Analysis
-
max time kernel
105s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2023 20:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231020-en
General
-
Target
file.exe
-
Size
288KB
-
MD5
c04ee29cc098afc72469c1bd01b06dd4
-
SHA1
31dfc31f70793781e024251f5692b0f31cf96910
-
SHA256
49f65e66b00f5178744bb3e3c1f7572aad43485fbbf6b4a3f729e58bf86c8d74
-
SHA512
6ce5e9586fcf6c665305be1044703167a7f25e6450c95a013aa12d9a0c2a82cee4ce9bbf087b5b3db49139237bb030958326a8741746cb870f0f344e09c2ce66
-
SSDEEP
3072:FIy+dIrLEj2qPpwqRY29MX6Xn/xQ5mg1/4r/E5kVyBk3eFx/RiPB:a5dALEjV1MXYBk/YQ+
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
194.49.94.181:40264
Extracted
amadey
4.12
http://185.172.128.19
-
install_dir
cd1f156d67
-
install_file
Utsysc.exe
-
strings_key
0dd3e5ee91b367c60c9e575983554b30
-
url_paths
/ghsdh39s/index.php
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.gycc
-
offline_id
nN1rRlTxKTPo66pmJEAHwufZ2Dhz4MsNxIlOk6t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-CDZ4hMgp2X Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0829ASdw
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detected Djvu ransomware 8 IoCs
Processes:
resource yara_rule behavioral2/memory/3872-156-0x0000000004900000-0x0000000004A1B000-memory.dmp family_djvu behavioral2/memory/1608-160-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1608-165-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1608-166-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1608-239-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1828-295-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1828-296-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1828-298-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2908-266-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2908-290-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1936-309-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1936-389-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2908-390-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3248-91-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
15F6.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15F6.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
15F6.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15F6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15F6.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1057.exe36FE.exe4299.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation 1057.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation 36FE.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation 4299.exe -
Deletes itself 1 IoCs
Processes:
pid process 3184 -
Executes dropped EXE 20 IoCs
Processes:
1057.exe15F6.exe1991.exe2D58.exe36FE.exe3EEE.exe288c47bbc1871b439df19ff4df68f076.exeInstallSetup8.exe4299.exeBroom.exe1057.exe4299.exed21cbe21e38b385a41a68c5e6dd32f4c.exe1057.exetoolspub2.exetoolspub2.exe1057.exed21cbe21e38b385a41a68c5e6dd32f4c.exe288c47bbc1871b439df19ff4df68f076.execsrss.exepid process 3872 1057.exe 3748 15F6.exe 3604 1991.exe 2432 2D58.exe 4468 36FE.exe 2000 3EEE.exe 2908 288c47bbc1871b439df19ff4df68f076.exe 1196 InstallSetup8.exe 3924 4299.exe 632 Broom.exe 1608 1057.exe 888 4299.exe 1936 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1632 1057.exe 4908 toolspub2.exe 1424 toolspub2.exe 1828 1057.exe 3216 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4528 288c47bbc1871b439df19ff4df68f076.exe 2948 csrss.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 5064 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\15F6.exe themida C:\Users\Admin\AppData\Local\Temp\15F6.exe themida behavioral2/memory/3748-81-0x00000000004D0000-0x0000000000D02000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1057.exed21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2dd17ea0-c8d7-4378-95da-3c1dc5c674a4\\1057.exe\" --AutoStart" 1057.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
15F6.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 15F6.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 60 api.2ip.ua 61 api.2ip.ua -
Drops file in System32 directory 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
15F6.exepid process 3748 15F6.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
1991.exe1057.exepowershell.exe1057.exedescription pid process target process PID 3604 set thread context of 3248 3604 1991.exe AppLaunch.exe PID 3872 set thread context of 1608 3872 1057.exe 1057.exe PID 4908 set thread context of 1424 4908 powershell.exe toolspub2.exe PID 1632 set thread context of 1828 1632 1057.exe 1057.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exe288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 2 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4472 1828 WerFault.exe 1057.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2D58.exetoolspub2.exefile.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2D58.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2D58.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2D58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1168 schtasks.exe 3564 schtasks.exe 1120 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 5076 file.exe 5076 file.exe 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 3184 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3184 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
file.exe2D58.exetoolspub2.exepid process 5076 file.exe 3184 3184 3184 3184 2432 2D58.exe 1424 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
3EEE.exeAppLaunch.exe15F6.exepowershell.exepowershell.exed21cbe21e38b385a41a68c5e6dd32f4c.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 2000 3EEE.exe Token: SeDebugPrivilege 3248 AppLaunch.exe Token: SeDebugPrivilege 3748 15F6.exe Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 1936 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 1936 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeDebugPrivilege 2908 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2908 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 2908 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2908 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 4908 powershell.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 3604 powershell.exe Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 1596 powershell.exe Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 2352 powershell.exe Token: SeShutdownPrivilege 3184 Token: SeCreatePagefilePrivilege 3184 Token: SeDebugPrivilege 4164 powershell.exe Token: SeShutdownPrivilege 3184 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Broom.exepid process 632 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe1991.exe36FE.exeInstallSetup8.exe4299.exe1057.exe1057.exedescription pid process target process PID 3184 wrote to memory of 3872 3184 1057.exe PID 3184 wrote to memory of 3872 3184 1057.exe PID 3184 wrote to memory of 3872 3184 1057.exe PID 3184 wrote to memory of 4344 3184 regsvr32.exe PID 3184 wrote to memory of 4344 3184 regsvr32.exe PID 4344 wrote to memory of 5064 4344 regsvr32.exe regsvr32.exe PID 4344 wrote to memory of 5064 4344 regsvr32.exe regsvr32.exe PID 4344 wrote to memory of 5064 4344 regsvr32.exe regsvr32.exe PID 3184 wrote to memory of 3748 3184 15F6.exe PID 3184 wrote to memory of 3748 3184 15F6.exe PID 3184 wrote to memory of 3748 3184 15F6.exe PID 3184 wrote to memory of 3604 3184 1991.exe PID 3184 wrote to memory of 3604 3184 1991.exe PID 3184 wrote to memory of 3604 3184 1991.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3604 wrote to memory of 3248 3604 1991.exe AppLaunch.exe PID 3184 wrote to memory of 2432 3184 2D58.exe PID 3184 wrote to memory of 2432 3184 2D58.exe PID 3184 wrote to memory of 2432 3184 2D58.exe PID 3184 wrote to memory of 4468 3184 36FE.exe PID 3184 wrote to memory of 4468 3184 36FE.exe PID 3184 wrote to memory of 4468 3184 36FE.exe PID 3184 wrote to memory of 2000 3184 3EEE.exe PID 3184 wrote to memory of 2000 3184 3EEE.exe PID 3184 wrote to memory of 2000 3184 3EEE.exe PID 4468 wrote to memory of 2908 4468 36FE.exe 288c47bbc1871b439df19ff4df68f076.exe PID 4468 wrote to memory of 2908 4468 36FE.exe 288c47bbc1871b439df19ff4df68f076.exe PID 4468 wrote to memory of 2908 4468 36FE.exe 288c47bbc1871b439df19ff4df68f076.exe PID 4468 wrote to memory of 1196 4468 36FE.exe InstallSetup8.exe PID 4468 wrote to memory of 1196 4468 36FE.exe InstallSetup8.exe PID 4468 wrote to memory of 1196 4468 36FE.exe InstallSetup8.exe PID 3184 wrote to memory of 3924 3184 4299.exe PID 3184 wrote to memory of 3924 3184 4299.exe PID 3184 wrote to memory of 3924 3184 4299.exe PID 3184 wrote to memory of 4996 3184 explorer.exe PID 3184 wrote to memory of 4996 3184 explorer.exe PID 3184 wrote to memory of 4996 3184 explorer.exe PID 3184 wrote to memory of 4996 3184 explorer.exe PID 3184 wrote to memory of 4680 3184 explorer.exe PID 3184 wrote to memory of 4680 3184 explorer.exe PID 3184 wrote to memory of 4680 3184 explorer.exe PID 1196 wrote to memory of 632 1196 InstallSetup8.exe Broom.exe PID 1196 wrote to memory of 632 1196 InstallSetup8.exe Broom.exe PID 1196 wrote to memory of 632 1196 InstallSetup8.exe Broom.exe PID 3924 wrote to memory of 1168 3924 4299.exe schtasks.exe PID 3924 wrote to memory of 1168 3924 4299.exe schtasks.exe PID 3924 wrote to memory of 1168 3924 4299.exe schtasks.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 3872 wrote to memory of 1608 3872 1057.exe 1057.exe PID 1608 wrote to memory of 4012 1608 1057.exe icacls.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5076
-
C:\Users\Admin\AppData\Local\Temp\1057.exeC:\Users\Admin\AppData\Local\Temp\1057.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\1057.exeC:\Users\Admin\AppData\Local\Temp\1057.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2dd17ea0-c8d7-4378-95da-3c1dc5c674a4" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\1057.exe"C:\Users\Admin\AppData\Local\Temp\1057.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1057.exe"C:\Users\Admin\AppData\Local\Temp\1057.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 5685⤵
- Program crash
PID:4472
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\12B9.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\12B9.dll2⤵
- Loads dropped DLL
PID:5064
-
C:\Users\Admin\AppData\Local\Temp\15F6.exeC:\Users\Admin\AppData\Local\Temp\15F6.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
C:\Users\Admin\AppData\Local\Temp\1991.exeC:\Users\Admin\AppData\Local\Temp\1991.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
C:\Users\Admin\AppData\Local\Temp\2D58.exeC:\Users\Admin\AppData\Local\Temp\2D58.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2432
-
C:\Users\Admin\AppData\Local\Temp\36FE.exeC:\Users\Admin\AppData\Local\Temp\36FE.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:4528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3556
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3EEE.exeC:\Users\Admin\AppData\Local\Temp\3EEE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4076
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1564
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\4299.exeC:\Users\Admin\AppData\Local\Temp\4299.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 4299.exe /TR "C:\Users\Admin\AppData\Local\Temp\4299.exe" /F2⤵
- Creates scheduled task(s)
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\1000008001\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:676 -
C:\Users\Admin\AppData\Local\Temp\1000008001\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3492
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:3516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2188
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3564 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1512
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1072
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:3344
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1120 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:2824
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:4700
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\1000009001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\toolspub2.exe"2⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\1000009001\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1424
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4996
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\4299.exeC:\Users\Admin\AppData\Local\Temp\4299.exe1⤵
- Executes dropped EXE
PID:888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1828 -ip 18281⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\4299.exeC:\Users\Admin\AppData\Local\Temp\4299.exe1⤵PID:2564
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ce37f6e91c2378919b810b17ad2144df
SHA1bac00ebeda1ba1e90a986bf6df7ae0191dec4a71
SHA2568111edcc7482d098bc8b5e135bafe991c2b4dda5b04c89f11e15a2337fd054d5
SHA512b652f070f6c2569ac92b3a8bede1d557ae0aa1da7337b71260f67d9cb81c3ac5943e2bbae31feeaba50935f69aa7ae8b3e5100c14691cf937f85f7c0db8f3f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52fce552b5a1a5438e1f7e4e3842aa559
SHA17130b5865e38b1dad5c6c9d846802b75c6ad16b0
SHA25690d243dbe839126726e42b8d958a63736a1533097152dee5ac3e6cd684054aad
SHA5121fc0f42101c5e445850087bbc9360f5a87c5bdc9a99e00af3b1b1072badba00bc28887b5297f48fb5bbe0907fb667c04bf590fbf050fda5967bf3ee4993dde75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52fce552b5a1a5438e1f7e4e3842aa559
SHA17130b5865e38b1dad5c6c9d846802b75c6ad16b0
SHA25690d243dbe839126726e42b8d958a63736a1533097152dee5ac3e6cd684054aad
SHA5121fc0f42101c5e445850087bbc9360f5a87c5bdc9a99e00af3b1b1072badba00bc28887b5297f48fb5bbe0907fb667c04bf590fbf050fda5967bf3ee4993dde75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD550b31a0b1c9150a1558c569fde67279b
SHA1cb525987b5c4eb55ee3e7d9c64872ac9926ecf8a
SHA256ed005b7a2d65c7c5222cb40c0623a7d0dc7080a2362b79f1a89140ec1c510a88
SHA512635e55fb84549992b7d2c8aacf34ab8d87f88f3a430c6dfa720b1df08a44ffcb95cf44e51fe2363404249bd7a66001488a497326a3e79842a67f7572488a799b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD550b31a0b1c9150a1558c569fde67279b
SHA1cb525987b5c4eb55ee3e7d9c64872ac9926ecf8a
SHA256ed005b7a2d65c7c5222cb40c0623a7d0dc7080a2362b79f1a89140ec1c510a88
SHA512635e55fb84549992b7d2c8aacf34ab8d87f88f3a430c6dfa720b1df08a44ffcb95cf44e51fe2363404249bd7a66001488a497326a3e79842a67f7572488a799b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD550b31a0b1c9150a1558c569fde67279b
SHA1cb525987b5c4eb55ee3e7d9c64872ac9926ecf8a
SHA256ed005b7a2d65c7c5222cb40c0623a7d0dc7080a2362b79f1a89140ec1c510a88
SHA512635e55fb84549992b7d2c8aacf34ab8d87f88f3a430c6dfa720b1df08a44ffcb95cf44e51fe2363404249bd7a66001488a497326a3e79842a67f7572488a799b
-
Filesize
832KB
MD5ef4690a39d2df67899b879f38704d0bd
SHA13625f5087fec6b89977f4f49a9cae32d731aaebc
SHA25600ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214
SHA512283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084
-
Filesize
2KB
MD51d7f3d1036cc09d2b9c5d8d5acfbb867
SHA15a76ade3e2ced7d72b6ce450b074d3c5aaa13b85
SHA2560725190ee120338da973024f3d633bd17d0009af194000fa0a91dde961a8d76c
SHA512dc993da2058b91cd4870b0e868963cadd68d0c03aee091691d7ed0a027215ef5114c9d56ec8d9e228cd7d022339d277903fc12481e2e00df758a3915a17d1fd8
-
Filesize
21KB
MD548653b60f2dc3601ac92a2aa555058e9
SHA166c59a14133cd4606383708fd43306a3158ecfee
SHA256532884747af860ba4ab5f51e1f8cc009b49f87cd61e5b3741a9166baa90717de
SHA512c246e1c6a5798792418ce269970d47effa79477a7409cbdf326dd0e3eac11b2ede34439f8b5855be2e88942d4410c29d076638897f7945601cb6cf63e7d01d55
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
289KB
MD585745cf10b15ccdcaf76d598765d5b65
SHA12530a66f5d89466c40311138543ca5fc2f9d5906
SHA2560e108094c03f03787a8bad88b11746a478f9cc25255542682eee92723a9c273b
SHA512adc85bd3efe9ab48b5340cf9c023987a0394f6174661e67d16ad10d9cde236244c346775c4505f73ce00a90a0c818a70332fffbd4abfa1e2bced7e9f28d1bddb
-
Filesize
289KB
MD585745cf10b15ccdcaf76d598765d5b65
SHA12530a66f5d89466c40311138543ca5fc2f9d5906
SHA2560e108094c03f03787a8bad88b11746a478f9cc25255542682eee92723a9c273b
SHA512adc85bd3efe9ab48b5340cf9c023987a0394f6174661e67d16ad10d9cde236244c346775c4505f73ce00a90a0c818a70332fffbd4abfa1e2bced7e9f28d1bddb
-
Filesize
289KB
MD585745cf10b15ccdcaf76d598765d5b65
SHA12530a66f5d89466c40311138543ca5fc2f9d5906
SHA2560e108094c03f03787a8bad88b11746a478f9cc25255542682eee92723a9c273b
SHA512adc85bd3efe9ab48b5340cf9c023987a0394f6174661e67d16ad10d9cde236244c346775c4505f73ce00a90a0c818a70332fffbd4abfa1e2bced7e9f28d1bddb
-
Filesize
289KB
MD585745cf10b15ccdcaf76d598765d5b65
SHA12530a66f5d89466c40311138543ca5fc2f9d5906
SHA2560e108094c03f03787a8bad88b11746a478f9cc25255542682eee92723a9c273b
SHA512adc85bd3efe9ab48b5340cf9c023987a0394f6174661e67d16ad10d9cde236244c346775c4505f73ce00a90a0c818a70332fffbd4abfa1e2bced7e9f28d1bddb
-
Filesize
832KB
MD5ef4690a39d2df67899b879f38704d0bd
SHA13625f5087fec6b89977f4f49a9cae32d731aaebc
SHA25600ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214
SHA512283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084
-
Filesize
832KB
MD5ef4690a39d2df67899b879f38704d0bd
SHA13625f5087fec6b89977f4f49a9cae32d731aaebc
SHA25600ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214
SHA512283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084
-
Filesize
832KB
MD5ef4690a39d2df67899b879f38704d0bd
SHA13625f5087fec6b89977f4f49a9cae32d731aaebc
SHA25600ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214
SHA512283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084
-
Filesize
832KB
MD5ef4690a39d2df67899b879f38704d0bd
SHA13625f5087fec6b89977f4f49a9cae32d731aaebc
SHA25600ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214
SHA512283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084
-
Filesize
832KB
MD5ef4690a39d2df67899b879f38704d0bd
SHA13625f5087fec6b89977f4f49a9cae32d731aaebc
SHA25600ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214
SHA512283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084
-
Filesize
1.6MB
MD54164fa66f608eb71f038fa7ee6ece5bc
SHA1d879704e3d4f1ddb97cde3100962dfb684458c27
SHA256b43fbe5adf27e984234a4abff46adc22241bcb5b894ce7b518aa024a4c6556f8
SHA51235dbc13c03cb155ad920fc82de78456cc0aa174671a7ac96953693111596be2bd30e4a0d35e2002f66ddc4e3341f90c3a2d71f35607eaca4673e6a5b6b76edb0
-
Filesize
1.6MB
MD54164fa66f608eb71f038fa7ee6ece5bc
SHA1d879704e3d4f1ddb97cde3100962dfb684458c27
SHA256b43fbe5adf27e984234a4abff46adc22241bcb5b894ce7b518aa024a4c6556f8
SHA51235dbc13c03cb155ad920fc82de78456cc0aa174671a7ac96953693111596be2bd30e4a0d35e2002f66ddc4e3341f90c3a2d71f35607eaca4673e6a5b6b76edb0
-
Filesize
2.9MB
MD52f084751d838cb9bfcc8538401245ca6
SHA16353a9b23d8e4b50e85cd8e352d4f8d33111b9c0
SHA256c189f0fb469d1614cabaf2c7ecad116504f2a89da8c51f371dd28571dc45a13c
SHA51293b8fc0d072f4c162267dcfe9e25e1ec5fe305f4e6e0a87dd84698ded16089430c2bda52129064efdfe22c8ea66566d85e55829837e044459c0fe7e0be55011d
-
Filesize
2.9MB
MD52f084751d838cb9bfcc8538401245ca6
SHA16353a9b23d8e4b50e85cd8e352d4f8d33111b9c0
SHA256c189f0fb469d1614cabaf2c7ecad116504f2a89da8c51f371dd28571dc45a13c
SHA51293b8fc0d072f4c162267dcfe9e25e1ec5fe305f4e6e0a87dd84698ded16089430c2bda52129064efdfe22c8ea66566d85e55829837e044459c0fe7e0be55011d
-
Filesize
1.1MB
MD5acfa549f63796da0e45b5d96755c425b
SHA1e0b9ab6d6878926c95e7ead1dd5578aec686566a
SHA2564d588cff4cf07df5dc8e999f0962c2bfc83f69e8e6ec8df6acb06eb729b26480
SHA51295d5f5c71e25aa327b723893a0aefc7545993448d7c7e99fb2aa7dfbf7f699e2e5584ab745dcb1c18867520a0bb558c0a33371709174cf1c80c0be2e7e025743
-
Filesize
1.1MB
MD5acfa549f63796da0e45b5d96755c425b
SHA1e0b9ab6d6878926c95e7ead1dd5578aec686566a
SHA2564d588cff4cf07df5dc8e999f0962c2bfc83f69e8e6ec8df6acb06eb729b26480
SHA51295d5f5c71e25aa327b723893a0aefc7545993448d7c7e99fb2aa7dfbf7f699e2e5584ab745dcb1c18867520a0bb558c0a33371709174cf1c80c0be2e7e025743
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
4.2MB
MD5890bfdf3c7eecbb505c0fdc415f466b3
SHA190889e27be89519f23d85915956d989b75793c8d
SHA256e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72
SHA512e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece
-
Filesize
288KB
MD513b437650b3d45f7d1fc626148e3f6ad
SHA1e0f41e327518dbda682284230c82ffd50ed476ab
SHA256594f26aae07ea07ef05b4fc5b57c697dc8a2297c113b9c94baac091cb24874b9
SHA51277c99c6e1278916a3cd17fb083b2c50e9f8f018f5cb250ec14db530964358a76c99b10f831abb87b1f86dcbd23727bedbc50c8123964700aec21319f114ec201
-
Filesize
288KB
MD513b437650b3d45f7d1fc626148e3f6ad
SHA1e0f41e327518dbda682284230c82ffd50ed476ab
SHA256594f26aae07ea07ef05b4fc5b57c697dc8a2297c113b9c94baac091cb24874b9
SHA51277c99c6e1278916a3cd17fb083b2c50e9f8f018f5cb250ec14db530964358a76c99b10f831abb87b1f86dcbd23727bedbc50c8123964700aec21319f114ec201
-
Filesize
6.4MB
MD5faa78f58b4f091f8c56ea622d8576703
SHA12bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1
SHA256464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0
SHA5123037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b
-
Filesize
6.4MB
MD5faa78f58b4f091f8c56ea622d8576703
SHA12bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1
SHA256464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0
SHA5123037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b
-
Filesize
1.8MB
MD5fac406eb3a620ec45654e087f68ccd9e
SHA102c21bd71ec411685102670cd4342a332ebaade0
SHA256de955b499b42824606d86071bdb1f1555df518b3f12b0254d674a20876e9d340
SHA5122668c162ccc01f61a1a9ffec6b35a0c2f64b6f0f5a724f1563b3b23460ed17faa7e64d6817f0eaf7f9c38f3a1ac4fb730351d197b9fff051f25d6e1aac4d2b11
-
Filesize
1.8MB
MD5fac406eb3a620ec45654e087f68ccd9e
SHA102c21bd71ec411685102670cd4342a332ebaade0
SHA256de955b499b42824606d86071bdb1f1555df518b3f12b0254d674a20876e9d340
SHA5122668c162ccc01f61a1a9ffec6b35a0c2f64b6f0f5a724f1563b3b23460ed17faa7e64d6817f0eaf7f9c38f3a1ac4fb730351d197b9fff051f25d6e1aac4d2b11
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
2.3MB
MD5d56df2995b539368495f3300e48d8e18
SHA18d2d02923afb5fb5e09ce1592104db17a3128246
SHA256b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6
SHA5122b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008
-
Filesize
2.3MB
MD5d56df2995b539368495f3300e48d8e18
SHA18d2d02923afb5fb5e09ce1592104db17a3128246
SHA256b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6
SHA5122b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008
-
Filesize
2.3MB
MD5d56df2995b539368495f3300e48d8e18
SHA18d2d02923afb5fb5e09ce1592104db17a3128246
SHA256b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6
SHA5122b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
288KB
MD513b437650b3d45f7d1fc626148e3f6ad
SHA1e0f41e327518dbda682284230c82ffd50ed476ab
SHA256594f26aae07ea07ef05b4fc5b57c697dc8a2297c113b9c94baac091cb24874b9
SHA51277c99c6e1278916a3cd17fb083b2c50e9f8f018f5cb250ec14db530964358a76c99b10f831abb87b1f86dcbd23727bedbc50c8123964700aec21319f114ec201
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD579604f51608b52a53b53749352493178
SHA1181d2897576ba7da27a7e95a1db921d43f32faba
SHA25648408a595b29bfd4e3204d555f6a02c07b988d90da1745e0b2f9efc01c3fb0e1
SHA5120929c337e6bcfed48cd450d1b01d5a51f69bf70c535573a5a174fe26d9a8db45240a93d5f34956688757bf1dde7b0e6cb06c031a8316a5fa4b9d881b274c5623
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c015046eed6323cc9a2966dcbff30603
SHA1e44ab0954fd6c1f77f78799913606c227ac753f2
SHA256dedcd5d796c3a4b66128b69a4a522374fd3ae623d072770d57fe468e006a6eba
SHA512a2751fdd67033a8402d88372a7c50a93452658f8980b794c1903fda513fe746c5ed7c9f6dd6d81e280dec44daf5c6c01cec87f36789e231e55d11ec486f0c415
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD566b094b5c91b2894b4a865580766b360
SHA1bd433df63b2736ff15cf58eb74450b45d7c89ae1
SHA256e7e3c624fdac64960646abfe604844be10675d8be45e0cc157daf2fea303118e
SHA512a1b7e566b21860b53d8d2b8a73a567c7293724390478da54176495edc8c95c82dad422a9ca50b0ac75ca88f5a08832098ee26edb98068a41c7de42a3e55111cb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59bc339250f95c48d4ade344cfb9c2a7c
SHA1d892b4e389a63b4d87d5a55ba30ae34e599fec82
SHA25696f70efdd4a8265308242df2de58455f2be6b747f5cba9714795420fc7797a3c
SHA512c5c14b0012b60dad5b64205a0d651d03f10aa7a90bd75b7dcb7c181e1cf16c254eb9088638116e12190594dfa95cd4c76e8daed1cc0418ea508e387dfbfbf9ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52937114ad019351c47f0d1b31a500166
SHA1404e76243f06ef5a9be23569ad510c0cea800acd
SHA256e99df4f0598e318afd5439e81fbcca7eddd56f17f0c4d327e8a9af8489be64c2
SHA512a1a6ca8318bb5fb59a52badb19794b1f355f0d80661c19626271d225bab4bd49f679e2e55d68e477a60c95ba45243e73dcfb5b2502747521a14b1380a2cbee25
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52937114ad019351c47f0d1b31a500166
SHA1404e76243f06ef5a9be23569ad510c0cea800acd
SHA256e99df4f0598e318afd5439e81fbcca7eddd56f17f0c4d327e8a9af8489be64c2
SHA512a1a6ca8318bb5fb59a52badb19794b1f355f0d80661c19626271d225bab4bd49f679e2e55d68e477a60c95ba45243e73dcfb5b2502747521a14b1380a2cbee25
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5df7af9ce5441b22d684536c47eb1bde3
SHA1241d54d82bf2582856af95db883ec34b63da499f
SHA256071e0b23d7ef157485a45e0e680d3f4f0479e09886990ad454c4853a8c05163f
SHA512663cfb12229345c0f26c4c0225bffd6cda949ba11322fcd847c7e940839dbbd7b15943fe4aedf6f7fdd82c42ff474dc07fb1d8c5ca1ca350e2500097e2aba10c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d5003f7609882463ba9d210f18ab5d70
SHA1f91c363f821492b958f9995bc60274005ae3ae80
SHA256149eb818c442a1025579cff3af829bb837560652fda7a28700c5c9f560bc569b
SHA5120f17fe8b1e752923ffad91deb72b5b0f5b1c8f013e9b201aad6d3442dd3d29e09f156c448ae7c92d2fb90275d50933d7772fa656c6039290a4f470c24b5be68e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec