Analysis
-
max time kernel
113s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 04:39
Static task
static1
Behavioral task
behavioral1
Sample
f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe
Resource
win10v2004-20231020-en
General
-
Target
f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe
-
Size
1.2MB
-
MD5
afc0fba8d09836dede2e67fc91967903
-
SHA1
5181102143b6da9bd6e5a09961d85f5d8e3ace07
-
SHA256
f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3
-
SHA512
145ea6f580248b28d84261bbf470aadf6801254cea22ce194564bf41250e809d0635be50efba10ec482c2318b5eadf1796b4c4bb58ed012a2b27a2e1c97097f9
-
SSDEEP
24576:ZyM1bRSXmqLy/68RorH+ZxmZ11A1BhpWvwSSAT7DfBC:MM7SWqkRor+K11Avs73Lf
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4412-42-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/4412-43-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/4412-44-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/4412-46-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
Glupteba payload 4 IoCs
resource yara_rule behavioral1/memory/5044-161-0x0000000002DF0000-0x00000000036DB000-memory.dmp family_glupteba behavioral1/memory/5044-162-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/5044-348-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1868-473-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6Hs0Zi9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6Hs0Zi9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6Hs0Zi9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6Hs0Zi9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6Hs0Zi9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6Hs0Zi9.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/3496-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/files/0x0009000000022e38-117.dat family_redline behavioral1/files/0x0009000000022e38-119.dat family_redline behavioral1/memory/4360-120-0x0000000000F80000-0x0000000000F9E000-memory.dmp family_redline behavioral1/files/0x000a000000022e64-403.dat family_redline behavioral1/files/0x000a000000022e64-404.dat family_redline behavioral1/memory/3816-443-0x0000000000470000-0x00000000004CA000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000022e38-117.dat family_sectoprat behavioral1/files/0x0009000000022e38-119.dat family_sectoprat behavioral1/memory/4360-120-0x0000000000F80000-0x0000000000F9E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4632 netsh.exe -
.NET Reactor proctector 20 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/3296-68-0x00000000023C0000-0x00000000023E0000-memory.dmp net_reactor behavioral1/memory/3296-72-0x0000000004A80000-0x0000000004A90000-memory.dmp net_reactor behavioral1/memory/3296-73-0x0000000002540000-0x000000000255E000-memory.dmp net_reactor behavioral1/memory/3296-74-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-75-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-77-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-79-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-81-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-83-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-85-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-87-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-89-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-91-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-93-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-95-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-97-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-99-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-101-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-103-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor behavioral1/memory/3296-105-0x0000000002540000-0x0000000002559000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation C04D.exe -
Executes dropped EXE 22 IoCs
pid Process 4668 if0Uw43.exe 2904 Uw8iM87.exe 2100 qt4tU39.exe 1544 2qq8273.exe 4344 3WH42JP.exe 796 4TH596xp.exe 4236 5al5Ip4.exe 3296 6Hs0Zi9.exe 1964 C04D.exe 4360 C4D3.exe 2024 InstallSetup5.exe 3476 BD1.exe 5044 31839b57a4f11171d6abc8bbc4451ee4.exe 1096 Broom.exe 2516 toolspub2.exe 1868 31839b57a4f11171d6abc8bbc4451ee4.exe 4980 8C2.exe 3476 BD1.exe 4160 14CA.exe 3816 1836.exe 5116 csrss.exe 1316 4E6A.exe -
Loads dropped DLL 1 IoCs
pid Process 4160 14CA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6Hs0Zi9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6Hs0Zi9.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Uw8iM87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" qt4tU39.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" if0Uw43.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1544 set thread context of 3496 1544 2qq8273.exe 105 PID 4344 set thread context of 4412 4344 3WH42JP.exe 108 PID 796 set thread context of 3712 796 4TH596xp.exe 118 PID 3476 set thread context of 2516 3476 BD1.exe 129 PID 4160 set thread context of 3992 4160 14CA.exe 147 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2820 sc.exe 3832 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1824 4412 WerFault.exe 108 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5al5Ip4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5al5Ip4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5al5Ip4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2136 schtasks.exe 4924 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4236 5al5Ip4.exe 4236 5al5Ip4.exe 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3268 Process not Found 3296 6Hs0Zi9.exe 3296 6Hs0Zi9.exe 3268 Process not Found 3268 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3268 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4236 5al5Ip4.exe 2516 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 3296 6Hs0Zi9.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 4360 C4D3.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 1416 powershell.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 5044 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 5044 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 3940 powershell.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 3476 BD1.exe Token: SeDebugPrivilege 3816 1836.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 3812 powershell.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 3960 powershell.exe Token: SeShutdownPrivilege 3268 Process not Found Token: SeCreatePagefilePrivilege 3268 Process not Found Token: SeDebugPrivilege 4580 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 Broom.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3268 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4668 4348 f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe 87 PID 4348 wrote to memory of 4668 4348 f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe 87 PID 4348 wrote to memory of 4668 4348 f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe 87 PID 4668 wrote to memory of 2904 4668 if0Uw43.exe 89 PID 4668 wrote to memory of 2904 4668 if0Uw43.exe 89 PID 4668 wrote to memory of 2904 4668 if0Uw43.exe 89 PID 2904 wrote to memory of 2100 2904 Uw8iM87.exe 90 PID 2904 wrote to memory of 2100 2904 Uw8iM87.exe 90 PID 2904 wrote to memory of 2100 2904 Uw8iM87.exe 90 PID 2100 wrote to memory of 1544 2100 qt4tU39.exe 91 PID 2100 wrote to memory of 1544 2100 qt4tU39.exe 91 PID 2100 wrote to memory of 1544 2100 qt4tU39.exe 91 PID 1544 wrote to memory of 2740 1544 2qq8273.exe 104 PID 1544 wrote to memory of 2740 1544 2qq8273.exe 104 PID 1544 wrote to memory of 2740 1544 2qq8273.exe 104 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 1544 wrote to memory of 3496 1544 2qq8273.exe 105 PID 2100 wrote to memory of 4344 2100 qt4tU39.exe 106 PID 2100 wrote to memory of 4344 2100 qt4tU39.exe 106 PID 2100 wrote to memory of 4344 2100 qt4tU39.exe 106 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 4344 wrote to memory of 4412 4344 3WH42JP.exe 108 PID 2904 wrote to memory of 796 2904 Uw8iM87.exe 109 PID 2904 wrote to memory of 796 2904 Uw8iM87.exe 109 PID 2904 wrote to memory of 796 2904 Uw8iM87.exe 109 PID 796 wrote to memory of 2756 796 4TH596xp.exe 115 PID 796 wrote to memory of 2756 796 4TH596xp.exe 115 PID 796 wrote to memory of 2756 796 4TH596xp.exe 115 PID 796 wrote to memory of 1228 796 4TH596xp.exe 116 PID 796 wrote to memory of 1228 796 4TH596xp.exe 116 PID 796 wrote to memory of 1228 796 4TH596xp.exe 116 PID 796 wrote to memory of 2624 796 4TH596xp.exe 117 PID 796 wrote to memory of 2624 796 4TH596xp.exe 117 PID 796 wrote to memory of 2624 796 4TH596xp.exe 117 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 796 wrote to memory of 3712 796 4TH596xp.exe 118 PID 4668 wrote to memory of 4236 4668 if0Uw43.exe 119 PID 4668 wrote to memory of 4236 4668 if0Uw43.exe 119 PID 4668 wrote to memory of 4236 4668 if0Uw43.exe 119 PID 4348 wrote to memory of 3296 4348 f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe 120 PID 4348 wrote to memory of 3296 4348 f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe 120 PID 4348 wrote to memory of 3296 4348 f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe 120 PID 3268 wrote to memory of 1964 3268 Process not Found 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe"C:\Users\Admin\AppData\Local\Temp\f1a09f5d48427ae32d98556a31e574c01e47c465e6c8beee702d3fb9a6511fb3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\if0Uw43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\if0Uw43.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uw8iM87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uw8iM87.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qt4tU39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qt4tU39.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2qq8273.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2qq8273.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3WH42JP.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3WH42JP.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5407⤵
- Program crash
PID:1824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4TH596xp.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4TH596xp.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5al5Ip4.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5al5Ip4.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Hs0Zi9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Hs0Zi9.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4412 -ip 44121⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\C04D.exeC:\Users\Admin\AppData\Local\Temp\C04D.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2296
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4632
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2136
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:4964
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4924
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3136
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3832
-
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:4492
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:4628
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:2820
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C4D3.exeC:\Users\Admin\AppData\Local\Temp\C4D3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
C:\Users\Admin\AppData\Local\Temp\8C2.exeC:\Users\Admin\AppData\Local\Temp\8C2.exe1⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\BD1.exeC:\Users\Admin\AppData\Local\Temp\BD1.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
C:\Users\Admin\AppData\Local\Temp\14CA.exeC:\Users\Admin\AppData\Local\Temp\14CA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\1836.exeC:\Users\Admin\AppData\Local\Temp\1836.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
C:\Users\Admin\AppData\Local\Temp\4E6A.exeC:\Users\Admin\AppData\Local\Temp\4E6A.exe1⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵PID:2260
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
15.3MB
MD5e2d9ea8f72bc239d7372048430301e5e
SHA1602c740f6497656c7952d65441ea36f623f588cb
SHA256564ad08d79345be7121e76d778719928ddb37af7208368ca6dfcb703bc7168f4
SHA5122f1394f494639b74f70238d3c893a99b1faa388a7c0aeb3c114fb09ac5717a7ee703b06e0a3ec1ebac9c0cfdade31951cb47b73e52865f520e2d342330692b39
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
222KB
MD59e41d2cc0de2e45ce74e42dd3608df3b
SHA1a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6
SHA2561081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f
SHA512849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1014KB
MD59bc6e179209fb1c51c56f97f33dd8d4b
SHA1da318669f3bd880eded864bb95a64fe2798513ef
SHA2569d90c193c11598e61d2e66b4b5002d3a9f0138342cda17e801ceb0e15f897811
SHA5122a02a82e7f935c2db2e31a2e44a0d67a617ecb2d38b1ed7d2b2375e12320f9b939103a836a25eb5c315eb60040aaeee417b822dc1e1903c75c688837c1aeac49
-
Filesize
1014KB
MD59bc6e179209fb1c51c56f97f33dd8d4b
SHA1da318669f3bd880eded864bb95a64fe2798513ef
SHA2569d90c193c11598e61d2e66b4b5002d3a9f0138342cda17e801ceb0e15f897811
SHA5122a02a82e7f935c2db2e31a2e44a0d67a617ecb2d38b1ed7d2b2375e12320f9b939103a836a25eb5c315eb60040aaeee417b822dc1e1903c75c688837c1aeac49
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
890KB
MD59a6118a1aaa8268e5e5cda3fc7187b49
SHA1eb005255c5536d8ed8381bea42139a884392692e
SHA256f1ddc51ee99b4396b51f5a19892703f24258747fce4b68f020fefc53c416817d
SHA51235e83fbe037eb799ae8157f9c7a9dabb68b58d2dd0e240bbd894d95cd15cc51ecb547b8b876ab45f19a90332073b456d92e7abb9014c25c88bf9a2aafbceff3e
-
Filesize
890KB
MD59a6118a1aaa8268e5e5cda3fc7187b49
SHA1eb005255c5536d8ed8381bea42139a884392692e
SHA256f1ddc51ee99b4396b51f5a19892703f24258747fce4b68f020fefc53c416817d
SHA51235e83fbe037eb799ae8157f9c7a9dabb68b58d2dd0e240bbd894d95cd15cc51ecb547b8b876ab45f19a90332073b456d92e7abb9014c25c88bf9a2aafbceff3e
-
Filesize
724KB
MD5578f65c307458a1427c5f9ca94e2b038
SHA1383460fc85b9c6110c0f5629f0167ac495efdf69
SHA25679c763951611bd0d369a530003b007435d5056b2bd556879bd576990f9d539b4
SHA51205fffa40e89f7b7f85a6028f6c02eacf8ddb04d86e8d2ec95011c1765c7ee4b8e8fa16a62b74cb4c845aeeeddcbd57335793219684a41384d216f32627d78e46
-
Filesize
724KB
MD5578f65c307458a1427c5f9ca94e2b038
SHA1383460fc85b9c6110c0f5629f0167ac495efdf69
SHA25679c763951611bd0d369a530003b007435d5056b2bd556879bd576990f9d539b4
SHA51205fffa40e89f7b7f85a6028f6c02eacf8ddb04d86e8d2ec95011c1765c7ee4b8e8fa16a62b74cb4c845aeeeddcbd57335793219684a41384d216f32627d78e46
-
Filesize
426KB
MD5e8b841a1983c91b905cab3094c1aefbb
SHA10eba4dc09c04ff4247677d341db8b6ed650bdd06
SHA25644657d4154d5ce6fac507725b97516a29c22f701ba5b82574147c7caec2996a7
SHA512fd5680433fdc9f530f1c419d6aff7b131091015ab702e75a00317400c38c37e3e637f03d6fbd7822d6d6a1eefc27bae80278ee18c30db8cfc725a8508faa90cb
-
Filesize
426KB
MD5e8b841a1983c91b905cab3094c1aefbb
SHA10eba4dc09c04ff4247677d341db8b6ed650bdd06
SHA25644657d4154d5ce6fac507725b97516a29c22f701ba5b82574147c7caec2996a7
SHA512fd5680433fdc9f530f1c419d6aff7b131091015ab702e75a00317400c38c37e3e637f03d6fbd7822d6d6a1eefc27bae80278ee18c30db8cfc725a8508faa90cb
-
Filesize
415KB
MD5b66c583038342a138bd37be778504ad8
SHA12dc2045356bde010f165dc67f7f211c27b67df01
SHA256a939056a1b905516c7d913fa06fb3434aaf143f86037aa79d49112dd60b7ef78
SHA51255b4de89c0ad1f62cf3b15176e4aebcdc1aeecac288ec14b52d1b895d963622ef75a56c97fac9aaceec467c734cd47eadde15a7589183032570b9a18dcc0beba
-
Filesize
415KB
MD5b66c583038342a138bd37be778504ad8
SHA12dc2045356bde010f165dc67f7f211c27b67df01
SHA256a939056a1b905516c7d913fa06fb3434aaf143f86037aa79d49112dd60b7ef78
SHA51255b4de89c0ad1f62cf3b15176e4aebcdc1aeecac288ec14b52d1b895d963622ef75a56c97fac9aaceec467c734cd47eadde15a7589183032570b9a18dcc0beba
-
Filesize
378KB
MD5150bde55ecd34eb4c263b7ce567440d1
SHA1fbd679ee736acbd8c94c872ac6f50412b795d1a9
SHA2568ea04cfca4f67aa0277f918c5389f43af1924fe4c93e05b2ee67b3bb4fedb12f
SHA512bff64b25da34fce318e1e4ac2d886d839ea1263a96ea5a34804b04f772a2c88480eb1c2aebb2386c0da8dad92fa400aa9c5a53b21d4e14b7cbfd36ef31c62224
-
Filesize
378KB
MD5150bde55ecd34eb4c263b7ce567440d1
SHA1fbd679ee736acbd8c94c872ac6f50412b795d1a9
SHA2568ea04cfca4f67aa0277f918c5389f43af1924fe4c93e05b2ee67b3bb4fedb12f
SHA512bff64b25da34fce318e1e4ac2d886d839ea1263a96ea5a34804b04f772a2c88480eb1c2aebb2386c0da8dad92fa400aa9c5a53b21d4e14b7cbfd36ef31c62224
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2.9MB
MD5d9a222aa5abc29fa3a86da3c6ca8ba6b
SHA1c233922d043652ca059e6f49108a5da2364feeaf
SHA2561abef148feafd4b6c8b2dede8e28706d97d56151c40662ef77466ffc53bb5560
SHA512e8db46dddba92e91234b94c2d53d94a651fea55c08d8b4e3537790c8aeba38d5543d442f371d5e54afd5252e2a59db4ab85f8473674d8ba6c2c0a91f72a89454
-
Filesize
4.9MB
MD599141dc650f0303161e3c6d63827c26b
SHA198f12fdaf7dcc89aafd708d4fa5081372c7854c6
SHA2565c2f4d819c47a11c84fe98fe2d9a6a295fe770496d97d42690dce85fe83e680a
SHA5122891d6650f828c8af32f802e52334f8973e31b3f3e1d624d854201fd3995d55070e834e5ef1273404f3825e9a13cf80c17f2e16d3905833dd2ae8b3af6f316e2
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5aeb9754f2b16a25ed0bd9742f00cddf5
SHA1ef96e9173c3f742c4efbc3d77605b85470115e65
SHA256df20bc98e43d13f417cd68d31d7550a1febdeaf335230b8a6a91669d3e69d005
SHA512725662143a3ef985f28e43cc2775e798c8420a6d115fb9506fdfcc283fc67054149e22c6bc0470d1627426c9a33c7174cefd8dc9756bf2f5fc37734d5fcecc75
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e6e2b78c1c348a60fa46fc926a23e720
SHA12e237b8a928dca6834cff5f1700b4bbb4c8287fd
SHA256fe9c9b5b97179f64c80f485f7d06656061e1161aa4d955a97e0616e9b3a2dbf5
SHA512adc16181ebbd6506e2f543f455a72610ec1ed73246c3a4a0d108cd0fe395347ae4db594ca960448739f92026610691fad57cdce88a69a9ff326d3b8984ddcfb6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ba98de6b663e222c0574d7c26b87b107
SHA1779f76a0cdf4c6d6d8151b775af65001cf9252ea
SHA2567e771d678c4d779e70bc7ee954cd6af7db21791094f0925455f9e502ef4d2e65
SHA51207c0cf98df32c5a5e426b870833315f8c19180ca273d823d48396172caf37ed5e5911e862daca40ec8e4bc7ba6ed0f11da9b91faf757f54ba218784203d1ae22
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58df97f3d87862eed464b672e19f12f2d
SHA1050f233d586ecf92ba042261e9d5f6d33e78754d
SHA2567f965d36288a1d502a0b7b83b29dc6ddde271eb7dc331679ff3e9fd0361a493d
SHA512d1c798fe0a503347f03d73060212459357fb92eb3b949ba62c920558e86d7fa56763ab0634692cadfd40d66efdfdebc740b4aeea4bfa9dc0a0f47e7f30d0ff9a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56656e6283f615510a408d33fc608d8e3
SHA1aee3cc61b28f72a94ef797fa648d68e857239840
SHA256e24072f0e70c698cb3bb42b711739175999195364a06e542dc6c4d39292ab069
SHA512442640146381d2396562c5a36cfea047af0d91f5e67924d6a8c33bb96bfacc3d6495627ec0943c01eb3a0c0e264dfc924f0a3790dc9e37d86f5c3f517c38b8dc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54fdaa27c86227ea181e8139f842bd6fb
SHA12f9a197db48d998478a8d2e6a413fd67c59e8598
SHA25678dbc8e1ea19e7dc3391859a23d9f3e64ca2b98fbbac47137bce702804b885e8
SHA512be872e88b9fe0f7d6cb9bf3a1cf032e2607caf77ab0e1d958cf6fb77e4344e879bf3494c48811e123e19644a5d3671beebba9c84fb10b20800573b7419236625
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245