 3280 Process not Found 87 PID 3280 wrote to memory of 3316 3280 Process not Found 87 PID 3280 wrote to memory of 3316 3280 Process not Found 87 PID 3280 wrote to memory of 1360 3280 Process not Found 90 PID 3280 wrote to memory of 1360 3280 Process not Found 90 PID 3280 wrote to memory of 1360 3280 Process not Found 90 PID 1360 wrote to memory of 3424 1360 464C.exe 91 PID 1360 wrote to memory of 3424 1360 464C.exe 91 PID 1360 wrote to memory of 3424 1360 464C.exe 91 PID 1360 wrote to memory of 2736 1360 464C.exe 92 PID 1360 wrote to memory of 2736 1360 464C.exe 92 PID 1360 wrote to memory of 2736 1360 464C.exe 92 PID 1360 wrote to memory of 868 1360 464C.exe 93 PID 1360 wrote to memory of 868 1360 464C.exe 93 PID 1360 wrote to memory of 868 1360 464C.exe 93 PID 3424 wrote to memory of 3172 3424 InstallSetup5.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe"C:\Users\Admin\AppData\Local\Temp\494a7224cf903371b4ae269f3d1cfbf2607a9cc55c2a0214d7c7a1356465fb5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zm2WC16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zm2WC16.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qb4si59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qb4si59.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2uT3566.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2uT3566.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3sb23zT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3sb23zT.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 5646⤵
- Program crash
PID:3988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6bS2oD5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6bS2oD5.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7kA8Ax34.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7kA8Ax34.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3468
-
-
-
C:\Users\Admin\AppData\Local\Temp\3A26.exeC:\Users\Admin\AppData\Local\Temp\3A26.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 7682⤵
- Program crash
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\464C.exeC:\Users\Admin\AppData\Local\Temp\464C.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:4108
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:484
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:3512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4856
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3176
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4936
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:4584
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:4792
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4692
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:1244
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B265.exeC:\Users\Admin\AppData\Local\Temp\B265.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\B4F6.exeC:\Users\Admin\AppData\Local\Temp\B4F6.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
C:\Users\Admin\AppData\Local\Temp\FE35.exeC:\Users\Admin\AppData\Local\Temp\FE35.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\D6.exeC:\Users\Admin\AppData\Local\Temp\D6.exe1⤵
- Executes dropped EXE
PID:916
-
C:\Users\Admin\AppData\Local\Temp\D6A.exeC:\Users\Admin\AppData\Local\Temp\D6A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:1072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 12362⤵
- Program crash
PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
399KB
MD5b2952a282144c042f368121f3d991630
SHA11c5d07dcc869d0667a6225202b4f87380cc9de67
SHA256bc3ce9adeb97d068e11f11fe6219ff29fd6e17ed2e5c175a19bbd5071fc32358
SHA512db781e7a874e9d3c2d565dc4760e8ad0b013b1e78332e430590d638afa34aed1d160e22db8200807ddaacd8d38c356f2f922318ca319527a1f33c85e1329bc8c
-
Filesize
399KB
MD5b2952a282144c042f368121f3d991630
SHA11c5d07dcc869d0667a6225202b4f87380cc9de67
SHA256bc3ce9adeb97d068e11f11fe6219ff29fd6e17ed2e5c175a19bbd5071fc32358
SHA512db781e7a874e9d3c2d565dc4760e8ad0b013b1e78332e430590d638afa34aed1d160e22db8200807ddaacd8d38c356f2f922318ca319527a1f33c85e1329bc8c
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
18.0MB
MD595357230a99689a58f8d89c1acdc6bf2
SHA1f89ed22d1139d2d5049d09db778702b40f466b4d
SHA2568f572436d4a7b8ea6f2a3e0cb987fb609afb575133d706938c9fd4b4a3117d2d
SHA5124e5311c2a6ab8810b26400b7d478b7241ed376dfe8212919a3e6925fad86de5d9c336dbec8456f3c7d56e124ae3547fa492a6a95a0d8ba9414fb72c99d8f7281
-
Filesize
18.0MB
MD595357230a99689a58f8d89c1acdc6bf2
SHA1f89ed22d1139d2d5049d09db778702b40f466b4d
SHA2568f572436d4a7b8ea6f2a3e0cb987fb609afb575133d706938c9fd4b4a3117d2d
SHA5124e5311c2a6ab8810b26400b7d478b7241ed376dfe8212919a3e6925fad86de5d9c336dbec8456f3c7d56e124ae3547fa492a6a95a0d8ba9414fb72c99d8f7281
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
15.3MB
MD5e2d9ea8f72bc239d7372048430301e5e
SHA1602c740f6497656c7952d65441ea36f623f588cb
SHA256564ad08d79345be7121e76d778719928ddb37af7208368ca6dfcb703bc7168f4
SHA5122f1394f494639b74f70238d3c893a99b1faa388a7c0aeb3c114fb09ac5717a7ee703b06e0a3ec1ebac9c0cfdade31951cb47b73e52865f520e2d342330692b39
-
Filesize
225KB
MD5e813cabca1d05c3b9a7c82872a5a0a48
SHA1318d8cc2d55da4748c64bd5c7e053e8cafd7c856
SHA256e43b4ba6b638274260d56f1799b8397a0e50383f8dac5642717ff32f187eba70
SHA512fab52a6adfa5d086a68f4a1aa475ec9b1d604b3df40b717e1f3a620378bc9760962fbfadfdafbb9e9bf3d3578499e5f21e40ba277d3c91bfe1c77778691734a8
-
Filesize
225KB
MD5e813cabca1d05c3b9a7c82872a5a0a48
SHA1318d8cc2d55da4748c64bd5c7e053e8cafd7c856
SHA256e43b4ba6b638274260d56f1799b8397a0e50383f8dac5642717ff32f187eba70
SHA512fab52a6adfa5d086a68f4a1aa475ec9b1d604b3df40b717e1f3a620378bc9760962fbfadfdafbb9e9bf3d3578499e5f21e40ba277d3c91bfe1c77778691734a8
-
Filesize
718KB
MD57a03a2b7ef1c2eb3d3fbd76e893a8727
SHA146c05d07700fcaeaa4b13f99bf58b7673cef314b
SHA256e71b77e9879aa8f3f608919bd02812e56961e0a911cf64b7e4f2d337d4bfaf87
SHA51213d98dd57bcc0fac97c27c83e4f65609360516585bf1053364416dc20b8fd896ccf107b0578ebd2fee55faf524d63283c0f640a6e381fb758dad23f32082cdf3
-
Filesize
718KB
MD57a03a2b7ef1c2eb3d3fbd76e893a8727
SHA146c05d07700fcaeaa4b13f99bf58b7673cef314b
SHA256e71b77e9879aa8f3f608919bd02812e56961e0a911cf64b7e4f2d337d4bfaf87
SHA51213d98dd57bcc0fac97c27c83e4f65609360516585bf1053364416dc20b8fd896ccf107b0578ebd2fee55faf524d63283c0f640a6e381fb758dad23f32082cdf3
-
Filesize
408KB
MD5cd8a30122a1ad181608615b0a4ff491d
SHA11dc723fb2821f8bac360918669ad18d69cfff2e3
SHA2568e02229fba8c3e27cb1aa87709bd0ac8d3fa2e9936f4f2d9b504d488cc458ce5
SHA5121adbd37fbf43042bacbdb9208c4c069ada561057ee6123b238d27cc4e825275bb6ccd7a6f3a6257f40da0fff2990278e6fe0a9956024e75fbf51deba5a238325
-
Filesize
408KB
MD5cd8a30122a1ad181608615b0a4ff491d
SHA11dc723fb2821f8bac360918669ad18d69cfff2e3
SHA2568e02229fba8c3e27cb1aa87709bd0ac8d3fa2e9936f4f2d9b504d488cc458ce5
SHA5121adbd37fbf43042bacbdb9208c4c069ada561057ee6123b238d27cc4e825275bb6ccd7a6f3a6257f40da0fff2990278e6fe0a9956024e75fbf51deba5a238325
-
Filesize
454KB
MD5f231fd6d42112e5c4a8c26223cb4cdf4
SHA12027bb9bf219d54bcc5fe172725827dd2e7426ea
SHA2568ef2a418afee7263f8e8b15eb4815c0faab2bbad7665b3d4e998b5a5c80d3a22
SHA512fbf4ecae9b2a54632f9f5814aff926a768c9e2c52d648450fbebb05f526b52649ef312ddd77fa36c674470bbd7ffce2e393f1aca6255e8cd8e17ab908cecae22
-
Filesize
454KB
MD5f231fd6d42112e5c4a8c26223cb4cdf4
SHA12027bb9bf219d54bcc5fe172725827dd2e7426ea
SHA2568ef2a418afee7263f8e8b15eb4815c0faab2bbad7665b3d4e998b5a5c80d3a22
SHA512fbf4ecae9b2a54632f9f5814aff926a768c9e2c52d648450fbebb05f526b52649ef312ddd77fa36c674470bbd7ffce2e393f1aca6255e8cd8e17ab908cecae22
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
369KB
MD5fdfe94816651a1bfefbd53036290cc7c
SHA1143fafd9a4fdde8efdc02c09908c0787cbdcdee4
SHA256ec0b5cec6cce3e9ceafbaf1c22e1bdf647358ec1da8544a2964e2a98fb53999b
SHA5122d9c29554d7954166a3c79c66e9e0ec2825214555de3d0dcbc8065b0f6eefd7ce31dd1a653fff6969135ab90d800dc54d5399aa426600eaa5843914bcb3b903d
-
Filesize
369KB
MD5fdfe94816651a1bfefbd53036290cc7c
SHA1143fafd9a4fdde8efdc02c09908c0787cbdcdee4
SHA256ec0b5cec6cce3e9ceafbaf1c22e1bdf647358ec1da8544a2964e2a98fb53999b
SHA5122d9c29554d7954166a3c79c66e9e0ec2825214555de3d0dcbc8065b0f6eefd7ce31dd1a653fff6969135ab90d800dc54d5399aa426600eaa5843914bcb3b903d
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2.9MB
MD572368cda337ca2ea1ba0c9c099d651c0
SHA1b59ecef9da89c42866ac3c994257b391ed639e07
SHA2563423f3227f5ac5b0579e66705cb1f50d08fd8e11479e737926e3c71f1ee51884
SHA51280404c069e1ccc3aa90ac3687f517ff02eca3072fc3c5c91e1109109539e2f0f43bc7f49e9e1a8adf67ae6d8a2c7d6079ecbf8ea87e413dcf587bd28b450049a
-
Filesize
4.8MB
MD5265b246737ad24613f529bdc290ada4d
SHA187b89c3fad33c71cb051df1426876b904ef66b03
SHA25603bb650cef570727cb132697e3033479b0fc0dead814d9afd6379d823570f662
SHA5125370dfb2a7487f4313552403fa28cedf30f56e1dd613ae8bef929f4453a8721bd49ed73dfc1e2de8e30ccb583ae4ab5ec12ea70c7f90bdba25ed86485436b7b7
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5674e2655c91200908ca7eea977ffc25b
SHA10ff0e11d5933cf382d7381edbc6f216d97a2e181
SHA2566d9706346ebea4d1cdb447635404e8a662bc2f40bc6d829b45d50aeedeeaffaa
SHA512304ad62ea8746a6dd086687bbd9d22031c2a731d0d7809ebffaaa6649ee16a9bc89e2dc17eb360dc81309fde5a797bd9398928708d63c08cc7d4e51c2f959642
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52656714ad03def93990bbf32b358fd5a
SHA1907beba668b48a84fca01a0bbb6041574946b657
SHA256d03b849a3dea17131d5d7347a2f621658843a9dfedce64f546a8974444fdb9a3
SHA512b66333e984c1bd8a98a28d9f7ca490ccb86b04d75e36b0a1bb74791ff0db19006677e09c0e8de1b098ba0193f0e91568a67767f99926e6e2403780a9fde6f190
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56456439b7d4e388855e2127f23857068
SHA12b6b529757e64d22182769698944165b2aa4d665
SHA256261ac49d9cc77acddf7e6053256fba0e95235ccd1a680b3b5a92b821b73c56e6
SHA512955eb9ee039e8fdcb6187474643faf4504f8881a590f3b4c8d3f9039f2583975a94f6a6179313b68772eda1788b0a8ff5b8e788f5f79f5a181b7a5bff73c2948
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e497734aab4df093dd4bfb1325039cb7
SHA1c4aa1d2837a895d53ccaf98985f7ab8596732cd5
SHA2564700ff04f11ff0cbc02645410b89e2779b07688871833b529cd7a7d29442a691
SHA5126766db0028d5d80cac2749c786ecd7744fc5b52198df2f36f4c73ebd7cbb2f64291e6baa3b1f3f536d0f840702b8b425cffa70a8f46037c614d24b9256603741
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55e5a24a88fae6fc3d61d348d791ab4f3
SHA1aa47ff2dc634817e0fdc22101f5300c5c2a1a765
SHA256206e868bf406b2c26a73e873aa8ec1cb0ca825893273e73bca24f63d98eb8276
SHA512d317d28bc78079df6972ebba40e697ec281283ba5fe7c4996d8ec5caaa0c109c8a68ff9f8c093eb74ae37d6deebbdd7fc2d33f71fc2ed6a04a316bdebde65a59
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e159e1bc88c102676ce219a2a0e16174
SHA15246496a6218a284f0197a1627c3695e06bef3de
SHA2560057ab99058a31558951f1e8b9db2496376dfa1cd13e0952696ca0a06d3af422
SHA5121eda5b16e36dd3a6117f7f30b28d72c2903d63fe32c97022e87ceb3511b741d18b7f30b24ba40cf38c6624f0ed20f6bdd90fbbf080a6e40fe7028c5345e6ed39
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
399KB
MD5b2952a282144c042f368121f3d991630
SHA11c5d07dcc869d0667a6225202b4f87380cc9de67
SHA256bc3ce9adeb97d068e11f11fe6219ff29fd6e17ed2e5c175a19bbd5071fc32358
SHA512db781e7a874e9d3c2d565dc4760e8ad0b013b1e78332e430590d638afa34aed1d160e22db8200807ddaacd8d38c356f2f922318ca319527a1f33c85e1329bc8c
-
Filesize
399KB
MD5b2952a282144c042f368121f3d991630
SHA11c5d07dcc869d0667a6225202b4f87380cc9de67
SHA256bc3ce9adeb97d068e11f11fe6219ff29fd6e17ed2e5c175a19bbd5071fc32358
SHA512db781e7a874e9d3c2d565dc4760e8ad0b013b1e78332e430590d638afa34aed1d160e22db8200807ddaacd8d38c356f2f922318ca319527a1f33c85e1329bc8c
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c