Analysis
-
max time kernel
104s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 11:42
Static task
static1
Behavioral task
behavioral1
Sample
fda7efe159818020483ea176cd15bcb0.exe
Resource
win10v2004-20231023-en
General
-
Target
fda7efe159818020483ea176cd15bcb0.exe
-
Size
1.2MB
-
MD5
fda7efe159818020483ea176cd15bcb0
-
SHA1
6971a6a05b1f2b7c14ec31731c87d86285a0da47
-
SHA256
1114fd06909159c440fadc3bdb3ce6a5fc1c2ac3bcac48dc3a6b4402eb245fcf
-
SHA512
33394ca5df0f50991847718e8ac82f2995d261786a59941c8594aea7c6182b1b0732da861b9622c2cdbc5e996f1f0d169aaa9874363ea37c2ed038a492171a03
-
SSDEEP
24576:ayK9Hsbp4uOqaRtBpXsQs9bedbzaPwZJkIH5lvdcwIB2WH64Uuqc:hesbK3tHe9bkrD9cNkWH6Hu
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3868-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/3868-31-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/3868-32-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/3868-34-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Glupteba payload 5 IoCs
resource yara_rule behavioral1/memory/1452-159-0x0000000002E10000-0x00000000036FB000-memory.dmp family_glupteba behavioral1/memory/1452-160-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1452-369-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1452-409-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/60-467-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6pO7Of4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6pO7Of4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6pO7Of4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6pO7Of4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6pO7Of4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6pO7Of4.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3928-36-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/files/0x0006000000022452-116.dat family_redline behavioral1/files/0x0006000000022452-118.dat family_redline behavioral1/memory/5088-120-0x0000000000B40000-0x0000000000B5E000-memory.dmp family_redline behavioral1/memory/2804-439-0x0000000000640000-0x000000000069A000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000022452-116.dat family_sectoprat behavioral1/files/0x0006000000022452-118.dat family_sectoprat behavioral1/memory/5088-120-0x0000000000B40000-0x0000000000B5E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4108 netsh.exe -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1840-68-0x0000000002370000-0x0000000002390000-memory.dmp net_reactor behavioral1/memory/1840-72-0x0000000004990000-0x00000000049AE000-memory.dmp net_reactor behavioral1/memory/1840-73-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-74-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-84-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-98-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-104-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-102-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-100-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-96-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-94-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-92-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-90-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-88-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-86-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-82-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-80-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-78-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/1840-76-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation 9A37.exe -
