Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
14-11-2023 01:00
Static task
static1
Behavioral task
behavioral1
Sample
9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe
Resource
win10-20231020-en
General
-
Target
9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe
-
Size
1.2MB
-
MD5
a07610d7ac18e361bcc73f7c1e3b42c1
-
SHA1
b72a528d1e77da662f660ce9aaf049f633b5eb02
-
SHA256
9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a
-
SHA512
07986f42ae0210dbf215cb9d4f6498162b1c1788beff0af70e55861495455f2f15cd228dc407c637a8a27119d1def4631af2d19d1f3a92cac2ec053ce9601bdb
-
SSDEEP
24576:eydr7U2U2Tc+NeRfD82Kfr+RSn5yuWJ//0gJdi3D+bw:tu+YEeRfI2mSm5yFJ/nPf
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3724-48-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/3724-53-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/3724-54-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/3724-56-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/760-852-0x00000000053E0000-0x000000000545D000-memory.dmp family_zgrat_v1 -
Glupteba payload 5 IoCs
resource yara_rule behavioral1/memory/1360-160-0x0000000002FA0000-0x000000000388B000-memory.dmp family_glupteba behavioral1/memory/1360-161-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1360-245-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1360-575-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4500-747-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6Gb5kN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6Gb5kN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6Gb5kN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6Gb5kN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6Gb5kN7.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral1/memory/4696-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/files/0x000a00000001ac05-127.dat family_redline behavioral1/files/0x000a00000001ac05-129.dat family_redline behavioral1/memory/4592-132-0x0000000000010000-0x000000000002E000-memory.dmp family_redline behavioral1/files/0x000800000001ac1a-584.dat family_redline behavioral1/files/0x000800000001ac1a-583.dat family_redline behavioral1/memory/4280-586-0x0000000000790000-0x00000000007CE000-memory.dmp family_redline behavioral1/memory/4944-720-0x0000000000560000-0x00000000005BA000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001ac05-127.dat family_sectoprat behavioral1/files/0x000a00000001ac05-129.dat family_sectoprat behavioral1/memory/4592-132-0x0000000000010000-0x000000000002E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1640 netsh.exe -
.NET Reactor proctector 20 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2792-74-0x0000000002080000-0x00000000020A0000-memory.dmp net_reactor behavioral1/memory/2792-76-0x0000000002320000-0x000000000233E000-memory.dmp net_reactor behavioral1/memory/2792-78-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-79-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-81-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-83-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-87-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-85-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-89-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-91-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-95-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-93-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-97-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-99-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-109-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-107-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-105-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-103-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/2792-101-0x0000000002320000-0x0000000002339000-memory.dmp net_reactor behavioral1/memory/760-852-0x00000000053E0000-0x000000000545D000-memory.dmp net_reactor -
Executes dropped EXE 21 IoCs
pid Process 4900 Hd9In64.exe 3920 Js9LV27.exe 916 Aw1Fg24.exe 1472 2wm1893.exe 5100 3hY45iH.exe 5004 4Jw422oZ.exe 64 5jH1Cp0.exe 2792 6Gb5kN7.exe 2120 500F.exe 4592 5271.exe 4960 InstallSetup5.exe 1708 toolspub2.exe 1360 31839b57a4f11171d6abc8bbc4451ee4.exe 4488 Broom.exe 2672 toolspub2.exe 4500 31839b57a4f11171d6abc8bbc4451ee4.exe 4016 AF48.exe 4280 B247.exe 4388 C468.exe 4944 C796.exe 760 CA75.exe -
Loads dropped DLL 1 IoCs
pid Process 4388 C468.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000600000001ac48-4467.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6Gb5kN7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6Gb5kN7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Hd9In64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Js9LV27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Aw1Fg24.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1472 set thread context of 4696 1472 2wm1893.exe 77 PID 5100 set thread context of 3724 5100 3hY45iH.exe 80 PID 5004 set thread context of 4128 5004 4Jw422oZ.exe 85 PID 1708 set thread context of 2672 1708 toolspub2.exe 95 PID 4016 set thread context of 4540 4016 AF48.exe 110 PID 4388 set thread context of 2640 4388 C468.exe 111 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4800 sc.exe 804 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5084 3724 WerFault.exe 80 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5jH1Cp0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5jH1Cp0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5jH1Cp0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe 2336 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 64 5jH1Cp0.exe 64 5jH1Cp0.exe 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 2792 6Gb5kN7.exe 2792 6Gb5kN7.exe 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found 3264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3264 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 64 5jH1Cp0.exe 2672 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeDebugPrivilege 2792 6Gb5kN7.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeDebugPrivilege 4592 5271.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeDebugPrivilege 2720 powershell.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeDebugPrivilege 1360 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1360 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeDebugPrivilege 4860 powershell.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeDebugPrivilege 4280 B247.exe Token: SeDebugPrivilege 760 CA75.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found Token: SeDebugPrivilege 4944 C796.exe Token: SeShutdownPrivilege 3264 Process not Found Token: SeCreatePagefilePrivilege 3264 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4488 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 4900 1216 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe 71 PID 1216 wrote to memory of 4900 1216 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe 71 PID 1216 wrote to memory of 4900 1216 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe 71 PID 4900 wrote to memory of 3920 4900 Hd9In64.exe 72 PID 4900 wrote to memory of 3920 4900 Hd9In64.exe 72 PID 4900 wrote to memory of 3920 4900 Hd9In64.exe 72 PID 3920 wrote to memory of 916 3920 Js9LV27.exe 73 PID 3920 wrote to memory of 916 3920 Js9LV27.exe 73 PID 3920 wrote to memory of 916 3920 Js9LV27.exe 73 PID 916 wrote to memory of 1472 916 Aw1Fg24.exe 75 PID 916 wrote to memory of 1472 916 Aw1Fg24.exe 75 PID 916 wrote to memory of 1472 916 Aw1Fg24.exe 75 PID 1472 wrote to memory of 4160 1472 2wm1893.exe 76 PID 1472 wrote to memory of 4160 1472 2wm1893.exe 76 PID 1472 wrote to memory of 4160 1472 2wm1893.exe 76 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 1472 wrote to memory of 4696 1472 2wm1893.exe 77 PID 916 wrote to memory of 5100 916 Aw1Fg24.exe 78 PID 916 wrote to memory of 5100 916 Aw1Fg24.exe 78 PID 916 wrote to memory of 5100 916 Aw1Fg24.exe 78 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 5100 wrote to memory of 3724 5100 3hY45iH.exe 80 PID 3920 wrote to memory of 5004 3920 Js9LV27.exe 81 PID 3920 wrote to memory of 5004 3920 Js9LV27.exe 81 PID 3920 wrote to memory of 5004 3920 Js9LV27.exe 81 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 5004 wrote to memory of 4128 5004 4Jw422oZ.exe 85 PID 4900 wrote to memory of 64 4900 Hd9In64.exe 86 PID 4900 wrote to memory of 64 4900 Hd9In64.exe 86 PID 4900 wrote to memory of 64 4900 Hd9In64.exe 86 PID 1216 wrote to memory of 2792 1216 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe 87 PID 1216 wrote to memory of 2792 1216 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe 87 PID 1216 wrote to memory of 2792 1216 9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe 87 PID 3264 wrote to memory of 2120 3264 Process not Found 88 PID 3264 wrote to memory of 2120 3264 Process not Found 88 PID 3264 wrote to memory of 2120 3264 Process not Found 88 PID 3264 wrote to memory of 4592 3264 Process not Found 89 PID 3264 wrote to memory of 4592 3264 Process not Found 89 PID 3264 wrote to memory of 4592 3264 Process not Found 89 PID 2120 wrote to memory of 4960 2120 500F.exe 91 PID 2120 wrote to memory of 4960 2120 500F.exe 91 PID 2120 wrote to memory of 4960 2120 500F.exe 91 PID 2120 wrote to memory of 1708 2120 500F.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe"C:\Users\Admin\AppData\Local\Temp\9239fbd8d1a3f690c548416c61b5b7502787a8cda9b789db4f008805b8d6763a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hd9In64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hd9In64.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Js9LV27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Js9LV27.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aw1Fg24.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aw1Fg24.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2wm1893.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2wm1893.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3hY45iH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3hY45iH.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 5687⤵
- Program crash
PID:5084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Jw422oZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Jw422oZ.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5jH1Cp0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5jH1Cp0.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:64
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Gb5kN7.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Gb5kN7.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\500F.exeC:\Users\Admin\AppData\Local\Temp\500F.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5088
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1640
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4364
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:2828
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4888
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2668
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:3900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:2936
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2336
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:1248
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2836
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3800
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5271.exeC:\Users\Admin\AppData\Local\Temp\5271.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
C:\Users\Admin\AppData\Local\Temp\AF48.exeC:\Users\Admin\AppData\Local\Temp\AF48.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\B247.exeC:\Users\Admin\AppData\Local\Temp\B247.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Users\Admin\AppData\Local\Temp\C468.exeC:\Users\Admin\AppData\Local\Temp\C468.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\C796.exeC:\Users\Admin\AppData\Local\Temp\C796.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
C:\Users\Admin\AppData\Local\Temp\CA75.exeC:\Users\Admin\AppData\Local\Temp\CA75.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:760
-
C:\Users\Admin\AppData\Local\Temp\3E00.exeC:\Users\Admin\AppData\Local\Temp\3E00.exe1⤵PID:4796
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵PID:4344
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5daa8e49b3ee5777c041cf6a67055fd24
SHA16dace6d44e47fca9fd1fcfe89a7e6a3af82e1747
SHA256f593ea482a61530d7ce3c0801e743bdf3f60861fb26e77a8da359c8e9c104a1c
SHA5124fb9e34eb52d25660ceb85c290d680b008e6eb6928c1144b15e9520a1a37470fac8e58b6d88fd2508da27df6f6eb6e114d7a0f6b3029b88d29c6225bc5feac63
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
15.3MB
MD5e2d9ea8f72bc239d7372048430301e5e
SHA1602c740f6497656c7952d65441ea36f623f588cb
SHA256564ad08d79345be7121e76d778719928ddb37af7208368ca6dfcb703bc7168f4
SHA5122f1394f494639b74f70238d3c893a99b1faa388a7c0aeb3c114fb09ac5717a7ee703b06e0a3ec1ebac9c0cfdade31951cb47b73e52865f520e2d342330692b39
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
460KB
MD517c8b1be1c8c7812785bbb6defd10b87
SHA19beeb094b86af6b7d43a144c43b7173c60cebf5d
SHA25637bdb80672fbdb644974eb46f5b7f8a8a074712f5687cdeb416f15dbe825ab6a
SHA5126772165edbb4468bc613a0ae59a83f1f27a955bf020a4d144140689175b5b9c1fae76e24ae56fefd438955879525f269a8d4f139ca8de6280986477135897b9f
-
Filesize
460KB
MD517c8b1be1c8c7812785bbb6defd10b87
SHA19beeb094b86af6b7d43a144c43b7173c60cebf5d
SHA25637bdb80672fbdb644974eb46f5b7f8a8a074712f5687cdeb416f15dbe825ab6a
SHA5126772165edbb4468bc613a0ae59a83f1f27a955bf020a4d144140689175b5b9c1fae76e24ae56fefd438955879525f269a8d4f139ca8de6280986477135897b9f
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1014KB
MD5d92baa732a71e2c1ccce8f573c090039
SHA12280262403ce346160cc2956553e93e53cf0e908
SHA256faa911d18c888739066d2fdbe1b56c1279b98a1102981d4e7c2394f5b7a63456
SHA5124bda2470cee516424324706a807e6e04f5ac81b114b5f7794de36946d9dd1a3671ad621793e09149d416b1135238fcc389c12f549dfd17b0939930e9b404598a
-
Filesize
1014KB
MD5d92baa732a71e2c1ccce8f573c090039
SHA12280262403ce346160cc2956553e93e53cf0e908
SHA256faa911d18c888739066d2fdbe1b56c1279b98a1102981d4e7c2394f5b7a63456
SHA5124bda2470cee516424324706a807e6e04f5ac81b114b5f7794de36946d9dd1a3671ad621793e09149d416b1135238fcc389c12f549dfd17b0939930e9b404598a
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
889KB
MD5b1c372b5070c5afbaa05c74c7817d1a8
SHA1d9cddb42ac89150a43d1e35a50bfb21a0b40392d
SHA256d5e88ec895c473e21ce07349e6bef7ad22d6cd922e5546f655938e2353494567
SHA512b19be6ac2e39d56c26c342c75436b8f8b0f27119722221231cf4ad8435b87e67b1126c1d2875d0a12bf80668a2660cfa6ead50c1e4f0fcee3ab32fe8f31772b7
-
Filesize
889KB
MD5b1c372b5070c5afbaa05c74c7817d1a8
SHA1d9cddb42ac89150a43d1e35a50bfb21a0b40392d
SHA256d5e88ec895c473e21ce07349e6bef7ad22d6cd922e5546f655938e2353494567
SHA512b19be6ac2e39d56c26c342c75436b8f8b0f27119722221231cf4ad8435b87e67b1126c1d2875d0a12bf80668a2660cfa6ead50c1e4f0fcee3ab32fe8f31772b7
-
Filesize
724KB
MD5fc391c6e6a15001f38cb01c3bc946cdb
SHA16e50bed78f1a3a70f264d20f22489f170de1dee5
SHA25667d47c70f9c0397bd1831b490fd1f90d4fd57c2a9642bbf678bb283c17acb508
SHA512d4b33dae48b7eee018ff42a991ed5c451d77e18f6f0b3a78b51dadc467e75d096b78819af4c41bbe4c619a6e3abd29ca02b248137558923185b37a3721ef5560
-
Filesize
724KB
MD5fc391c6e6a15001f38cb01c3bc946cdb
SHA16e50bed78f1a3a70f264d20f22489f170de1dee5
SHA25667d47c70f9c0397bd1831b490fd1f90d4fd57c2a9642bbf678bb283c17acb508
SHA512d4b33dae48b7eee018ff42a991ed5c451d77e18f6f0b3a78b51dadc467e75d096b78819af4c41bbe4c619a6e3abd29ca02b248137558923185b37a3721ef5560
-
Filesize
426KB
MD5f8babbce1f2db35c880e92bdf3164377
SHA19cce2f37912adb57f06292ea6476712fec920af5
SHA2561a4dc8e360296d8949911c2ad0d186ee259e1b0146ca6bc5869e20c5f9baf767
SHA512fe7e25e8e22046b5fbe7fc92220494635bd26bebadf9d2026981e4a3a406750d52935cfbb7dbccd0f04205bb0b7e04bb33034886bf9d7a4d9445ecf0978dff54
-
Filesize
426KB
MD5f8babbce1f2db35c880e92bdf3164377
SHA19cce2f37912adb57f06292ea6476712fec920af5
SHA2561a4dc8e360296d8949911c2ad0d186ee259e1b0146ca6bc5869e20c5f9baf767
SHA512fe7e25e8e22046b5fbe7fc92220494635bd26bebadf9d2026981e4a3a406750d52935cfbb7dbccd0f04205bb0b7e04bb33034886bf9d7a4d9445ecf0978dff54
-
Filesize
415KB
MD5cc5b199fdf5c5c9ad7206952db385a44
SHA11362a9091d9f17649bc95400bbd8d6dae33979d6
SHA2562ba60edcdb1043ae9d4e737b306a4047bea61fd60ba176bd3ef199ea010cfd1c
SHA512a4ee6a9751871c2cdaab0c434a90c842e9a5e0886dc76f994cef4ab358816e630ccaacc5f5c5a0367f0c2f3aae3fc50fabaa2e9071525c7f1bcf6a0e84dd45a6
-
Filesize
415KB
MD5cc5b199fdf5c5c9ad7206952db385a44
SHA11362a9091d9f17649bc95400bbd8d6dae33979d6
SHA2562ba60edcdb1043ae9d4e737b306a4047bea61fd60ba176bd3ef199ea010cfd1c
SHA512a4ee6a9751871c2cdaab0c434a90c842e9a5e0886dc76f994cef4ab358816e630ccaacc5f5c5a0367f0c2f3aae3fc50fabaa2e9071525c7f1bcf6a0e84dd45a6
-
Filesize
378KB
MD510a25be6ab5b2097f4a3f5fcf6922c46
SHA12aa600015a7c0364690dc86541d6e831037fc7d3
SHA25658a8518054c51d8a56f8b2c22a2b7ef5203f5843911ea495cf6fa73c8fcf179e
SHA5128ce27d15bd3ce2c86d3629b7e247155ceb22592c738c456f51e1d7e9c64bb7594c1aedd6f59437434a74a97baa1aa25e6e6a9742752dc77d0cf2870397cac15b
-
Filesize
378KB
MD510a25be6ab5b2097f4a3f5fcf6922c46
SHA12aa600015a7c0364690dc86541d6e831037fc7d3
SHA25658a8518054c51d8a56f8b2c22a2b7ef5203f5843911ea495cf6fa73c8fcf179e
SHA5128ce27d15bd3ce2c86d3629b7e247155ceb22592c738c456f51e1d7e9c64bb7594c1aedd6f59437434a74a97baa1aa25e6e6a9742752dc77d0cf2870397cac15b
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2.9MB
MD5374c73bc5428c9e2ab94a62702bfa633
SHA1061dae0a05be1f6be620fedca38362af042ace1a
SHA256662a72f5627e80cc48d9867f595b49f5bd585c9198090e4b80e253ccccb97ec6
SHA512d316ff0da39d7748699a2ebd16cafdb7652f22c629898b7e8eb0c0d88ec644ea8695f9fbb4c6cd80a4f8d632ba847165da55cba03ff53e5585974622c1dab2e9
-
Filesize
6.1MB
MD5ed89b0b10cde4d5617a60210d71250ac
SHA1c6d6ec4badb7c9451d5f69be9e56ab4ce120fdbd
SHA256b6dfa77f7accedddfd20aa8f0cc315554759f0f2b52386daf646585f6a22de24
SHA5127df5f6656d913c5cd70473a7f610e47c17d88ac1c217e022e787d3d75c82a829220dea63fa51783440abf94c69d9e68f20613896157164f83e0fc110962e9688
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD55be96e311859379e2bf53d4ca9b3292c
SHA17da91b40529fcba8bc68442aa06ea9491fdbb824
SHA256c46a65bf3fc90038a2d876d103dbe658259594e90fddc223951cddb9ac9af99c
SHA512a39d3c2c45deb0509ffeab971b096a90748f0fa6e3f1bacea6f8c9dfcae985ad1b45d5d48306ce06d065e92063e8156fea44c0a87e9ca99bae6838fd53edb057
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize41KB
MD50f38a17bbaa7b6f75f51c671be981097
SHA1ee95e5225cfb623b6ddd58902bf72504993e2030
SHA25603f4d293b34e18f429d34282179a04a705d448f3b88b88982486997f6cd51f39
SHA512429100ae213ea857fa3fefea7b512bb616219f76cf2a55a4735776650806d42582ff886cd4779a1406d2bc9d0f514c93e40c3d12d9e764ffa8b880067bd704a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53bf4ae8c1f9c8ce1c5316234d5401f9a
SHA1e43c7d2e04b731e01ed985c216a6974417592275
SHA2567701bd689099339b9f62c2bc4ab365e1c47105614e6dac1a6a043ecc98f49b79
SHA512fb5d09c175a385b6bd486bfd1808cd675526f40123dff6e267c73dcca3cf68311827bf1c0a99a7733adb84ddb362166b10a2ddf06779c24c80cc7bad18b9fc15
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD5df13fb082fe59ff3a3e1e8441afdf750
SHA11faedddb7952e70f63619bcee86333bc13d11b9b
SHA2562a3c71748f8249f6f399e6c9ac4d7a82cf3314515bcd65478d6a83b0e1e68d2f
SHA5127943162960f33548249d474f013091b1ee4afe2107014958337a961a6b08139c0aaef45ce8bcc5d55ebb549c9175a5ae8c66c61a9f735238a3033c7ec832fdb8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD55cef0ab21f52f6868b99fcca2c3f8163
SHA1fde158d7ad5d42cb9b70cbb3da7dde19e36b85c1
SHA2566eb0a5a3318422ba65d5fcda8f7bb91ed7857d5bd1f58862a5140ec716f0dcb9
SHA5120a1e5db8bd0d2f34e22d99869e56f91e8c243570272efb941b341226678970c8c642e57705eacd1bdb81a74a60443491923c809a2ea532f1ad46b26fb6cbd421
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD59e5ce6c9fc795a667cc675b71063ddcc
SHA106707c52d075d6eefab0562ba2cdc2fda9268092
SHA2568efacbd6cf8e99bef87788bd1c8f7b606155a0ad20940bc03988222b3e426cb0
SHA512745497d0ac599aba2f8ad56353ffae2a07ef1e2cb988a1c8baf972bdcccca6f90d6d86cd0ddb4551a5162e805daf5645c99fa002ab0c5b1ede3c870ac1cf739f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD57078a3e612e9e9f1d8497742abb2abf3
SHA133f2f06b08574aa807617b135d155f3ffa5ceabd
SHA256f9949a77a1aafd89636f0014ebb583b73ea458359431b4ad2cef9e341394a3c8
SHA512dad8f8c66a0bec692fad099aca434c77bca0470d84edf5b5e8f4735e41d86236939862521b8372551b8463809b770b2bdac401b749a8fb5bc6ab8dc2c8533e19
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba