Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
14-11-2023 07:21
Static task
static1
Behavioral task
behavioral1
Sample
77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe
Resource
win10-20231020-en
General
-
Target
77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe
-
Size
1.2MB
-
MD5
81fac8a3ef6203246a03e169acfb3439
-
SHA1
43aef85f8df3ef2844341dccf9ae43348ba7fd48
-
SHA256
77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615
-
SHA512
b8ad83ca26943baed506fbf3076ba7ec6a83451258e304bc6c66176d3c8f120827d55ec3e89e90de63de73582bf5db8e5fd7932c112183a3842402b0926c68b1
-
SSDEEP
24576:3yAiLj5FacNkEtdkEx7q2REeT20dap7SKdIR09WIHFf9yCq4eVTQ:CXLj5FviEttJC0dU1HlkCq4ST
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4928-48-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/4928-53-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/4928-54-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/4928-56-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
Glupteba payload 6 IoCs
resource yara_rule behavioral1/memory/2972-160-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral1/memory/2972-161-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2972-336-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2972-572-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2972-573-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral1/memory/2576-580-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6Al1qs9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6Al1qs9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6Al1qs9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6Al1qs9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6Al1qs9.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/5092-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/files/0x000900000001ab9d-127.dat family_redline behavioral1/files/0x000900000001ab9d-128.dat family_redline behavioral1/memory/904-129-0x0000000000200000-0x000000000021E000-memory.dmp family_redline behavioral1/memory/3660-615-0x0000000000470000-0x00000000004CA000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000900000001ab9d-127.dat family_sectoprat behavioral1/files/0x000900000001ab9d-128.dat family_sectoprat behavioral1/memory/904-129-0x0000000000200000-0x000000000021E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4996 netsh.exe -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2396-74-0x00000000048C0000-0x00000000048E0000-memory.dmp net_reactor behavioral1/memory/2396-76-0x0000000004E40000-0x0000000004E5E000-memory.dmp net_reactor behavioral1/memory/2396-77-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-78-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-80-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-82-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-84-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-86-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-88-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-90-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-92-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-94-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-96-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-98-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-100-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-102-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-104-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-106-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor behavioral1/memory/2396-108-0x0000000004E40000-0x0000000004E59000-memory.dmp net_reactor -
Executes dropped EXE 25 IoCs
pid Process 4688 Zh6gS89.exe 2588 gG0BY97.exe 3828 kW7Im23.exe 636 2OJ7327.exe 4600 3Cf13cu.exe 2556 4AZ806OD.exe 4208 5Ci0bJ9.exe 2396 6Al1qs9.exe 4408 4B4C.exe 904 4D70.exe 2516 InstallSetup5.exe 4632 toolspub2.exe 2972 31839b57a4f11171d6abc8bbc4451ee4.exe 5080 Broom.exe 1072 toolspub2.exe 2576 31839b57a4f11171d6abc8bbc4451ee4.exe 3320 ACC7.exe 2620 BDEF.exe 3660 C16B.exe 1396 127A.exe 1732 csrss.exe 96 injector.exe 3716 windefender.exe 5028 windefender.exe 2184 tor.exe -
Loads dropped DLL 10 IoCs
pid Process 2620 BDEF.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe 2184 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000600000001abcd-2185.dat upx behavioral1/files/0x000600000001abcd-2187.dat upx behavioral1/files/0x000600000001abcd-2204.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6Al1qs9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6Al1qs9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-459651055-4136032345-1270294931-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-459651055-4136032345-1270294931-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Zh6gS89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gG0BY97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kW7Im23.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 636 set thread context of 5092 636 2OJ7327.exe 75 PID 4600 set thread context of 4928 4600 3Cf13cu.exe 78 PID 2556 set thread context of 3284 2556 4AZ806OD.exe 83 PID 4632 set thread context of 1072 4632 toolspub2.exe 93 PID 3320 set thread context of 1416 3320 ACC7.exe 111 PID 2620 set thread context of 4312 2620 BDEF.exe 112 PID 1396 set thread context of 204 1396 127A.exe 119 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1232 sc.exe 4812 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4636 4928 WerFault.exe 78 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5Ci0bJ9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5Ci0bJ9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5Ci0bJ9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4572 schtasks.exe 3924 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4208 5Ci0bJ9.exe 4208 5Ci0bJ9.exe 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 2396 6Al1qs9.exe 2396 6Al1qs9.exe 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3376 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4208 5Ci0bJ9.exe 1072 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2396 6Al1qs9.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 904 4D70.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 3052 powershell.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 2972 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 2972 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 4960 powershell.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 3660 C16B.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 4888 powershell.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 1416 jsc.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5080 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4688 3660 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe 70 PID 3660 wrote to memory of 4688 3660 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe 70 PID 3660 wrote to memory of 4688 3660 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe 70 PID 4688 wrote to memory of 2588 4688 Zh6gS89.exe 71 PID 4688 wrote to memory of 2588 4688 Zh6gS89.exe 71 PID 4688 wrote to memory of 2588 4688 Zh6gS89.exe 71 PID 2588 wrote to memory of 3828 2588 gG0BY97.exe 72 PID 2588 wrote to memory of 3828 2588 gG0BY97.exe 72 PID 2588 wrote to memory of 3828 2588 gG0BY97.exe 72 PID 3828 wrote to memory of 636 3828 kW7Im23.exe 73 PID 3828 wrote to memory of 636 3828 kW7Im23.exe 73 PID 3828 wrote to memory of 636 3828 kW7Im23.exe 73 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 636 wrote to memory of 5092 636 2OJ7327.exe 75 PID 3828 wrote to memory of 4600 3828 kW7Im23.exe 76 PID 3828 wrote to memory of 4600 3828 kW7Im23.exe 76 PID 3828 wrote to memory of 4600 3828 kW7Im23.exe 76 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 4600 wrote to memory of 4928 4600 3Cf13cu.exe 78 PID 2588 wrote to memory of 2556 2588 gG0BY97.exe 79 PID 2588 wrote to memory of 2556 2588 gG0BY97.exe 79 PID 2588 wrote to memory of 2556 2588 gG0BY97.exe 79 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 2556 wrote to memory of 3284 2556 4AZ806OD.exe 83 PID 4688 wrote to memory of 4208 4688 Zh6gS89.exe 84 PID 4688 wrote to memory of 4208 4688 Zh6gS89.exe 84 PID 4688 wrote to memory of 4208 4688 Zh6gS89.exe 84 PID 3660 wrote to memory of 2396 3660 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe 85 PID 3660 wrote to memory of 2396 3660 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe 85 PID 3660 wrote to memory of 2396 3660 77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe 85 PID 3376 wrote to memory of 4408 3376 Process not Found 86 PID 3376 wrote to memory of 4408 3376 Process not Found 86 PID 3376 wrote to memory of 4408 3376 Process not Found 86 PID 3376 wrote to memory of 904 3376 Process not Found 87 PID 3376 wrote to memory of 904 3376 Process not Found 87 PID 3376 wrote to memory of 904 3376 Process not Found 87 PID 4408 wrote to memory of 2516 4408 4B4C.exe 89 PID 4408 wrote to memory of 2516 4408 4B4C.exe 89 PID 4408 wrote to memory of 2516 4408 4B4C.exe 89 PID 4408 wrote to memory of 4632 4408 4B4C.exe 90 PID 4408 wrote to memory of 4632 4408 4B4C.exe 90 PID 4408 wrote to memory of 4632 4408 4B4C.exe 90 PID 4408 wrote to memory of 2972 4408 4B4C.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe"C:\Users\Admin\AppData\Local\Temp\77bfb576c5286cb36bb4d0a87117dfcf02358fa7ab2222910c996991c332c615.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zh6gS89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zh6gS89.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gG0BY97.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gG0BY97.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kW7Im23.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kW7Im23.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2OJ7327.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2OJ7327.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Cf13cu.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Cf13cu.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 5887⤵
- Program crash
PID:4636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4AZ806OD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4AZ806OD.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Ci0bJ9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Ci0bJ9.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Al1qs9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Al1qs9.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\4B4C.exeC:\Users\Admin\AppData\Local\Temp\4B4C.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1072
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1164
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4996
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:212
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4572
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:96
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3924
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:3764
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:1232
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2616
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4812
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4D70.exeC:\Users\Admin\AppData\Local\Temp\4D70.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:904
-
C:\Users\Admin\AppData\Local\Temp\ACC7.exeC:\Users\Admin\AppData\Local\Temp\ACC7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\BDEF.exeC:\Users\Admin\AppData\Local\Temp\BDEF.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\C16B.exeC:\Users\Admin\AppData\Local\Temp\C16B.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
C:\Users\Admin\AppData\Local\Temp\127A.exeC:\Users\Admin\AppData\Local\Temp\127A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:204
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:5028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5daa8e49b3ee5777c041cf6a67055fd24
SHA16dace6d44e47fca9fd1fcfe89a7e6a3af82e1747
SHA256f593ea482a61530d7ce3c0801e743bdf3f60861fb26e77a8da359c8e9c104a1c
SHA5124fb9e34eb52d25660ceb85c290d680b008e6eb6928c1144b15e9520a1a37470fac8e58b6d88fd2508da27df6f6eb6e114d7a0f6b3029b88d29c6225bc5feac63
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
15.3MB
MD5e2d9ea8f72bc239d7372048430301e5e
SHA1602c740f6497656c7952d65441ea36f623f588cb
SHA256564ad08d79345be7121e76d778719928ddb37af7208368ca6dfcb703bc7168f4
SHA5122f1394f494639b74f70238d3c893a99b1faa388a7c0aeb3c114fb09ac5717a7ee703b06e0a3ec1ebac9c0cfdade31951cb47b73e52865f520e2d342330692b39
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1020KB
MD510450dd0ae74171b5355c0ec79da9176
SHA10e2444cff83ba580de1dd865b0e534f4a50b60d2
SHA2566a03c17ade66c0f7ceaedd9a9e50447a2019c36788a055b5bebae1669947f000
SHA512c2eb5d86b8b4b2258cb9e9eaf782eb1532bd55627fae1b32a1801b775b630606ad6892857c2b1199df4f2268c2e9a8b053492931e36ec6b7d7dfda8cccc43ac4
-
Filesize
1020KB
MD510450dd0ae74171b5355c0ec79da9176
SHA10e2444cff83ba580de1dd865b0e534f4a50b60d2
SHA2566a03c17ade66c0f7ceaedd9a9e50447a2019c36788a055b5bebae1669947f000
SHA512c2eb5d86b8b4b2258cb9e9eaf782eb1532bd55627fae1b32a1801b775b630606ad6892857c2b1199df4f2268c2e9a8b053492931e36ec6b7d7dfda8cccc43ac4
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
894KB
MD568219ce1978606d15b399ab2c65f0e58
SHA1df0c80e9fcec0438c58ad96923b8dfc9e3239982
SHA256b6054028acddc47f307ff61e4e062410ac1dd84d21c6d55d510b94e6e1cece19
SHA512db5dcf3502c94dbdf9b625e8e3b8beca2f851a2ad0586a062d876229cf93168de72c6dc59e65f7861e38da765bac89cf91aac4fff40001bcc797fe36edfe516e
-
Filesize
894KB
MD568219ce1978606d15b399ab2c65f0e58
SHA1df0c80e9fcec0438c58ad96923b8dfc9e3239982
SHA256b6054028acddc47f307ff61e4e062410ac1dd84d21c6d55d510b94e6e1cece19
SHA512db5dcf3502c94dbdf9b625e8e3b8beca2f851a2ad0586a062d876229cf93168de72c6dc59e65f7861e38da765bac89cf91aac4fff40001bcc797fe36edfe516e
-
Filesize
724KB
MD56bf246283c584205793f81279c8f066c
SHA1390ac01024013b80021c933c7aa1e14386db82e8
SHA2565f5aef9558bd37030967e4637eafd30f457baa7081eb3c9d57ab4e7acb754e02
SHA512b726885174b102588026fa7613827b3d6c8001075fd05df0552ae6359a5da4c8ad7a4bf7f082f8acae6064bd055e7dadf60899f540ace18efb673d56eae83369
-
Filesize
724KB
MD56bf246283c584205793f81279c8f066c
SHA1390ac01024013b80021c933c7aa1e14386db82e8
SHA2565f5aef9558bd37030967e4637eafd30f457baa7081eb3c9d57ab4e7acb754e02
SHA512b726885174b102588026fa7613827b3d6c8001075fd05df0552ae6359a5da4c8ad7a4bf7f082f8acae6064bd055e7dadf60899f540ace18efb673d56eae83369
-
Filesize
430KB
MD5ef298b036e0311cd5b33815b04404a6b
SHA1d3c116d885340da7f2384391682b3eb2be042109
SHA256e39315c3264833e6e2c5b18c03fd674b454aee73075bf4d5074d4d5c4ad792ed
SHA512d99d19746a84d99af17dc66f775fa53b98ceca5f735289723ccfbab3b35b49b11c7340d627bd9b056e82965faa8c5ef934019886caff9cffc4b9d5053b7a3b8e
-
Filesize
430KB
MD5ef298b036e0311cd5b33815b04404a6b
SHA1d3c116d885340da7f2384391682b3eb2be042109
SHA256e39315c3264833e6e2c5b18c03fd674b454aee73075bf4d5074d4d5c4ad792ed
SHA512d99d19746a84d99af17dc66f775fa53b98ceca5f735289723ccfbab3b35b49b11c7340d627bd9b056e82965faa8c5ef934019886caff9cffc4b9d5053b7a3b8e
-
Filesize
415KB
MD5561632a4aa0b490d36c7ea89a43abcf1
SHA12e56c517128c44eca0f447939aa38e46c4e8f625
SHA256170329b0720fea1564438cff6598c1095c1452fffcb17871efbe30089300dbe4
SHA512f71005b4631b7b8b919719ccb58fd518a85bdcf5c7f3d81dfb4003f15580e04f68e746741d65d1c6bc2c6e80801c154446acdb26d7916ba1d9fe7df0fea3f7d7
-
Filesize
415KB
MD5561632a4aa0b490d36c7ea89a43abcf1
SHA12e56c517128c44eca0f447939aa38e46c4e8f625
SHA256170329b0720fea1564438cff6598c1095c1452fffcb17871efbe30089300dbe4
SHA512f71005b4631b7b8b919719ccb58fd518a85bdcf5c7f3d81dfb4003f15580e04f68e746741d65d1c6bc2c6e80801c154446acdb26d7916ba1d9fe7df0fea3f7d7
-
Filesize
378KB
MD55f752f6d43a8fc2e34783f21c6f4c6c3
SHA15f3e6b2d2791f9a1fd6036944dc2859f0b000c4b
SHA256db15832d4a07c5e86107d2a818fd2c4c05cf755e7ce6d2496fe98b544b23f4eb
SHA51289ae9ea964cc953fe42dd7512c0afb969a74c659e8a1337ca3c72d96f7ca4d7610c236adab412a73b43259f6da66c39de09cf2ca96d1df68e46e30982af72a75
-
Filesize
378KB
MD55f752f6d43a8fc2e34783f21c6f4c6c3
SHA15f3e6b2d2791f9a1fd6036944dc2859f0b000c4b
SHA256db15832d4a07c5e86107d2a818fd2c4c05cf755e7ce6d2496fe98b544b23f4eb
SHA51289ae9ea964cc953fe42dd7512c0afb969a74c659e8a1337ca3c72d96f7ca4d7610c236adab412a73b43259f6da66c39de09cf2ca96d1df68e46e30982af72a75
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2.9MB
MD5ae8d2193fadc7d3bab333a8a00a2d343
SHA16e2941c116a1acaccb45cf162ea53795be7ad6a8
SHA256d3a0731c111f069b4af73797febb21c2a02d36ef8d6739ce183cf2af30c5b63f
SHA512d7eee9a122e1ed635162b9cb8a1eef9e97c10bf873ef2326d114db54332753b40c7d8e7d93c368568c988384e84e8568971dba0fe1257ef8b0c0410086842cec
-
Filesize
5.1MB
MD5ce143a36a6c5847b359ffcecda9233ce
SHA1730703d2440b56b0119138cc5c50f08500cc17c1
SHA2568ab4c29189f48cf2d38d4018a557ceb75457c97d73b2a44aad9d8a62392c66cf
SHA512c772ca3bcd45bf3ddbf8e1af00d82e145461e2caad1f8e85880f5c1457d554ef4ac8c34a124941038fe8b31b66c78d374c76c66670486bddfbe82d0b020b57c6
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD55be96e311859379e2bf53d4ca9b3292c
SHA17da91b40529fcba8bc68442aa06ea9491fdbb824
SHA256c46a65bf3fc90038a2d876d103dbe658259594e90fddc223951cddb9ac9af99c
SHA512a39d3c2c45deb0509ffeab971b096a90748f0fa6e3f1bacea6f8c9dfcae985ad1b45d5d48306ce06d065e92063e8156fea44c0a87e9ca99bae6838fd53edb057
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b9e3f4a72337564118a49461cf50084f
SHA1f274f412a2d0464f6de4e2b644ec1e78573c4233
SHA256883259ec50a30ec6ddaae2d88017bbf9c9961782dd649043befd6d1f66d42a95
SHA512fc58b19bebae7f48534f5694d108ebc9f75a9986dd2fc7cbe02e5b9f7464d434da772414c8e8a1b72b37547ec4ec7a8a3ce9ba241ad5711d7fc8e7ad909bd96b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD594a110c47a34fe87eeab3365aad0d69b
SHA1b8aa06bebe356ca5b166adeeda480a761889c159
SHA256778e27799ad0fa153dc16d1c01c975d85d56abcf37811e5f67ab346804713846
SHA5123d633efabc52e0b3560c9ac70e9b382ad14fb390cc6fe6e82dcc419bccc3b4cb8150df5db0e9b8ddae613484d6e649654e9879be4f16bac62aae0ab0a03df22a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5906c044af0f5b8aa4a4932558be8697f
SHA1018bcb747a927746b9d502ff802aa498a6d694b0
SHA256d43f264a15d9547269b1d390e2b0295432a23aaecc5bda81f6a2d2587ef0328f
SHA51281a1fa187c4bb8514a6f7463dfbf4367b1274974e8b6d028dfeb0f0ab33bf506cbb971f38e801ff1fe93df591c5a55397e008abf168102b436cf49b8cb889538
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53596124a0ad76f9a595908b410e144df
SHA1b4502104dcffc167cde0d051a9c7986acfc7165a
SHA2567dc1fb33b540adfa72260c26ecbb45acace846a6c76f15b3a7b1630900ee6b83
SHA512724a6efe6a918fb20b4e731599abc9326eb18058bb0473939d65c42001d9cd8cbdd800299bc24ce460042dac796e1a58cb4e856696f572467de6b264eaca83c9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD537540717bec607ab6a66fabbc4934910
SHA136bcfb82675f41329a8ff46b4b842347f207bd4e
SHA25645d6ee0bfc7078a337e78824d9ce03ecf41c8417a6c0f8f04abfee4bb2a126f8
SHA512ad5d158eb96091e436a6e30658660b1ef242bb915aa35218d2b6846ef51b014dede999b6ff4661936f3241d5c1026354628505c6149a7aaa9d56de4d75c60eb0
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c