Executes dropped EXE 19 IoCs
pid Process 2996 Xm1id07.exe 5116 aF7Ke82.exe 3036 TI4NU73.exe 3104 2Rj1291.exe 824 3Uk39WW.exe 3908 4nQ043nr.exe 4984 5PH6Cp4.exe 1840 6pO7Of4.exe 2188 9A37.exe 5088 9B81.exe 3964 InstallSetup5.exe 3104 toolspub2.exe 3148 Broom.exe 1452 31839b57a4f11171d6abc8bbc4451ee4.exe 3908 toolspub2.exe 60 31839b57a4f11171d6abc8bbc4451ee4.exe 2100 ECDE.exe 1156 F962.exe 2804 FC41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0006000000022e4a-699.dat upx behavioral1/files/0x0006000000022e4a-700.dat upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6pO7Of4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6pO7Of4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fda7efe159818020483ea176cd15bcb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Xm1id07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" aF7Ke82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" TI4NU73.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3104 set thread context of 3868 3104 2Rj1291.exe 104 PID 824 set thread context of 3928 824 3Uk39WW.exe 109 PID 3908 set thread context of 2980 3908 4nQ043nr.exe 120 PID 3104 set thread context of 3908 3104 toolspub2.exe 131 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 384 sc.exe 4172 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4928 3868 WerFault.exe 104 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5PH6Cp4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5PH6Cp4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5PH6Cp4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4524 schtasks.exe 1080 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4984 5PH6Cp4.exe 4984 5PH6Cp4.exe 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 1840 6pO7Of4.exe 1840 6pO7Of4.exe 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found 3368 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4984 5PH6Cp4.exe 3908 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1840 6pO7Of4.exe Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeDebugPrivilege 5088 9B81.exe Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeDebugPrivilege 1344 powershell.exe Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeDebugPrivilege 1452 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1452 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found Token: SeDebugPrivilege 2804 FC41.exe Token: SeShutdownPrivilege 3368 Process not Found Token: SeCreatePagefilePrivilege 3368 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3148 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 2996 864 fda7efe159818020483ea176cd15bcb0.exe 89 PID 864 wrote to memory of 2996 864 fda7efe159818020483ea176cd15bcb0.exe 89 PID 864 wrote to memory of 2996 864 fda7efe159818020483ea176cd15bcb0.exe 89 PID 2996 wrote to memory of 5116 2996 Xm1id07.exe 90 PID 2996 wrote to memory of 5116 2996 Xm1id07.exe 90 PID 2996 wrote to memory of 5116 2996 Xm1id07.exe 90 PID 5116 wrote to memory of 3036 5116 aF7Ke82.exe 91 PID 5116 wrote to memory of 3036 5116 aF7Ke82.exe 91 PID 5116 wrote to memory of 3036 5116 aF7Ke82.exe 91 PID 3036 wrote to memory of 3104 3036 TI4NU73.exe 92 PID 3036 wrote to memory of 3104 3036 TI4NU73.exe 92 PID 3036 wrote to memory of 3104 3036 TI4NU73.exe 92 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3104 wrote to memory of 3868 3104 2Rj1291.exe 104 PID 3036 wrote to memory of 824 3036 TI4NU73.exe 105 PID 3036 wrote to memory of 824 3036 TI4NU73.exe 105 PID 3036 wrote to memory of 824 3036 