Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 00:18
Static task
static1
Behavioral task
behavioral1
Sample
014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe
Resource
win10v2004-20231127-en
General
-
Target
014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe
-
Size
231KB
-
MD5
675606c313c2b4566928a57817a47aae
-
SHA1
f7a1794c30032c418829d555eea4e515f4f832bd
-
SHA256
014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6
-
SHA512
1954e239a4c0fd0b859ace8437279bbec1761015ba90ad3d629fcfd02edb981ba0018189dbb0179b84beec56d2331f16497eb0c4c05a71d294c2275093916183
-
SSDEEP
3072:4m+tzvXq4XNBr2lNioKRmJdBMcR9Cok7MTAVZPSRqXoGiWHCK:Ytzv5NBr2lNi1Rudms27DPRXBH
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
57.128.155.22:20154
Extracted
smokeloader
pub1
Extracted
lumma
http://opposesicknessopw.pw/api
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exeschtasks.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe 5088 schtasks.exe 2420 schtasks.exe -
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\C20.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\C20.exe family_zgrat_v1 behavioral1/memory/4272-23-0x00000000008C0000-0x0000000000DD4000-memory.dmp family_zgrat_v1 -
Glupteba payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2660-136-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral1/memory/2660-137-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2660-383-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2660-455-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3488-510-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3488-614-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Raccoon Stealer V2 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3368-29-0x0000000002460000-0x0000000002476000-memory.dmp family_raccoon_v2 behavioral1/memory/3368-30-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 behavioral1/memory/2660-121-0x0000000002970000-0x0000000002D6B000-memory.dmp family_raccoon_v2 behavioral1/memory/3368-120-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 behavioral1/memory/3368-147-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4464-59-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
158A.exemi.exeupdater.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 158A.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mi.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
updater.exemi.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts mi.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
158A.exemi.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 158A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 158A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Deletes itself 1 IoCs
Processes:
pid process 3260 -
Executes dropped EXE 14 IoCs
Processes:
C20.exeD4A.exe158A.exe16D3.exe1EA4.exe257B.exe3318.exe3318.tmpmdeliverylib.exemdeliverylib.exemi.exe257B.exerwvgjvtupdater.exepid process 4272 C20.exe 3368 D4A.exe 1932 158A.exe 1496 16D3.exe 1356 1EA4.exe 2660 257B.exe 2368 3318.exe 1632 3318.tmp 1012 mdeliverylib.exe 768 mdeliverylib.exe 4140 mi.exe 3488 257B.exe 2672 rwvgjvt 1716 updater.exe -
Loads dropped DLL 8 IoCs
Processes:
regsvr32.exeD4A.exe3318.tmpC20.exepid process 3392 regsvr32.exe 3368 D4A.exe 3368 D4A.exe 3368 D4A.exe 1632 3318.tmp 1632 3318.tmp 1632 3318.tmp 4272 C20.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\158A.exe themida C:\Users\Admin\AppData\Local\Temp\158A.exe themida behavioral1/memory/1932-57-0x0000000000A40000-0x00000000012D2000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\mi.exe themida C:\Users\Admin\AppData\Local\Temp\mi.exe themida C:\Users\Admin\AppData\Local\Temp\mi.exe themida behavioral1/memory/4140-444-0x00007FF6D15A0000-0x00007FF6D230E000-memory.dmp themida behavioral1/memory/4140-445-0x00007FF6D15A0000-0x00007FF6D230E000-memory.dmp themida behavioral1/memory/4140-446-0x00007FF6D15A0000-0x00007FF6D230E000-memory.dmp themida behavioral1/memory/4140-474-0x00007FF6D15A0000-0x00007FF6D230E000-memory.dmp themida behavioral1/memory/4140-589-0x00007FF6D15A0000-0x00007FF6D230E000-memory.dmp themida C:\ProgramData\Google\Chrome\updater.exe themida C:\ProgramData\Google\Chrome\updater.exe themida behavioral1/memory/1716-595-0x00007FF606680000-0x00007FF6073EE000-memory.dmp themida behavioral1/memory/1716-597-0x00007FF606680000-0x00007FF6073EE000-memory.dmp themida behavioral1/memory/1716-598-0x00007FF606680000-0x00007FF6073EE000-memory.dmp themida -
Processes:
resource yara_rule behavioral1/memory/1760-673-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1760-674-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1760-675-0x0000000140000000-0x0000000140848000-memory.dmp upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
257B.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 257B.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
158A.exemi.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 158A.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exeupdater.exepowershell.exemi.exeConhost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\MRT.exe mi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
158A.exemi.exeupdater.exepid process 1932 158A.exe 4140 mi.exe 1716 updater.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
16D3.exeC20.exeupdater.exedescription pid process target process PID 1496 set thread context of 4464 1496 16D3.exe AppLaunch.exe PID 4272 set thread context of 4956 4272 C20.exe RegSvcs.exe PID 1716 set thread context of 4660 1716 updater.exe conhost.exe PID 1716 set thread context of 1760 1716 updater.exe explorer.exe -
Drops file in Program Files directory 63 IoCs
Processes:
3318.tmpdescription ioc process File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-7PQAC.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-JPG46.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-FHF3Q.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-SPVML.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-OBR3K.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-VF20C.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-5CNS2.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-5FDBC.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-0D8F8.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-EE293.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-SG1PG.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\uninstall\unins000.dat 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-CE9QI.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-BI9V7.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-38PQK.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-V9N8G.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-FOB3P.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-RFPL2.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-O890M.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-UEO7U.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\stuff\is-V9F8F.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-6ASGP.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\plugins\internal\is-HIDCA.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-RGKQH.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-5VSRS.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-85HGL.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-843UD.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-002PE.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\plugins\internal\is-56T7M.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-G2T8Q.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\stuff\is-IL5N7.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-7E11B.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-TFFAC.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\stuff\is-HAOBI.tmp 3318.tmp File opened for modification C:\Program Files (x86)\MDeliveryLIB\mdeliverylib.exe 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-O9AIC.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\stuff\is-VGMKQ.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-D2B29.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-O45PM.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\lessmsi\is-F556I.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-VA6LN.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-TVF5M.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-26MK3.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-MHTP2.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-MMGEG.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-HRL8M.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-VSQIB.tmp 3318.tmp File opened for modification C:\Program Files (x86)\MDeliveryLIB\uninstall\unins000.dat 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-MLM64.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-0T5US.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-ANQ91.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-3O7RQ.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-GJN43.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\is-810L6.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-R5LD8.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-BQ8CC.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\uninstall\is-9HHKP.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-BM220.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-OOIL8.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-A6Q73.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-HL79F.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-J8CEN.tmp 3318.tmp File created C:\Program Files (x86)\MDeliveryLIB\bin\x86\is-MSJHC.tmp 3318.tmp -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4104 sc.exe 3044 sc.exe 444 sc.exe 412 sc.exe 4412 sc.exe 3740 sc.exe 3288 sc.exe 4652 sc.exe 3524 sc.exe 3328 sc.exe 3368 sc.exe 1724 sc.exe 900 sc.exe 4812 sc.exe 2856 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4684 3368 WerFault.exe D4A.exe 1436 4956 WerFault.exe RegSvcs.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1EA4.exerwvgjvt014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1EA4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1EA4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rwvgjvt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1EA4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rwvgjvt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rwvgjvt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2420 schtasks.exe 5088 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Conhost.exepowershell.exe257B.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 257B.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 257B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 257B.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 257B.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exepid process 1756 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe 1756 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe1EA4.exerwvgjvtpid process 1756 014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe 3260 3260 1356 1EA4.exe 3260 3260 2672 rwvgjvt -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AppLaunch.exepowershell.exe158A.exe257B.exepowershell.exepowershell.exepowershell.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 4464 AppLaunch.exe Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 348 powershell.exe Token: SeDebugPrivilege 1932 158A.exe Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 2660 257B.exe Token: SeImpersonatePrivilege 2660 257B.exe Token: SeDebugPrivilege 3996 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 2724 powershell.exe Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 4724 powershell.exe Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 1504 powershell.exe Token: SeShutdownPrivilege 4312 powercfg.exe Token: SeCreatePagefilePrivilege 4312 powercfg.exe Token: SeShutdownPrivilege 808 Token: SeCreatePagefilePrivilege 808 Token: SeShutdownPrivilege 4320 powercfg.exe Token: SeCreatePagefilePrivilege 4320 powercfg.exe Token: SeShutdownPrivilege 3976 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe16D3.exe3318.exe3318.tmpC20.exedescription pid process target process PID 3260 wrote to memory of 4272 3260 C20.exe PID 3260 wrote to memory of 4272 3260 C20.exe PID 3260 wrote to memory of 4272 3260 C20.exe PID 3260 wrote to memory of 3368 3260 D4A.exe PID 3260 wrote to memory of 3368 3260 D4A.exe PID 3260 wrote to memory of 3368 3260 D4A.exe PID 3260 wrote to memory of 500 3260 regsvr32.exe PID 3260 wrote to memory of 500 3260 regsvr32.exe PID 500 wrote to memory of 3392 500 regsvr32.exe regsvr32.exe PID 500 wrote to memory of 3392 500 regsvr32.exe regsvr32.exe PID 500 wrote to memory of 3392 500 regsvr32.exe regsvr32.exe PID 3260 wrote to memory of 1932 3260 158A.exe PID 3260 wrote to memory of 1932 3260 158A.exe PID 3260 wrote to memory of 1932 3260 158A.exe PID 3260 wrote to memory of 1496 3260 16D3.exe PID 3260 wrote to memory of 1496 3260 16D3.exe PID 3260 wrote to memory of 1496 3260 16D3.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 1496 wrote to memory of 4464 1496 16D3.exe AppLaunch.exe PID 3260 wrote to memory of 1356 3260 1EA4.exe PID 3260 wrote to memory of 1356 3260 1EA4.exe PID 3260 wrote to memory of 1356 3260 1EA4.exe PID 3260 wrote to memory of 2660 3260 257B.exe PID 3260 wrote to memory of 2660 3260 257B.exe PID 3260 wrote to memory of 2660 3260 257B.exe PID 3260 wrote to memory of 2368 3260 3318.exe PID 3260 wrote to memory of 2368 3260 3318.exe PID 3260 wrote to memory of 2368 3260 3318.exe PID 3260 wrote to memory of 3876 3260 explorer.exe PID 3260 wrote to memory of 3876 3260 explorer.exe PID 3260 wrote to memory of 3876 3260 explorer.exe PID 3260 wrote to memory of 3876 3260 explorer.exe PID 2368 wrote to memory of 1632 2368 3318.exe 3318.tmp PID 2368 wrote to memory of 1632 2368 3318.exe 3318.tmp PID 2368 wrote to memory of 1632 2368 3318.exe 3318.tmp PID 3260 wrote to memory of 1424 3260 explorer.exe PID 3260 wrote to memory of 1424 3260 explorer.exe PID 3260 wrote to memory of 1424 3260 explorer.exe PID 1632 wrote to memory of 4984 1632 3318.tmp schtasks.exe PID 1632 wrote to memory of 4984 1632 3318.tmp schtasks.exe PID 1632 wrote to memory of 4984 1632 3318.tmp schtasks.exe PID 1632 wrote to memory of 1012 1632 3318.tmp mdeliverylib.exe PID 1632 wrote to memory of 1012 1632 3318.tmp mdeliverylib.exe PID 1632 wrote to memory of 1012 1632 3318.tmp mdeliverylib.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 4272 wrote to memory of 4956 4272 C20.exe RegSvcs.exe PID 1632 wrote to memory of 808 1632 3318.tmp net.exe PID 1632 wrote to memory of 808 1632 3318.tmp net.exe PID 1632 wrote to memory of 808 1632 3318.tmp net.exe PID 1632 wrote to memory of 768 1632 3318.tmp mdeliverylib.exe PID 1632 wrote to memory of 768 1632 3318.tmp mdeliverylib.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe"C:\Users\Admin\AppData\Local\Temp\014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1756
-
C:\Users\Admin\AppData\Local\Temp\C20.exeC:\Users\Admin\AppData\Local\Temp\C20.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 7363⤵
- Program crash
PID:1436
-
C:\Users\Admin\AppData\Local\Temp\D4A.exeC:\Users\Admin\AppData\Local\Temp\D4A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 320922⤵
- Program crash
PID:4684
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\121E.dll1⤵
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\121E.dll2⤵
- Loads dropped DLL
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\158A.exeC:\Users\Admin\AppData\Local\Temp\158A.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
C:\Users\Admin\AppData\Local\Temp\16D3.exeC:\Users\Admin\AppData\Local\Temp\16D3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\mi.exe"C:\Users\Admin\AppData\Local\Temp\mi.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4140 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1656
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4984
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4104 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:3740 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:4652 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:3524 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:808
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:900 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:3044 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:444 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:412
-
C:\Users\Admin\AppData\Local\Temp\1EA4.exeC:\Users\Admin\AppData\Local\Temp\1EA4.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1356
-
C:\Users\Admin\AppData\Local\Temp\257B.exeC:\Users\Admin\AppData\Local\Temp\257B.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:348 -
C:\Users\Admin\AppData\Local\Temp\257B.exe"C:\Users\Admin\AppData\Local\Temp\257B.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
PID:3488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3996
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3960
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:1340
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2248
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:5088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2344 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3384
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2788
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:2420 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2248 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:756
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1356
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3368
-
C:\Users\Admin\AppData\Local\Temp\3318.exeC:\Users\Admin\AppData\Local\Temp\3318.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\is-HONOK.tmp\3318.tmp"C:\Users\Admin\AppData\Local\Temp\is-HONOK.tmp\3318.tmp" /SL5="$701C2,7932209,54272,C:\Users\Admin\AppData\Local\Temp\3318.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\MDeliveryLIB\mdeliverylib.exe"C:\Program Files (x86)\MDeliveryLIB\mdeliverylib.exe" -i3⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:4984
-
C:\Program Files (x86)\MDeliveryLIB\mdeliverylib.exe"C:\Program Files (x86)\MDeliveryLIB\mdeliverylib.exe" -s3⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 83⤵PID:808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 84⤵PID:3336
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3876
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3368 -ip 33681⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4956 -ip 49561⤵PID:1956
-
C:\Users\Admin\AppData\Roaming\rwvgjvtC:\Users\Admin\AppData\Roaming\rwvgjvt1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2672
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:1716 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2796 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:3588
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4696
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2856 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:3288 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3328 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4412 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4660
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:3980
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:1564
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:1604
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:2868
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:1760
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5b059487c088313cc077fadae5ed4f6e6
SHA11ecdfc58d1949fa96302232a9021acd6192fe9c0
SHA2563cb709f9a03313d8a89a5628f9f43de69adadb27b657b9631c1460f0640f0344
SHA51259c20706353889691d257f6603decd6159b40c1ba546e0bb70b95359962e2d69b76c63ef82a1d6f5a8bf877793abefe9661f8e5b30cc0e19b8430e20366368d5
-
Filesize
3.5MB
MD5b059487c088313cc077fadae5ed4f6e6
SHA11ecdfc58d1949fa96302232a9021acd6192fe9c0
SHA2563cb709f9a03313d8a89a5628f9f43de69adadb27b657b9631c1460f0640f0344
SHA51259c20706353889691d257f6603decd6159b40c1ba546e0bb70b95359962e2d69b76c63ef82a1d6f5a8bf877793abefe9661f8e5b30cc0e19b8430e20366368d5
-
Filesize
3.5MB
MD5b059487c088313cc077fadae5ed4f6e6
SHA11ecdfc58d1949fa96302232a9021acd6192fe9c0
SHA2563cb709f9a03313d8a89a5628f9f43de69adadb27b657b9631c1460f0640f0344
SHA51259c20706353889691d257f6603decd6159b40c1ba546e0bb70b95359962e2d69b76c63ef82a1d6f5a8bf877793abefe9661f8e5b30cc0e19b8430e20366368d5
-
Filesize
8.1MB
MD5b0161afbab78849d10cb7d3f00bb4ec3
SHA1542faa594a2a90b9f37c290a5d6a39bf776ce380
SHA256aac4360aef3be725b0ea05262031a6cfe237fb11dac457d3da66305dacaf1684
SHA51284778ad9f7755c259f4fbdf24287734eb43a1c5ab4fe5bd635ec83c4e982bbaa0f7efc65da7c80ed8aa8a96519ee550337c6e61f609eb9555727f52716fb80dc
-
Filesize
8.1MB
MD5b0161afbab78849d10cb7d3f00bb4ec3
SHA1542faa594a2a90b9f37c290a5d6a39bf776ce380
SHA256aac4360aef3be725b0ea05262031a6cfe237fb11dac457d3da66305dacaf1684
SHA51284778ad9f7755c259f4fbdf24287734eb43a1c5ab4fe5bd635ec83c4e982bbaa0f7efc65da7c80ed8aa8a96519ee550337c6e61f609eb9555727f52716fb80dc
-
Filesize
92KB
MD515b15858232eb73939154fa51070f7d9
SHA1c5d442be8afd48c12f3e10324d74c274ebad25d8
SHA256415b5d95ff3e636716deaa385106694fcc257f82be4fe831fdaed420bba50cf2
SHA5128477c2a94ecbecff9d79d3f73713d568ab29260cd51397f54939629531aa84eeaaffc742bef744da071718b597b15e8870c547cf1dfeb122686bb9e59a7dfd86
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
4.1MB
MD5184fc62aeb4c9d78891eb8d509c429e5
SHA14456d00e767b918a5118741985f2e1bc924b8e53
SHA2566b2a111ace1e8469a99e2696a6313352cadf138f5b431d68fdb36a7268df1052
SHA512100eb18ee1ef332862b668769fc64b37429df107873525b3ffcd5a8ccea8ad31fe57bba97cb103c2b444d62113a999a58f7743eb0b8266bb9ff8f116472d854b
-
Filesize
4.1MB
MD5184fc62aeb4c9d78891eb8d509c429e5
SHA14456d00e767b918a5118741985f2e1bc924b8e53
SHA2566b2a111ace1e8469a99e2696a6313352cadf138f5b431d68fdb36a7268df1052
SHA512100eb18ee1ef332862b668769fc64b37429df107873525b3ffcd5a8ccea8ad31fe57bba97cb103c2b444d62113a999a58f7743eb0b8266bb9ff8f116472d854b
-
Filesize
3.0MB
MD5f4cb9c8b7e02e8084008cd61e1899390
SHA1af1a95a823a8c24cab9d8e8aaf46d69b3612dd4b
SHA256a9ef0a36e9924f9742af01b648d7c89624e1e360716adb8fe7f58a6f28c4865e
SHA512e808e95a5f57a13e61f8b77502f0f01c7faf66f2663d4de0b61a308f39520da8d649f32ed886edf446eefd88cf324854bcca059f8c0a6f46148388242e6b65b6
-
Filesize
3.0MB
MD5f4cb9c8b7e02e8084008cd61e1899390
SHA1af1a95a823a8c24cab9d8e8aaf46d69b3612dd4b
SHA256a9ef0a36e9924f9742af01b648d7c89624e1e360716adb8fe7f58a6f28c4865e
SHA512e808e95a5f57a13e61f8b77502f0f01c7faf66f2663d4de0b61a308f39520da8d649f32ed886edf446eefd88cf324854bcca059f8c0a6f46148388242e6b65b6
-
Filesize
439KB
MD5b51bc8f85b7ba047b35022f505066b72
SHA14dd8e61f706c3057995a447d8f1c0c08f8ce6d9a
SHA256fd7e4e6d5b75b5479a9c38e601d6cd2a89c33e65887e6fae2ca6b16735a32757
SHA5127b00852c88bfee57e89415508e0c209faea3733402a6aafb9f87dccde21fe7af9f8f9b9717e6acad9be3c58a6d1d079331e1bb72faae3ce02ca98295966ac3cd
-
Filesize
439KB
MD5b51bc8f85b7ba047b35022f505066b72
SHA14dd8e61f706c3057995a447d8f1c0c08f8ce6d9a
SHA256fd7e4e6d5b75b5479a9c38e601d6cd2a89c33e65887e6fae2ca6b16735a32757
SHA5127b00852c88bfee57e89415508e0c209faea3733402a6aafb9f87dccde21fe7af9f8f9b9717e6acad9be3c58a6d1d079331e1bb72faae3ce02ca98295966ac3cd
-
Filesize
230KB
MD58fe11fc098e2fd9ab2247583fe513a57
SHA14b1d5673a74b86286c7ba4a72e8a0f103ca89017
SHA256691232d9ddf2754581d877ae2803b2f0f09af50187a828bc054ddce6a5e0ab21
SHA5123a76c3d8dc188c99a203951994446a306278a836d1ce4e61628cbd4f9e803512217db47391c8b4765a68d43ecd152d964884612e80de3c48508a383460da7a9e
-
Filesize
230KB
MD58fe11fc098e2fd9ab2247583fe513a57
SHA14b1d5673a74b86286c7ba4a72e8a0f103ca89017
SHA256691232d9ddf2754581d877ae2803b2f0f09af50187a828bc054ddce6a5e0ab21
SHA5123a76c3d8dc188c99a203951994446a306278a836d1ce4e61628cbd4f9e803512217db47391c8b4765a68d43ecd152d964884612e80de3c48508a383460da7a9e
-
Filesize
4.1MB
MD5090951472b82572d79adaee02c2c429e
SHA17db00a5b63a155413e353cf89d721c961487d467
SHA25614c132ab3f1171b719ef63f9c016851b333ffcaa58731f0cf5586f52e30dff3e
SHA5129a159f13b825c13b1dc15ae7eec4abba1b375a5ad1ac2400be2bba38869ba3538b21a88d3a5e88e7cc5d482fa5c9d5becce3a610a4e5c5c65ca84be67b31cb47
-
Filesize
4.1MB
MD5090951472b82572d79adaee02c2c429e
SHA17db00a5b63a155413e353cf89d721c961487d467
SHA25614c132ab3f1171b719ef63f9c016851b333ffcaa58731f0cf5586f52e30dff3e
SHA5129a159f13b825c13b1dc15ae7eec4abba1b375a5ad1ac2400be2bba38869ba3538b21a88d3a5e88e7cc5d482fa5c9d5becce3a610a4e5c5c65ca84be67b31cb47
-
Filesize
4.1MB
MD5090951472b82572d79adaee02c2c429e
SHA17db00a5b63a155413e353cf89d721c961487d467
SHA25614c132ab3f1171b719ef63f9c016851b333ffcaa58731f0cf5586f52e30dff3e
SHA5129a159f13b825c13b1dc15ae7eec4abba1b375a5ad1ac2400be2bba38869ba3538b21a88d3a5e88e7cc5d482fa5c9d5becce3a610a4e5c5c65ca84be67b31cb47
-
Filesize
7.8MB
MD56497731dbc61b104e813774d7bc9119a
SHA1d79fb024d4f43c5e44d059465fec81db608672bb
SHA256212a59d494e636eeb28c8b107bc360cfe7fe669851d6249e91dca0d3f7b39437
SHA512b3963c847b42696fa7032a6aa62919d07c3d1c01815382d65495e304dc38df7ce7969a2aa5c982b2ebb75543e38124ff3755f649b2dede4c93442c1ca4fef366
-
Filesize
7.8MB
MD56497731dbc61b104e813774d7bc9119a
SHA1d79fb024d4f43c5e44d059465fec81db608672bb
SHA256212a59d494e636eeb28c8b107bc360cfe7fe669851d6249e91dca0d3f7b39437
SHA512b3963c847b42696fa7032a6aa62919d07c3d1c01815382d65495e304dc38df7ce7969a2aa5c982b2ebb75543e38124ff3755f649b2dede4c93442c1ca4fef366
-
Filesize
5.1MB
MD57f4f98a26d4835578f46224112cc6a15
SHA1c5cbaf07ef86ee77e7a079ece95e749e7b93a0f0
SHA256c20f57c4db1ec145b3f2131677c80e8ceb88b11b81dbb1e7bf84983daf514276
SHA512c2fe13271b35c799ea871b54f0d73a61a2ceed5b4f8fa7464bc758908f35185bfe1c43d38c54941c9fef18284334d61ddab506121d7d993ec87752a77eea8c5b
-
Filesize
5.1MB
MD57f4f98a26d4835578f46224112cc6a15
SHA1c5cbaf07ef86ee77e7a079ece95e749e7b93a0f0
SHA256c20f57c4db1ec145b3f2131677c80e8ceb88b11b81dbb1e7bf84983daf514276
SHA512c2fe13271b35c799ea871b54f0d73a61a2ceed5b4f8fa7464bc758908f35185bfe1c43d38c54941c9fef18284334d61ddab506121d7d993ec87752a77eea8c5b
-
Filesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
Filesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
694KB
MD55525670a9e72d77b368a9aa4b8c814c1
SHA13fdad952ea00175f3a6e549b5dca4f568e394612
SHA2561180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978
SHA512757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a
-
Filesize
694KB
MD55525670a9e72d77b368a9aa4b8c814c1
SHA13fdad952ea00175f3a6e549b5dca4f568e394612
SHA2561180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978
SHA512757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
8.1MB
MD5b0161afbab78849d10cb7d3f00bb4ec3
SHA1542faa594a2a90b9f37c290a5d6a39bf776ce380
SHA256aac4360aef3be725b0ea05262031a6cfe237fb11dac457d3da66305dacaf1684
SHA51284778ad9f7755c259f4fbdf24287734eb43a1c5ab4fe5bd635ec83c4e982bbaa0f7efc65da7c80ed8aa8a96519ee550337c6e61f609eb9555727f52716fb80dc
-
Filesize
8.1MB
MD5b0161afbab78849d10cb7d3f00bb4ec3
SHA1542faa594a2a90b9f37c290a5d6a39bf776ce380
SHA256aac4360aef3be725b0ea05262031a6cfe237fb11dac457d3da66305dacaf1684
SHA51284778ad9f7755c259f4fbdf24287734eb43a1c5ab4fe5bd635ec83c4e982bbaa0f7efc65da7c80ed8aa8a96519ee550337c6e61f609eb9555727f52716fb80dc
-
Filesize
8.1MB
MD5b0161afbab78849d10cb7d3f00bb4ec3
SHA1542faa594a2a90b9f37c290a5d6a39bf776ce380
SHA256aac4360aef3be725b0ea05262031a6cfe237fb11dac457d3da66305dacaf1684
SHA51284778ad9f7755c259f4fbdf24287734eb43a1c5ab4fe5bd635ec83c4e982bbaa0f7efc65da7c80ed8aa8a96519ee550337c6e61f609eb9555727f52716fb80dc
-
Filesize
230KB
MD58fe11fc098e2fd9ab2247583fe513a57
SHA14b1d5673a74b86286c7ba4a72e8a0f103ca89017
SHA256691232d9ddf2754581d877ae2803b2f0f09af50187a828bc054ddce6a5e0ab21
SHA5123a76c3d8dc188c99a203951994446a306278a836d1ce4e61628cbd4f9e803512217db47391c8b4765a68d43ecd152d964884612e80de3c48508a383460da7a9e
-
Filesize
231KB
MD5675606c313c2b4566928a57817a47aae
SHA1f7a1794c30032c418829d555eea4e515f4f832bd
SHA256014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6
SHA5121954e239a4c0fd0b859ace8437279bbec1761015ba90ad3d629fcfd02edb981ba0018189dbb0179b84beec56d2331f16497eb0c4c05a71d294c2275093916183
-
Filesize
231KB
MD5675606c313c2b4566928a57817a47aae
SHA1f7a1794c30032c418829d555eea4e515f4f832bd
SHA256014bb0083f4a18769139ec1fe3b85fa79d1539de9252eb34dcb26b7d7bb3bdb6
SHA5121954e239a4c0fd0b859ace8437279bbec1761015ba90ad3d629fcfd02edb981ba0018189dbb0179b84beec56d2331f16497eb0c4c05a71d294c2275093916183
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD563ed7954b2a3980373894c255aa354af
SHA1ff11e1c2a9579bc370a4d465157b78451bdcdda7
SHA256e0023c00a689ed51c6eecb299db7c3f4031c6b9e2fb116df7786617b59e8560b
SHA51257fc69efc2d1c86fe996ec4e648b70e483fa1c574d46eae7584fa47e5b2125516475302fb73fa9082726eafa50923e7d32467afa3c0ab8ce902a9b90eaa3a258
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD591dd550fbce923efffc3bc032ab48c75
SHA103bfcd63ca5fb4e1e74bd83d2a0b11538607ac51
SHA2565b29472b2cbe61cd2522a72b61639d53adaeba77f7e2e0c69246f1a98e2e9e10
SHA512eb90580e296192926e03e81558c8cfb147af3ae92444c6fadc3a20c98076d6ba72636b9124f2908c86feeaaec5338e9149228488e069bade684ee9482a5b1d17
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e57c5f59e95080f271a6c4b4e5f84a0a
SHA1b949d2c7385dc90ec95a065d457fbddf44d3a2d7
SHA256da0b46dfa0ad3b6fd4d299b515bb1633a3e78152bf1f06dc3d38602e3103b727
SHA5124c5a82909d1a91f2ed8116519adbdb5898bac06501753ee00ee57e974256265414f550488b4c93266d857d653ca6125eacd456b875912c38e8aaca1f5a0038b9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a42eed0e3fa1c80337797ae4b1e21ae6
SHA1e5aa5ccd460b6429db0d231e2fa9ff151e40fb23
SHA256783034995f68912452d216b1f3c19615aeedb931d9f719b454f8e76b5527cab4
SHA5125e6d719f21234637b7c2b4a2e5cd895255f3f438c0e8b0b08841f7b48d5d4c6a1d533bd2452565a5efd5a1c9ee9be126b2488e6bdffa88a1e0cae7145abed48f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51ec6c131d1f7ca4d480e4b0b3c6a1d6e
SHA1aa0e47f8243194ea6d0359b0196204d82bdac3d3
SHA25625cb39fa0af48301373722dc74ff7dcd6f59718c43fdb5fc4c6cd603b1e7fbfb
SHA512bed4fbe306a7ee4db34e4a94ea5f8681ad5aebda5b14d5065b112638ad777edcf523f724c0f025ac5cadeee48db902cd0946b8a3629f9116eb569647f3d6bab1
-
Filesize
3KB
MD52d29fd3ae57f422e2b2121141dc82253
SHA1c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA25680a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec