Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
14-11-2023 06:34
Static task
static1
Behavioral task
behavioral1
Sample
6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe
Resource
win10-20231020-en
General
-
Target
6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe
-
Size
1.2MB
-
MD5
22ba95cf73b75b59eeb9fd47a50297bb
-
SHA1
a2ba280f938a49cd2ecd32b98349c26c2c390a1e
-
SHA256
6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b
-
SHA512
2f4c39b2b0cb053ad70f4045c507e942ca0cc7c9e15cf1db7e3ee04c450dfa4f7337a01e5cba1c0e72aa068bd1d0ed4828a0bbf427cd2d26427cbd844263141c
-
SSDEEP
24576:Jy0RYu+528erZOLBbTIEr2FrGTNa+x5nQ1/oJvM+FbRb+kIgU7/w:8zaOB/IEr2FGv5nggvM+NB
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/360-48-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/360-53-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/360-54-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/360-56-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
Glupteba payload 7 IoCs
resource yara_rule behavioral1/memory/924-160-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/924-162-0x0000000002DB0000-0x000000000369B000-memory.dmp family_glupteba behavioral1/memory/924-346-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/924-571-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3472-578-0x0000000002E90000-0x000000000377B000-memory.dmp family_glupteba behavioral1/memory/3472-579-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3472-809-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6uk0pp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6uk0pp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6uk0pp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6uk0pp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6uk0pp9.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4636-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/files/0x000a00000001ab7e-126.dat family_redline behavioral1/files/0x000a00000001ab7e-128.dat family_redline behavioral1/memory/5004-129-0x0000000000E10000-0x0000000000E2E000-memory.dmp family_redline behavioral1/memory/4872-612-0x0000000000690000-0x00000000006EA000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001ab7e-126.dat family_sectoprat behavioral1/files/0x000a00000001ab7e-128.dat family_sectoprat behavioral1/memory/5004-129-0x0000000000E10000-0x0000000000E2E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 61 5004 cmd.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3648 netsh.exe -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1016-74-0x0000000002370000-0x0000000002390000-memory.dmp net_reactor behavioral1/memory/1016-76-0x0000000004E50000-0x0000000004E6E000-memory.dmp net_reactor behavioral1/memory/1016-77-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-78-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-80-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-82-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-84-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-86-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-88-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-90-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-92-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-94-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-96-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-98-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-100-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-102-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-104-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-106-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/1016-108-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor -
Executes dropped EXE 22 IoCs
pid Process 3000 vz7SM70.exe 956 Oc4nt96.exe 2876 Zi4PR45.exe 4572 2US0128.exe 4256 3Gt33bn.exe 1880 4pU322PE.exe 1040 5fK8cP6.exe 1016 6uk0pp9.exe 4936 5F9F.exe 5004 6146.exe 808 InstallSetup5.exe 3412 toolspub2.exe 924 31839b57a4f11171d6abc8bbc4451ee4.exe 2888 Broom.exe 4932 toolspub2.exe 3472 31839b57a4f11171d6abc8bbc4451ee4.exe 320 B94B.exe 4424 C91A.exe 4872 CB9C.exe 1832 177B.exe 516 csrss.exe 4936 injector.exe -
Loads dropped DLL 1 IoCs
pid Process 4424 C91A.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6uk0pp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6uk0pp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vz7SM70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Oc4nt96.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Zi4PR45.exe Set value (str) \REGISTRY\USER\S-1-5-21-2508097367-364665605-1201309312-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2508097367-364665605-1201309312-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive schtasks.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4572 set thread context of 4636 4572 2US0128.exe 76 PID 4256 set thread context of 360 4256 3Gt33bn.exe 80 PID 1880 set thread context of 5016 1880 4pU322PE.exe 86 PID 3412 set thread context of 4932 3412 toolspub2.exe 96 PID 320 set thread context of 1120 320 B94B.exe 114 PID 4424 set thread context of 1796 4424 C91A.exe 115 PID 1832 set thread context of 1684 1832 177B.exe 129 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5012 360 WerFault.exe 80 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5fK8cP6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5fK8cP6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5fK8cP6.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2148 schtasks.exe 884 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1040 5fK8cP6.exe 1040 5fK8cP6.exe 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found 3284 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3284 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1040 5fK8cP6.exe 4932 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1016 6uk0pp9.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 5004 6146.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 716 powershell.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 924 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 924 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 4768 powershell.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 4872 CB9C.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 3384 powershell.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeDebugPrivilege 2148 schtasks.exe Token: SeDebugPrivilege 1120 jsc.exe Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found Token: SeShutdownPrivilege 3284 Process not Found Token: SeCreatePagefilePrivilege 3284 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2888 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3000 4940 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe 71 PID 4940 wrote to memory of 3000 4940 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe 71 PID 4940 wrote to memory of 3000 4940 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe 71 PID 3000 wrote to memory of 956 3000 vz7SM70.exe 72 PID 3000 wrote to memory of 956 3000 vz7SM70.exe 72 PID 3000 wrote to memory of 956 3000 vz7SM70.exe 72 PID 956 wrote to memory of 2876 956 Oc4nt96.exe 73 PID 956 wrote to memory of 2876 956 Oc4nt96.exe 73 PID 956 wrote to memory of 2876 956 Oc4nt96.exe 73 PID 2876 wrote to memory of 4572 2876 Zi4PR45.exe 74 PID 2876 wrote to memory of 4572 2876 Zi4PR45.exe 74 PID 2876 wrote to memory of 4572 2876 Zi4PR45.exe 74 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 4572 wrote to memory of 4636 4572 2US0128.exe 76 PID 2876 wrote to memory of 4256 2876 Zi4PR45.exe 77 PID 2876 wrote to memory of 4256 2876 Zi4PR45.exe 77 PID 2876 wrote to memory of 4256 2876 Zi4PR45.exe 77 PID 4256 wrote to memory of 880 4256 3Gt33bn.exe 79 PID 4256 wrote to memory of 880 4256 3Gt33bn.exe 79 PID 4256 wrote to memory of 880 4256 3Gt33bn.exe 79 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 4256 wrote to memory of 360 4256 3Gt33bn.exe 80 PID 956 wrote to memory of 1880 956 Oc4nt96.exe 81 PID 956 wrote to memory of 1880 956 Oc4nt96.exe 81 PID 956 wrote to memory of 1880 956 Oc4nt96.exe 81 PID 1880 wrote to memory of 4144 1880 4pU322PE.exe 85 PID 1880 wrote to memory of 4144 1880 4pU322PE.exe 85 PID 1880 wrote to memory of 4144 1880 4pU322PE.exe 85 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 1880 wrote to memory of 5016 1880 4pU322PE.exe 86 PID 3000 wrote to memory of 1040 3000 vz7SM70.exe 87 PID 3000 wrote to memory of 1040 3000 vz7SM70.exe 87 PID 3000 wrote to memory of 1040 3000 vz7SM70.exe 87 PID 4940 wrote to memory of 1016 4940 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe 88 PID 4940 wrote to memory of 1016 4940 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe 88 PID 4940 wrote to memory of 1016 4940 6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe 88 PID 3284 wrote to memory of 4936 3284 Process not Found 89 PID 3284 wrote to memory of 4936 3284 Process not Found 89 PID 3284 wrote to memory of 4936 3284 Process not Found 89 PID 3284 wrote to memory of 5004 3284 Process not Found 91 PID 3284 wrote to memory of 5004 3284 Process not Found 91 PID 3284 wrote to memory of 5004 3284 Process not Found 91 PID 4936 wrote to memory of 808 4936 5F9F.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe"C:\Users\Admin\AppData\Local\Temp\6980f4007d18c3bafdddaa76912bf063fd4695086411b3d64815e1376540796b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz7SM70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz7SM70.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Oc4nt96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Oc4nt96.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Zi4PR45.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Zi4PR45.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2US0128.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2US0128.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Gt33bn.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Gt33bn.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 360 -s 5807⤵
- Program crash
PID:5012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4pU322PE.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4pU322PE.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5fK8cP6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5fK8cP6.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6uk0pp9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6uk0pp9.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\5F9F.exeC:\Users\Admin\AppData\Local\Temp\5F9F.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Blocklisted process makes network request
PID:5004 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:3648
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2148
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4244
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Drops file in System32 directory
- Creates scheduled task(s)
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4448
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:4936
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6146.exeC:\Users\Admin\AppData\Local\Temp\6146.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\B94B.exeC:\Users\Admin\AppData\Local\Temp\B94B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\C91A.exeC:\Users\Admin\AppData\Local\Temp\C91A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\CB9C.exeC:\Users\Admin\AppData\Local\Temp\CB9C.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
C:\Users\Admin\AppData\Local\Temp\177B.exeC:\Users\Admin\AppData\Local\Temp\177B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD590f2958528f036abcae48d93ede6f8ce
SHA1e5a6935d1c874d66766b83882e49db9d84be3b8a
SHA2564a32fff3e568bf2d9ae0f88279de7009f7949d4030a3a0005e56171268b9f74b
SHA5120c89f2b88e89c9b77a0e4d034513b82c70fa5c57ec976eb418202472eb5ab582e184abfe696927526da0dc687c14e24c9cee1d39432e5f7b4a67b60e0ad25b91
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
15.3MB
MD5e2d9ea8f72bc239d7372048430301e5e
SHA1602c740f6497656c7952d65441ea36f623f588cb
SHA256564ad08d79345be7121e76d778719928ddb37af7208368ca6dfcb703bc7168f4
SHA5122f1394f494639b74f70238d3c893a99b1faa388a7c0aeb3c114fb09ac5717a7ee703b06e0a3ec1ebac9c0cfdade31951cb47b73e52865f520e2d342330692b39
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1019KB
MD50ea2426ab15426dfed3a4aa8b8b12a45
SHA183ef7e4729a38a738bd4c1abaa887f261449cc2b
SHA256d81ba9e1f5662db82e41f5129ccec19ff7911897fff6409b06c1832dc255acfb
SHA51205bf422a58180a81bb3f8adeedeb8ab0dfd7a453c1ed73497e97c0951c82b653fa6b087942aa79344b1061fa5f16188d184e65b5a441db50322cb4808347c2b1
-
Filesize
1019KB
MD50ea2426ab15426dfed3a4aa8b8b12a45
SHA183ef7e4729a38a738bd4c1abaa887f261449cc2b
SHA256d81ba9e1f5662db82e41f5129ccec19ff7911897fff6409b06c1832dc255acfb
SHA51205bf422a58180a81bb3f8adeedeb8ab0dfd7a453c1ed73497e97c0951c82b653fa6b087942aa79344b1061fa5f16188d184e65b5a441db50322cb4808347c2b1
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
894KB
MD50748b8759fb3396a35685179b0559dbf
SHA1c50a52fe24346efe4d6ddb2e330b0bad67f4c47e
SHA256b97230b7652258baf79f2b251d8b35c5a4ecfeed48b4345105219d6eb4a1f549
SHA51277fd8a2ba962219113e91a5de58bbe638aa0d9889dacea065a5c4ce5e9028ed071504af8a2a5f9146dc12000e34bee59e1ca57044a88af5b215572ebbb96bcfb
-
Filesize
894KB
MD50748b8759fb3396a35685179b0559dbf
SHA1c50a52fe24346efe4d6ddb2e330b0bad67f4c47e
SHA256b97230b7652258baf79f2b251d8b35c5a4ecfeed48b4345105219d6eb4a1f549
SHA51277fd8a2ba962219113e91a5de58bbe638aa0d9889dacea065a5c4ce5e9028ed071504af8a2a5f9146dc12000e34bee59e1ca57044a88af5b215572ebbb96bcfb
-
Filesize
724KB
MD532e03ecdfc2f5edf1c43a771933c6f6b
SHA1b0ade5dadaa043718c5b039e80f85a1b77086ec5
SHA256572ddada19977e7c547111a002117a6f8bce50bbb7ae0d8ce6c19af7666d5012
SHA51291c4493475c8921a9f0c52e8a3b3c7826a804e064b85f7c453064ff6d04cd559c5f3875cda6cb2e3914f6c97739dd103e43add5222871e5835a2555f62a3d84b
-
Filesize
724KB
MD532e03ecdfc2f5edf1c43a771933c6f6b
SHA1b0ade5dadaa043718c5b039e80f85a1b77086ec5
SHA256572ddada19977e7c547111a002117a6f8bce50bbb7ae0d8ce6c19af7666d5012
SHA51291c4493475c8921a9f0c52e8a3b3c7826a804e064b85f7c453064ff6d04cd559c5f3875cda6cb2e3914f6c97739dd103e43add5222871e5835a2555f62a3d84b
-
Filesize
431KB
MD50c4742b14e347b46cc000efd84491ba1
SHA128b49c119ff56fd4abb661e65d1992e6a5f863ed
SHA256be8963c7f1099ed8fa0ab13b51789d133f3b1357b19e1957f3a7cc6a3976a5e2
SHA512cdba2ebf9563d88593c9692c8ce06e14beca282cb1ee5944f4aaae2468eb83129cedf4a2d415f214c412637f10041d79c7f4260e534c7cefd93f4ff9033fddca
-
Filesize
431KB
MD50c4742b14e347b46cc000efd84491ba1
SHA128b49c119ff56fd4abb661e65d1992e6a5f863ed
SHA256be8963c7f1099ed8fa0ab13b51789d133f3b1357b19e1957f3a7cc6a3976a5e2
SHA512cdba2ebf9563d88593c9692c8ce06e14beca282cb1ee5944f4aaae2468eb83129cedf4a2d415f214c412637f10041d79c7f4260e534c7cefd93f4ff9033fddca
-
Filesize
415KB
MD54582fbb2309fe7e291e08f9d3b5a4bbd
SHA16dcac71d5c1b07dc9de866af4ca1895384a0f4c3
SHA2566f5e4efd5ac1e3b02af836b25bf0ad875301bf1dda880a952496e5894bb1e73b
SHA512b41b524a0ed6bb069eed5d048afa5f8f86d50864ccc73724a8a7014193c66dfbbb4de6830e86a499edee66b88a170d8ce2ff169daa3da0586091aaf67ba895dc
-
Filesize
415KB
MD54582fbb2309fe7e291e08f9d3b5a4bbd
SHA16dcac71d5c1b07dc9de866af4ca1895384a0f4c3
SHA2566f5e4efd5ac1e3b02af836b25bf0ad875301bf1dda880a952496e5894bb1e73b
SHA512b41b524a0ed6bb069eed5d048afa5f8f86d50864ccc73724a8a7014193c66dfbbb4de6830e86a499edee66b88a170d8ce2ff169daa3da0586091aaf67ba895dc
-
Filesize
378KB
MD5d998fc9e2bcfb86e9c02c46fba685be8
SHA1036d9490e37c298b2bde5724c848e6dbf374da02
SHA2560d55fd6345b4c52959da0bfddb5c2828dd913ddea9cddc4dd38e192c00ac6450
SHA512990d3a915a9d6bf3808bfd53f68c416a031089676ee668731f3c82a087ddaee7cfa3da5b1a818885b866b5115222347e86cfd8a360896f13f8ed1521fdcae628
-
Filesize
378KB
MD5d998fc9e2bcfb86e9c02c46fba685be8
SHA1036d9490e37c298b2bde5724c848e6dbf374da02
SHA2560d55fd6345b4c52959da0bfddb5c2828dd913ddea9cddc4dd38e192c00ac6450
SHA512990d3a915a9d6bf3808bfd53f68c416a031089676ee668731f3c82a087ddaee7cfa3da5b1a818885b866b5115222347e86cfd8a360896f13f8ed1521fdcae628
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5908cc2dad5eb4412aaa2a85beb5f6341
SHA1a5f1b88092d219e71e8969d01ee2a3ae669a5600
SHA256210fc747617b64d2430897b4c11cd5dc81bc3a991d7c622b90918ce4d112baa4
SHA51238729498bd42d999c38dc769cc79057917a933080d608574460fe7ba7c9409db4e01979044151bc0922b1a9816398e25b7be59976bd318b1202b5d13fcf03cd9
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52e0f36916dbd566a883b163a4b22a01b
SHA1a9e561b5c6d635eafdfe09d14b625f21fd60335a
SHA256998d2c3381002dfcb0170a489c0e56a0e686a957a19737233485e7a6e0547232
SHA51220ceac5c5ea44bdd51c6b1cde30737e55628269d0bdd3d0bd1dd735c89f1f257a7ef86e3ec8209345dc251c0272ea32ed4890d80125133ec792f454c6f5af8b8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ab0581d3de2240ab0d6fb4269506e1c9
SHA18e6cc6121b706fa2ce2e6695c6678935b63e8788
SHA25689168ed991f5d6d79e045f073364792d8c1c7e0fe95e77b34f0a1197500dedfd
SHA5125dc8908a764bd8620726733770203ebddc9694f83136aae771ea67d313e8405cef335e4e4f455207ccd6d1e6c2f6046251a36dd687a0b7fa648a3ddcec8df36e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD552f1906de12765f8fb1b0db6e21f7a0e
SHA1b865b9f8bf265bd5bed5ae920e7ebb45632dfad5
SHA2568c3637d4068b822092102abd8290e53df7a90aa43acb2f2fb7a4fee209b4926d
SHA5125978b7253374a1ce398f91519aaa5852eaaf3682a9bbd2d9744d264d392e2c26355f7221e8ce17dbb7fcf4ec04fd92278792f2a0d82449c954ec384378287656
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53f2c1ebf292750418efc73162816f6c3
SHA118e87ca86c463adab21c5ffb638d4157d3d7db8d
SHA25644ae4fc4d29eff8f727a48cb9e9a66727a98dd18f13b7bbc9a290dc32bdd7324
SHA512d26416fa4b045c6550c5a2a6ca433823580b028e8e52cff221ddcefd77b3d77bfd8d6062fbf077ab3ccdf334e89197834aeaed203ab49d43572c0344e898bb1b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52d75484bd5ef017ca6fd820d1a54b85e
SHA15b0fdf15e19c9c0832a50ba5ce2232c523d01ead
SHA256ca73dde1e9215e543ba5d607eb66210103a502d061c7081c264cbc8d3b8a6b7b
SHA5121b50e7b0bf38295e379de6602b84340dee6efb85d63c27d33afefb6635d5caa497893f52cb8ed4a67cf988e3bad914997a9a1b474b9ebdc96e36ede37b4e15a0
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719