TI4NU73.exe 105 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 824 wrote to memory of 3928 824 3Uk39WW.exe 109 PID 5116 wrote to memory of 3908 5116 aF7Ke82.exe 110 PID 5116 wrote to memory of 3908 5116 aF7Ke82.exe 110 PID 5116 wrote to memory of 3908 5116 aF7Ke82.exe 110 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 3908 wrote to memory of 2980 3908 4nQ043nr.exe 120 PID 2996 wrote to memory of 4984 2996 Xm1id07.exe 121 PID 2996 wrote to memory of 4984 2996 Xm1id07.exe 121 PID 2996 wrote to memory of 4984 2996 Xm1id07.exe 121 PID 864 wrote to memory of 1840 864 fda7efe159818020483ea176cd15bcb0.exe 122 PID 864 wrote to memory of 1840 864 fda7efe159818020483ea176cd15bcb0.exe 122 PID 864 wrote to memory of 1840 864 fda7efe159818020483ea176cd15bcb0.exe 122 PID 3368 wrote to memory of 2188 3368 Process not Found 124 PID 3368 wrote to memory of 2188 3368 Process not Found 124 PID 3368 wrote to memory of 2188 3368 Process not Found 124 PID 3368 wrote to memory of 5088 3368 Process not Found 126 PID 3368 wrote to memory of 5088 3368 Process not Found 126 PID 3368 wrote to memory of 5088 3368 Process not Found 126 PID 2188 wrote to memory of 3964 2188 9A37.exe 127 PID 2188 wrote to memory of 3964 2188 9A37.exe 127 PID 2188 wrote to memory of 3964 2188 9A37.exe 127 PID 2188 wrote to memory of 3104 2188 9A37.exe 128 PID 2188 wrote to memory of 3104 2188 9A37.exe 128 PID 2188 wrote to memory of 3104 2188 9A37.exe 128 PID 3964 wrote to memory of 3148 3964 InstallSetup5.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda7efe159818020483ea176cd15bcb0.exe"C:\Users\Admin\AppData\Local\Temp\fda7efe159818020483ea176cd15bcb0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm1id07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm1id07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aF7Ke82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aF7Ke82.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TI4NU73.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TI4NU73.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Rj1291.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Rj1291.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 5407⤵
- Program crash
PID:4928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Uk39WW.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Uk39WW.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nQ043nr.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nQ043nr.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5PH6Cp4.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5PH6Cp4.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6pO7Of4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6pO7Of4.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3868 -ip 38681⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\9A37.exeC:\Users\Admin\AppData\Local\Temp\9A37.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
PID:60 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:4432
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4108
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4156
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:2092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:748
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4524
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:3136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:4644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1080
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:5040
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2828
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:4172
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4936
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:384
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9B81.exeC:\Users\Admin\AppData\Local\Temp\9B81.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
C:\Users\Admin\AppData\Local\Temp\ECDE.exeC:\Users\Admin\AppData\Local\Temp\ECDE.exe1⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\F962.exeC:\Users\Admin\AppData\Local\Temp\F962.exe1⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\FC41.exeC:\Users\Admin\AppData\Local\Temp\FC41.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
C:\Users\Admin\AppData\Local\Temp\3FC3.exeC:\Users\Admin\AppData\Local\Temp\3FC3.exe1⤵PID:1200
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵PID:3292
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50afd29b928418e48de93ad4cd299d9e9
SHA1464949aeb08839bbc5c9bba1e65bcaf18e1763ea
SHA25629680de75e55d9b01e021bb387065d3085d0ee422d8ad2d53cd38074b98276c8
SHA512a2b9683cc2450449874617fcc36af6779fe3e8bcdffa7c1f31be0189dbaeb1597330a5996dfd40a46e54dd6fe1ec162fe37160858941d41b518b7325e0ac212f
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
17.5MB
MD5ca18c2fc430d73758ee4b12f5108e413
SHA1797ae4efd35ca73e1666deda68b9d0abdfd085e1
SHA2564f3d3b8e805a031fe8eeb47dca418fcbcade5d0190ecdee8930e942c9b4028ea
SHA512f2c0fb3ddcaeac90411bd63ad2f96315e5337b7c6a3b170873ff8d51650022027f93f3307859b6a769c38be9c3fec3745e87eda9c231dae1dd6b59a6e416a571
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
6.9MB
MD5d9921e971523d3f4b1debc3e90e62096
SHA122edc25bf24193c00d139e2253ec4c6fb04e6c76
SHA256cf7afbb776ecb9d56aadbe8b35a2491d92c2eb30cf3b4b121fec74d8d285d88d
SHA5128f3291b7e9944b437390baa272c2c6bca99678e58fd360c83bdbb9240348baf1efbc3dca26da1b9d570d488bbb598058d8ac48a543da5aefc223794f2639033f
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
16.6MB
MD5348593e71c103f495e315d3af79124e5
SHA164357c653e315a563a85f58eb236db780ce9a7c0
SHA2568c239b7ab61ba158fd64e4ee080b23d024d27f63b1ce055f69f8fee6c1b67b1d
SHA512ee0ebf6c60e91448defe5a0409d0e39a1757711ba3973e7add5827d51a3f4399136a41c894f4de62032c36b3579dce675fd8efd6df5d301816500971d716d9ca
-
Filesize
16.6MB
MD5348593e71c103f495e315d3af79124e5
SHA164357c653e315a563a85f58eb236db780ce9a7c0
SHA2568c239b7ab61ba158fd64e4ee080b23d024d27f63b1ce055f69f8fee6c1b67b1d
SHA512ee0ebf6c60e91448defe5a0409d0e39a1757711ba3973e7add5827d51a3f4399136a41c894f4de62032c36b3579dce675fd8efd6df5d301816500971d716d9ca
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
4.0MB
MD5547267d1f4af300668737da9e4979413
SHA1801ddcf4bf33609da1b2b0f88ebbd5f1107600b4
SHA2564ecddc16e5b3e808518b5ba17950c04427f9de389259b4027ad76ac5289e0d8a
SHA512118ddcdce722238ac207cde3053389699b396ba3af796f86140ad6a0072ffe7162ab150d82f8c3d6ca28f49f726c16551bfa5d56a8bec0bbc143092024f24b0a
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
398KB
MD5f1510fe47cc99552fcf94ddf5dc7a615
SHA162ceec2cb2041bb3fcdfe0aaf383bc73f527558a
SHA256478835ca1137267822d1caee2fa8aa278badedb7f0a73e3d12c93805a33ec4d6
SHA51258b06476209f4b4b364790810896893aeefaef1540f131ba84392c743aa45982d209f06a16317433218c045e0788b4297c5822bb10d993d23234892fdcec73a5
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1006KB
MD5cb0fa4b4947726815ab2e2988c45ea18
SHA1753015265ea974f4e120b7151c41b3942e8880ac
SHA256b30e62df11113894f2d61dfcab8aead79b4bb34093d099237dc0e408ae73c2ca
SHA51264b6fe34210f787a41f3a3327e82e9643f7d69207d25a19ebdfc342458d52c015c42e7740d129dee86a63dc9f187a776d164e27d020c8d12946d7c7b6a36e1e9
-
Filesize
1006KB
MD5cb0fa4b4947726815ab2e2988c45ea18
SHA1753015265ea974f4e120b7151c41b3942e8880ac
SHA256b30e62df11113894f2d61dfcab8aead79b4bb34093d099237dc0e408ae73c2ca
SHA51264b6fe34210f787a41f3a3327e82e9643f7d69207d25a19ebdfc342458d52c015c42e7740d129dee86a63dc9f187a776d164e27d020c8d12946d7c7b6a36e1e9
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
881KB
MD5fcd113edd54f0bd20677d3ad0bbcb432
SHA1f5a25aaa5207b8982053bb4a0ffbaa7706e20751
SHA256517bdf26ff4ce655e4d3fe040884d262eea8c831d3156880c1abd1da62eefd79
SHA5124765a80d5149d0007b3b116830e7368e6f8b5a77958022a7f9ca612d661a129d6164f55513bbf72556c47726ded9f4511944e628080590385be0b74497ce60e0
-
Filesize
881KB
MD5fcd113edd54f0bd20677d3ad0bbcb432
SHA1f5a25aaa5207b8982053bb4a0ffbaa7706e20751
SHA256517bdf26ff4ce655e4d3fe040884d262eea8c831d3156880c1abd1da62eefd79
SHA5124765a80d5149d0007b3b116830e7368e6f8b5a77958022a7f9ca612d661a129d6164f55513bbf72556c47726ded9f4511944e628080590385be0b74497ce60e0
-
Filesize
717KB
MD5bbaf2eae7073fac01d3990c60316cab5
SHA1a505ac5df7d0bd0509b9a0422a9ea5b7061ebc13
SHA256b62a25a88c2bece893eb259f91cab9316203088deef36493899ea46ba6bd1fe6
SHA5120272ecf00aacf814054267b2bb7b8b070313936d45f946aff51c41af55ab4a0f4debb06a73b6b6b9c257a4f6f87437f8b6838b2023f386995a207d5f9f0b0dbf
-
Filesize
717KB
MD5bbaf2eae7073fac01d3990c60316cab5
SHA1a505ac5df7d0bd0509b9a0422a9ea5b7061ebc13
SHA256b62a25a88c2bece893eb259f91cab9316203088deef36493899ea46ba6bd1fe6
SHA5120272ecf00aacf814054267b2bb7b8b070313936d45f946aff51c41af55ab4a0f4debb06a73b6b6b9c257a4f6f87437f8b6838b2023f386995a207d5f9f0b0dbf
-
Filesize
419KB
MD571dd3a5551087342d102f64dcf00ba57
SHA1bda313e4991459c32246da3fe041d57cef37b9f6
SHA2565b3204265d8cca06835e10a7243d63681cfb7c7b5bdc52a07d46def8856e299c
SHA512bb86373896e5549648830fa2d7d7c854370e7a5445f51b32c7188a7fbff7446742cabaeda032f23e9eed96e94315b59fb1a23f21fc7bf17515faba9a8f9c3b40
-
Filesize
419KB
MD571dd3a5551087342d102f64dcf00ba57
SHA1bda313e4991459c32246da3fe041d57cef37b9f6
SHA2565b3204265d8cca06835e10a7243d63681cfb7c7b5bdc52a07d46def8856e299c
SHA512bb86373896e5549648830fa2d7d7c854370e7a5445f51b32c7188a7fbff7446742cabaeda032f23e9eed96e94315b59fb1a23f21fc7bf17515faba9a8f9c3b40
-
Filesize
369KB
MD55fbd11046b2436f906d46aa9f6cefd64
SHA1168bc3afeb84233ee5b3dfe68260158c9086654f
SHA256c45bfea0a1403215b32bd32e6d27cb7a844f6a1b1522e2e6c7f332a1446f34cc
SHA512b77d5d9a93763b606f42b34dbde7f104ff0f33c61dba19861f9e59c19a647c65d0a59509daed5c27785587331228e3e5fac558e96300930b4c7070ca07c835f2
-
Filesize
369KB
MD55fbd11046b2436f906d46aa9f6cefd64
SHA1168bc3afeb84233ee5b3dfe68260158c9086654f
SHA256c45bfea0a1403215b32bd32e6d27cb7a844f6a1b1522e2e6c7f332a1446f34cc
SHA512b77d5d9a93763b606f42b34dbde7f104ff0f33c61dba19861f9e59c19a647c65d0a59509daed5c27785587331228e3e5fac558e96300930b4c7070ca07c835f2
-
Filesize
408KB
MD5bb2bd3ad7331016abb99a4aa04d01985
SHA1c934d789f789987b7b43215ecc1edc3a37432a97
SHA256957782d1bba83d34e3d5bdc33571dc239ec70727ccdc7844dfc587dcc1968a2e
SHA512286dfa8b38f48993ffac5a4fbca30018dfe474441218847f6eb7534c6ce5e4f3ab0cc0d691777ffec2eed164a13a22e4c4bf155641447251a3bfd2bd3fe7e742
-
Filesize
408KB
MD5bb2bd3ad7331016abb99a4aa04d01985
SHA1c934d789f789987b7b43215ecc1edc3a37432a97
SHA256957782d1bba83d34e3d5bdc33571dc239ec70727ccdc7844dfc587dcc1968a2e
SHA512286dfa8b38f48993ffac5a4fbca30018dfe474441218847f6eb7534c6ce5e4f3ab0cc0d691777ffec2eed164a13a22e4c4bf155641447251a3bfd2bd3fe7e742
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2.9MB
MD5461bf3b779570b6b0143f15253146e77
SHA107326c785add5b76596c08d5557c61018efc35b9
SHA256f7dfb71f07e1a8482f8f33978dcb28407accd170986ee244502d93939c2dea2c
SHA512707dddaad770e201f6dd472cb34d2578847b45dbdd4cfaf999a2991299ae9e1e271f071e966f8e4b26fe2d71d059a89176976a0de0c580f7051bc17fdc1d6566
-
Filesize
3.1MB
MD53131018199e4867ed056b36a997aad43
SHA14a0adf2cc3cd1bb89e4c9a2acef67000f885a832
SHA256341d226007ad3b71c9b1e065eade4b8415aba30c5b0ed69758dffbb1e980bbd5
SHA512a1f1263f290fe8ae29ced94e1233dc56588d9d1f7e1050941dc67aa34b87aa3a8a17e05ea29abe78bee8e03856e6923224231bb1445519ef35f92898f5b34400
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
301KB
MD507f4bbf18077231cb44750684dd8daf4
SHA18560627e9e05d6022abdfe7e576856e91ac90188
SHA2564a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316
SHA51204e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5bc741c35d494c3fef538368b3cd7e208
SHA171deaa958eaf18155e7cdc5494e11c27e48de248
SHA25697658ad66f5cb0e36960d9b2860616359e050aad8251262b49572969c4d71096
SHA512be8931de8578802ff899ef8f77339fe4d61df320e91dd473db1dc69293ed43cd69198bbbeb3e5b39011922b26b4e5a683e082af68e9d014d4e20d43f1d5bcc30
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
Filesize
217KB
MD5aec6574d82d7e5f96a01f9f048192490
SHA10286b5d6fa5fb8c17fcab11648857e91fbba803f
SHA2564502fe32e39a7351336cde70507ee3f07eaad121a4dda4757608fc7354c7d157
SHA51253848861e058547c4ad7faa29afe33b1df2382ab28689627c70e3ea8fd39014244a093d6e49294663e669becd3251126fb3e72f05f5e136a25c0aafb46aa755c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52ef8a085f00d10f5612cbbc898838dbc
SHA11606c5447af173ab998c2dafc1a9e4da414cf88d
SHA256b7ee0d1d31b6fb203408ad6159157ee08eccdfe1ad1128630e6d8a9217056d9e
SHA51207b15f99e1d2304b0dc8ac95a14c724db07d6704801e9bb6fbc0d1e6b3c55437200387575083600202aa78c7a18e47cd180e755fcc73499452668903a269a92c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD598e28d5eb89f7f5ae065083e97b3443f
SHA18df0016153d297a12e3672c6686a3722d3b55c8b
SHA2560f263c5226b1ac266e6d47dd2db57c12ebb825d133190fa10ee10f2d0ccc6bc2
SHA51224c1bb9a033c8b9f6ba01b79338fb73a55d92e6b09c0358bf84b5cfb65c56f9b3d0333b6b87cbb172d929cd5931503065cfc5dae396fb5b066b8e2577c317c14
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5804687a0ad05995fc08c1c1af7cc614b
SHA1107d5cefa12d0a2e4caca2e9b0d01ee7748cb670
SHA256fff00c4a46d1c134c1756c6296215cc8abdd55e1101077f8fdce40359d4ade05
SHA512b5d6e79dd18fe00d0a129954e25af056e77b86367657ba71509c464ac8f236b159a14af2b0ca33dc90507daae0fb4aefa3c000b1030f942a3533570664bc8419
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD590b4834004df8e5f6d08ebf90cf49c8b
SHA12318f24cc7bad394f302e30e85f1103ea026739f
SHA256cf94128f632708456f9142517e3a5d098052a0e86e2ee87e84d0c03a56519f15
SHA512a20c28e872ccf4e8241e05c55d8829048f5672a85b1d7a4c3912e31d26be15feea54b51a8f77dc66a5b966232dcaf163ac7c30a030c1b1381091e92b1d9dc4dd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52b10e55d05961ed64adf112b115b3ef1
SHA14c4f1a0a70eecf41320eca59751db0fe323ffa42
SHA2566d33084296ea5355df46a6708f0c30c8f8540a66151cbe6f40beec2bfa7b7dcd
SHA512a7f05ffa7376df48dd34ce6784f10e56205af4ed4db5bb4fd3b8a04e5d8a9ac995afcb5282a3c0dc19e7e9cdb887636e5edf5d6a13416536917a754b06107229
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
4.1MB
MD5678d96ed3b847d538803bbab728646f4
SHA12ab98c0bea2169560e6bafc5fc613027a5683504
SHA25655689805dbe6d94feacbc6c863e4fa0dc0d9b4612db3497f731cd64b64b9346d
SHA5126c69359ad731d991feb895685df1549b75b0f73b55eb852bb70cb36cf22e06af52e4b89038672b15532a32673b4b77a2acbe88e1068ab0a8c066a52341c01245
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec