Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2023, 20:32
Static task
static1
General
-
Target
bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe
-
Size
4.1MB
-
MD5
304bcabb130a6deb19432197909f867f
-
SHA1
b3f510e964f4d6052488cc62dd09bbd3db9f6e44
-
SHA256
bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4
-
SHA512
3156fda1602d65e95d4ba25f368de32496a328d6e1b4c6b03cd73f6e340b32aadb881e31792eff86ec6981be5bf2a0d42d48c5a762afcad5c9994dcbe6dc3e33
-
SSDEEP
98304:Vjw8xaTpu9GvScnzu+AGtz75p1SdUNKlfR633v:VjwLTpdqcnxtzxSONt3f
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/3804-2-0x0000000003030000-0x000000000391B000-memory.dmp family_glupteba behavioral1/memory/3804-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3804-24-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3804-56-0x0000000003030000-0x000000000391B000-memory.dmp family_glupteba behavioral1/memory/3804-58-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1852-59-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1852-89-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1852-111-0x0000000002A90000-0x0000000002E90000-memory.dmp family_glupteba behavioral1/memory/1852-137-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1852-158-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3768-258-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3768-303-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3768-337-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3768-357-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3768-378-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3768-418-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4160 netsh.exe -
Executes dropped EXE 6 IoCs
pid Process 3768 csrss.exe 4128 injector.exe 4484 windefender.exe 716 tor.exe 2228 windefender.exe 4580 f801950a962ddba14caaa44bf084b55c.exe -
Loads dropped DLL 9 IoCs
pid Process 716 tor.exe 716 tor.exe 716 tor.exe 716 tor.exe 716 tor.exe 716 tor.exe 716 tor.exe 716 tor.exe 716 tor.exe -
resource yara_rule behavioral1/files/0x0006000000022e72-278.dat upx behavioral1/files/0x0006000000022e72-280.dat upx behavioral1/files/0x0006000000022e72-294.dat upx behavioral1/memory/4484-311-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2228-346-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2228-379-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x0009000000022e77-429.dat upx behavioral1/files/0x0009000000022e77-433.dat upx behavioral1/memory/2228-434-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe File created C:\Windows\rss\csrss.exe bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4868 sc.exe 5040 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2920 schtasks.exe 4740 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 716 powershell.exe 716 powershell.exe 716 powershell.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 416 powershell.exe 416 powershell.exe 416 powershell.exe 4568 powershell.exe 4568 powershell.exe 4568 powershell.exe 3968 powershell.exe 3968 powershell.exe 3968 powershell.exe 3028 powershell.exe 3028 powershell.exe 3028 powershell.exe 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 3768 csrss.exe 3768 csrss.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 3768 csrss.exe 3768 csrss.exe 4128 injector.exe 4128 injector.exe 3768 csrss.exe 3768 csrss.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe 3768 csrss.exe 3768 csrss.exe 4128 injector.exe 4128 injector.exe 4128 injector.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Token: SeImpersonatePrivilege 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe Token: SeDebugPrivilege 716 powershell.exe Token: SeDebugPrivilege 416 powershell.exe Token: SeDebugPrivilege 4568 powershell.exe Token: SeDebugPrivilege 3968 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 4272 powershell.exe Token: SeSystemEnvironmentPrivilege 3768 csrss.exe Token: SeSecurityPrivilege 4868 sc.exe Token: SeSecurityPrivilege 4868 sc.exe Token: SeSecurityPrivilege 5040 sc.exe Token: SeSecurityPrivilege 5040 sc.exe Token: SeDebugPrivilege 2536 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3804 wrote to memory of 3008 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 95 PID 3804 wrote to memory of 3008 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 95 PID 3804 wrote to memory of 3008 3804 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 95 PID 1852 wrote to memory of 716 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 102 PID 1852 wrote to memory of 716 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 102 PID 1852 wrote to memory of 716 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 102 PID 1852 wrote to memory of 4168 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 104 PID 1852 wrote to memory of 4168 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 104 PID 4168 wrote to memory of 4160 4168 cmd.exe 106 PID 4168 wrote to memory of 4160 4168 cmd.exe 106 PID 1852 wrote to memory of 416 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 107 PID 1852 wrote to memory of 416 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 107 PID 1852 wrote to memory of 416 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 107 PID 1852 wrote to memory of 4568 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 110 PID 1852 wrote to memory of 4568 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 110 PID 1852 wrote to memory of 4568 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 110 PID 1852 wrote to memory of 3768 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 113 PID 1852 wrote to memory of 3768 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 113 PID 1852 wrote to memory of 3768 1852 bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe 113 PID 3768 wrote to memory of 3968 3768 csrss.exe 114 PID 3768 wrote to memory of 3968 3768 csrss.exe 114 PID 3768 wrote to memory of 3968 3768 csrss.exe 114 PID 3768 wrote to memory of 3028 3768 csrss.exe 120 PID 3768 wrote to memory of 3028 3768 csrss.exe 120 PID 3768 wrote to memory of 3028 3768 csrss.exe 120 PID 3768 wrote to memory of 4272 3768 csrss.exe 122 PID 3768 wrote to memory of 4272 3768 csrss.exe 122 PID 3768 wrote to memory of 4272 3768 csrss.exe 122 PID 3768 wrote to memory of 4128 3768 csrss.exe 125 PID 3768 wrote to memory of 4128 3768 csrss.exe 125 PID 4484 wrote to memory of 4876 4484 windefender.exe 137 PID 4484 wrote to memory of 4876 4484 windefender.exe 137 PID 4484 wrote to memory of 4876 4484 windefender.exe 137 PID 4876 wrote to memory of 4868 4876 cmd.exe 138 PID 4876 wrote to memory of 4868 4876 cmd.exe 138 PID 4876 wrote to memory of 4868 4876 cmd.exe 138 PID 3768 wrote to memory of 3160 3768 csrss.exe 140 PID 3768 wrote to memory of 3160 3768 csrss.exe 140 PID 3768 wrote to memory of 3160 3768 csrss.exe 140 PID 3160 wrote to memory of 5040 3160 cmd.exe 142 PID 3160 wrote to memory of 5040 3160 cmd.exe 142 PID 3160 wrote to memory of 5040 3160 cmd.exe 142 PID 3768 wrote to memory of 2536 3768 csrss.exe 144 PID 3768 wrote to memory of 2536 3768 csrss.exe 144 PID 3768 wrote to memory of 2536 3768 csrss.exe 144 PID 3768 wrote to memory of 4580 3768 csrss.exe 146 PID 3768 wrote to memory of 4580 3768 csrss.exe 146 PID 3768 wrote to memory of 4580 3768 csrss.exe 146 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe"C:\Users\Admin\AppData\Local\Temp\bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe"C:\Users\Admin\AppData\Local\Temp\bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4160
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2920
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4740
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)4⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f5⤵PID:496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f5⤵PID:4440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:716
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
11KB
MD52d3908a115d467e37120870728782175
SHA1776547f20a0e8cde2228217620ce9ae6247bcbf5
SHA256f6876af59bd8043db766043c46046e8e4fcd6f247634a3124aecab747fa0e0d0
SHA512db905824db7d0edb81fc5ab70b7dca9e06d42a4d0d11cfa5dfdcd13f9db75e87c00ac61261505555aba91309fbebdde16f34a7cf9e5dcfaa9d0344d4044fafb8
-
Filesize
2.9MB
MD59d2bf6564d706a30fd2dee352a224a72
SHA1f9b5087564cd72f5e3b7b6b5040857d34fd74dc6
SHA2567c13ad178081e522d59be0338dd621dc7171d292d6dc059f673fe16bcb0b5ffd
SHA5120a3dc28c7fc4d42d3f90d1cf8137d6c0fd5790e7aaae7f178122f08d1ebb900efe0b2fba8e1a1d331d8f23879a3c89d23d007f7b36382f5c5c2d8aad4d2d3f96
-
Filesize
2.9MB
MD59d2bf6564d706a30fd2dee352a224a72
SHA1f9b5087564cd72f5e3b7b6b5040857d34fd74dc6
SHA2567c13ad178081e522d59be0338dd621dc7171d292d6dc059f673fe16bcb0b5ffd
SHA5120a3dc28c7fc4d42d3f90d1cf8137d6c0fd5790e7aaae7f178122f08d1ebb900efe0b2fba8e1a1d331d8f23879a3c89d23d007f7b36382f5c5c2d8aad4d2d3f96
-
Filesize
7.2MB
MD512fe4dfa1cf5fb4f13ce81fff60a74b2
SHA193ff6567da45fde574a17fdc916ef9d3c45cfe01
SHA256f8089441489fd769cd1fc1ddfce370407c1d238ec832f008d32ec0af433a00da
SHA512a97bfa6fcc1ae2fddd6c6a1d7e687f2edcea342e021d049977e0d8251c64e48b5da7885ba2176c83b1dcccb844b58684c2cf4bdc455424aee3a1625442198155
-
Filesize
20.7MB
MD5a58d9c9a17604125949ca877c80f06a7
SHA1efa9deb6b0d961ab142114df795aeb0d59fea34d
SHA256635f47ca6f0c0824334ec7550a7896afbac78b32c86f7dce309836a6df5e6f8d
SHA51233703975395722568c148619551658734e769e885c91a5eba1757eb67e46efa93814ea193177789ee4d1356855ffb2edd65af69a3cb29fbc3f4c6be63617510e
-
Filesize
3.8MB
MD5c72911dec6ae8c4bc62bb2a6a21ba85b
SHA10ae7077313a53103c2b32100d74aafc04216289d
SHA2567e777efc194ea9788171636085b19875d19397d3249fbb88136534037a3dc38f
SHA51299dc9761ad69f5508d96a2362b930728d451f5ddcf7bb1e210ec5b0f14ee00ee71efaaab150ffa16a2f92fbbb1e2a6b5cd92d51721996df7ac794491c441c304
-
Filesize
5.6MB
MD5ed2f9b19dd1584d7e26f5ba460ef2fbf
SHA1dcbf1789bf1eeb03276b830cb2ab92bcf779d97f
SHA256f11bd1d7546cad00b6db0a1594f3ac1daf9f541004fd7efb5414e068693d6add
SHA512dcfc780d1e34968390969b64ea2091b630c8eec94ac4724a4103a003a2f31545c3791a39f514517153538b4d3f5c50b6bfba74cc9cf8c0b1b5daba0a4849c856
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
701KB
MD5f1bcc8bd3200845993211eb807f33e56
SHA1d25274e36e79d8e50a446b1144d8b6f2b2cf309b
SHA2567cd199bbf3bfe19182c5eca3a080a7e93cec0d30cbd872a305c92bc9282a7399
SHA512397ba6b995aebce54b95c7f3abd3c64ae2c5ab3d01fb38185f8fccad82cac335e2f0666fc47b73d3a3a4af9b5a5ce311e4963841616f4d38b03e1bc16355b5bb
-
Filesize
497KB
MD5f963552b851fde3834405bb98bae0c36
SHA1822c7d7988ac28aca080dbc9c26f98416f67124f
SHA25636c66cfc6e9663bdd2cdc54a1253a8c26c837ca0bd8c52769b5820641c18d4c3
SHA512b301df8740e07c1032e959e563842d568916f7165f72c459c0ffcbe1a717b0886be1d2ef8b992875392a09983ae9e35e7481b29c213a18ee15b335a9849cf39b
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
3KB
MD5ef039e0defe9cd76a3048f0325f321a2
SHA1df1a3ea55a4be9864803e1794965458272d3ebf0
SHA2564c2aa33f38beea522eaf341755ba85c9a7aeecb06281c99a5ed0a0d683830132
SHA512e2b47a4af6d970c6c5acfdca41731212b5476fcdfd98e8c09474dc2802bf36fa901e22d76149d6167aae2c53fa1b7ffe2c8fbe2723093bd313e9d17783d27c53
-
Filesize
1.0MB
MD58a574c633eb3c8b7d209b5940ebf731b
SHA1e835c5668ad1437cebdbd56bc7923c3683e8b9ad
SHA256bfd8dd86a41bc05beea0f240c35e88bd42abada70eff4741717901d1b55bfb28
SHA512085ee9d9c52fd5f6ff2095727d9e3b1d27c5b2d3ab54ca11149954a4b031296c9cf9c81457a2df8eba916336cdef4ea2bd39cf98d4ad19ab78e53ac85b6d6dec
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
2.9MB
MD59d2bf6564d706a30fd2dee352a224a72
SHA1f9b5087564cd72f5e3b7b6b5040857d34fd74dc6
SHA2567c13ad178081e522d59be0338dd621dc7171d292d6dc059f673fe16bcb0b5ffd
SHA5120a3dc28c7fc4d42d3f90d1cf8137d6c0fd5790e7aaae7f178122f08d1ebb900efe0b2fba8e1a1d331d8f23879a3c89d23d007f7b36382f5c5c2d8aad4d2d3f96
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
4KB
MD530978bef24990c1f7d18790c560e42b7
SHA1a36dd7763d5cf22ec701e466e7e35b8a1726acdd
SHA256196d6f2071883f3277892f9877be57c11c9c55515fc4da42c86c17d10098827e
SHA512fe9a54ab70b51f02eec181756367be91cec6d35d6c32f7617ba93a426a4d04768be72853bb965d00f7dfc146ca46e75d258f42cc73a16218807539c7ea7274a0
-
Filesize
227B
MD517c2994d6a89cb7d277f1b3f0b49e5ed
SHA12a72ffc34cb2a7d7d3057f4725f2ac660a809158
SHA25638ad4c6fb403fc2d5dc0dc83a165983a3fb426e0a850847fefc35e62a5ced67f
SHA512d145ea667f70ed08b12d44228aea09cab637dd1acee131b919f22efdd4730b0c18daa0c83b196f5efa2082cf8f90bcd618b7c7efaab79ca5f0478ade0aca4728
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD531f24b58de478954f060ca32ba172446
SHA1fefd4ee5ee599daa4a0943818d1cb647a140e3e8
SHA256c37b890168a24ce06c4fb4eb144774737be81a0ed83b02b4b976412ea2609f89
SHA512c2d2867290ba128494c18033cc36dbe4198315234b254a1524326609640036f1f55fcdd9ad1bcd169cfe03d82efbdbe7398f0e6dd4f68a137b6e24ea94408dc2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55583797f05616f4e100b9ffd16449415
SHA188429e101c947563614b61a69240ac2ec349496c
SHA256d2f813346195c7fdccb9973b987aa6e454e7f5ae82089d4a6d05ba9c06bb0a05
SHA512cc0c460507ec03b26a965b4cdb59eca4c9cafc191d7bffe1b2956b909fd55a6cc7a93477e4bf4869cc7e0155f1fcfc9f40de0084cf93a56af5eceec8343bff53
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a32f89da513d7168e452917bcf9d710f
SHA185a7d2ab6344b9f4788cf39a967706a04963cfc8
SHA2568fe38de416fa029537b0d368809bf607785f8ad4f0467bad14d22faede1db45e
SHA51276c8d4a56cdc6f9e54c986518f7deee0539f03dcf1bd7246bfbc40e132172bc178f73ab0e96628e7429a648c4cdf15f6bb9f07531e533b041790d58593f9e834
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f811e98e37c4e21ab352ee86ad21f0bb
SHA104ccc823f6ec1de458f840f70d7f407e258b7b05
SHA256c61c7705ee8197fc515e60d65749af5ab28dd1d0618215a23d66ef980ae3c6b9
SHA512a7e8e75a949b35a34895874bde64001fecfff9b97c5c4a78b6d6edce8c43ba7486cafd8947f2a6d45efe42fa3e2dc092f23c64bd24848632a2d88e31394184bf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD553a7fb45cfccbcefc98c66b9a9eaa9a5
SHA19da1ea9e2e65646f52d1352962eec8e91e45fb7d
SHA25668426f8059bb76415217a940f73121a213d0208f32201411dd6fde1d22eaaa34
SHA51239a13cb7dc089fb045d75c82478e574a3876c287a8aafb0f9b1ba4eedb763f8cbcc1995ed97f33d3a87bb28c8e8c97f1d0bba543d050ca1a5bd955e459163e76
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d12c7516764af4067caa72ab07f8ca1c
SHA1d1f3fbb4847543f92238fbeaa0c8f826d511c014
SHA2562c52ee289895abae80a673a722c7347ec88ae9687c56dfd37ad70f6151df154f
SHA512bc3ba43ba5c32750e7db55262d2276a077f0434630dfee87c9bdc65562fdcaec4600a4cd530406fc2b2e128a881dbe1953e0fbaa9604b228c5094a28206cd79f
-
Filesize
4.1MB
MD5304bcabb130a6deb19432197909f867f
SHA1b3f510e964f4d6052488cc62dd09bbd3db9f6e44
SHA256bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4
SHA5123156fda1602d65e95d4ba25f368de32496a328d6e1b4c6b03cd73f6e340b32aadb881e31792eff86ec6981be5bf2a0d42d48c5a762afcad5c9994dcbe6dc3e33
-
Filesize
4.1MB
MD5304bcabb130a6deb19432197909f867f
SHA1b3f510e964f4d6052488cc62dd09bbd3db9f6e44
SHA256bf6e5129c778f9c9d019e56fdccc68c135a42bcb27257c4d822d584e237416b4
SHA5123156fda1602d65e95d4ba25f368de32496a328d6e1b4c6b03cd73f6e340b32aadb881e31792eff86ec6981be5bf2a0d42d48c5a762afcad5c9994dcbe6dc3e33
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec