Analysis
-
max time kernel
96s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 19:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231127-en
General
-
Target
file.exe
-
Size
211KB
-
MD5
6e6263a63f0e602511310e87ff141a4a
-
SHA1
0c1416ddbf80229e8cd5688eaf1ba1388260d308
-
SHA256
38d0497642677bb199f9724cc4c173bce0247540e5b2ea5c2a45f2855f58f45a
-
SHA512
d17c81e9c0d8cc411073b7f72ee5fedf098d260f825ae3605c453670136f38352b746e5acd23c0e1bc212c4fb09acf9435c37395e6ce72e7cd5f502bf29a60cd
-
SSDEEP
3072:4qGLRbCrLaEYlkxOryDqz5ctMcULW80R9Ax:lGLReruEYlTry2zprLL
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
57.128.155.22:20154
Extracted
smokeloader
pub1
Signatures
-
Glupteba payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/3940-92-0x0000000002DF0000-0x00000000036DB000-memory.dmp family_glupteba behavioral2/memory/3940-93-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3940-350-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3940-353-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4472-437-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4472-455-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3924-560-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3924-576-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3924-579-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3924-585-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Raccoon Stealer V2 payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3088-20-0x00000000009C0000-0x00000000009D6000-memory.dmp family_raccoon_v2 behavioral2/memory/3088-21-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 behavioral2/memory/3088-22-0x0000000000400000-0x000000000085E000-memory.dmp family_raccoon_v2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1384-41-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
7D6B.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7D6B.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7D6B.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7D6B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7D6B.exe -
Deletes itself 1 IoCs
Processes:
pid process 3260 -
Executes dropped EXE 10 IoCs
Processes:
F5AA.exe44E6.exe7D6B.exeA816.exeAFA9.exeBFC7.exeBFC7.tmpvoiceassist.exevoiceassist.exeAFA9.exepid process 3088 F5AA.exe 1628 44E6.exe 3612 7D6B.exe 3892 A816.exe 3940 AFA9.exe 5116 BFC7.exe 2776 BFC7.tmp 1352 voiceassist.exe 4616 voiceassist.exe 4472 AFA9.exe -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exeBFC7.tmppid process 4648 regsvr32.exe 2776 BFC7.tmp 2776 BFC7.tmp 2776 BFC7.tmp -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7D6B.exe themida C:\Users\Admin\AppData\Local\Temp\7D6B.exe themida behavioral2/memory/3612-72-0x00000000003C0000-0x0000000000FC4000-memory.dmp themida behavioral2/memory/3612-73-0x00000000003C0000-0x0000000000FC4000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx behavioral2/memory/4268-573-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3888-580-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3888-596-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
7D6B.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7D6B.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7D6B.exepid process 3612 7D6B.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
44E6.exedescription pid process target process PID 1628 set thread context of 1384 1628 44E6.exe AppLaunch.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
AFA9.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN AFA9.exe -
Drops file in Program Files directory 63 IoCs
Processes:
BFC7.tmpdescription ioc process File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-0HGP4.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-N86C1.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-AE6VL.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-58OQI.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-QA812.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-5DPJR.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-97835.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\is-TCJ6F.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-SVI8F.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\plugins\internal\is-I0KCT.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-JJF5U.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-PMC8L.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-D75FL.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-VUP9M.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-PC0OH.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-NJTP4.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-3O5H4.tmp BFC7.tmp File opened for modification C:\Program Files (x86)\VoiceAssistant\uninstall\unins000.dat BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-11AV4.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-A98BD.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-PHTG0.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-TLO4V.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-8B07V.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-BPD5B.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-ESNLN.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-FV7RO.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-SLQ8B.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-47GPK.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-1IID7.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\uninstall\unins000.dat BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-9DHBU.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\lessmsi\is-502VP.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\uninstall\is-U81KB.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-98LTQ.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-3KLEP.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-CLSG1.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-CAHK1.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-9I1TN.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-DUE5R.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-R5AM6.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-ON56P.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-AT07R.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-FDK43.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-SLKPU.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-S4TAB.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-0NUUH.tmp BFC7.tmp File opened for modification C:\Program Files (x86)\VoiceAssistant\voiceassist.exe BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-NPPB8.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-GTV7C.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-PANG2.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-058RH.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-8AHBT.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-Q42AC.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\plugins\internal\is-RR7D1.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-1MF5L.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-MO37H.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\stuff\is-S1R75.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-0LCK6.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-Q2QB7.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-46LFQ.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-CR1EH.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-EEBHJ.tmp BFC7.tmp File created C:\Program Files (x86)\VoiceAssistant\bin\x86\is-7VB8G.tmp BFC7.tmp -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1624 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4644 3088 WerFault.exe F5AA.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
A816.exefile.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A816.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A816.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1232 schtasks.exe 4464 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
AFA9.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" AFA9.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" AFA9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" AFA9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" AFA9.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 2028 file.exe 2028 file.exe 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 3260 -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
file.exeA816.exepid process 2028 file.exe 3892 A816.exe 3260 3260 3260 3260 -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
7D6B.exepowershell.exeAFA9.exepowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 3612 7D6B.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 3940 AFA9.exe Token: SeImpersonatePrivilege 3940 AFA9.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeShutdownPrivilege 3260 Token: SeCreatePagefilePrivilege 3260 Token: SeDebugPrivilege 4044 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
BFC7.tmppid process 2776 BFC7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe44E6.exeAFA9.exeBFC7.exeBFC7.tmpnet.exeAFA9.exedescription pid process target process PID 3260 wrote to memory of 3088 3260 F5AA.exe PID 3260 wrote to memory of 3088 3260 F5AA.exe PID 3260 wrote to memory of 3088 3260 F5AA.exe PID 3260 wrote to memory of 3524 3260 regsvr32.exe PID 3260 wrote to memory of 3524 3260 regsvr32.exe PID 3524 wrote to memory of 4648 3524 regsvr32.exe regsvr32.exe PID 3524 wrote to memory of 4648 3524 regsvr32.exe regsvr32.exe PID 3524 wrote to memory of 4648 3524 regsvr32.exe regsvr32.exe PID 3260 wrote to memory of 1628 3260 44E6.exe PID 3260 wrote to memory of 1628 3260 44E6.exe PID 3260 wrote to memory of 1628 3260 44E6.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 1628 wrote to memory of 1384 1628 44E6.exe AppLaunch.exe PID 3260 wrote to memory of 3612 3260 7D6B.exe PID 3260 wrote to memory of 3612 3260 7D6B.exe PID 3260 wrote to memory of 3612 3260 7D6B.exe PID 3260 wrote to memory of 3892 3260 A816.exe PID 3260 wrote to memory of 3892 3260 A816.exe PID 3260 wrote to memory of 3892 3260 A816.exe PID 3260 wrote to memory of 3940 3260 AFA9.exe PID 3260 wrote to memory of 3940 3260 AFA9.exe PID 3260 wrote to memory of 3940 3260 AFA9.exe PID 3940 wrote to memory of 1744 3940 AFA9.exe powershell.exe PID 3940 wrote to memory of 1744 3940 AFA9.exe powershell.exe PID 3940 wrote to memory of 1744 3940 AFA9.exe powershell.exe PID 3260 wrote to memory of 5116 3260 BFC7.exe PID 3260 wrote to memory of 5116 3260 BFC7.exe PID 3260 wrote to memory of 5116 3260 BFC7.exe PID 3260 wrote to memory of 4040 3260 explorer.exe PID 3260 wrote to memory of 4040 3260 explorer.exe PID 3260 wrote to memory of 4040 3260 explorer.exe PID 3260 wrote to memory of 4040 3260 explorer.exe PID 5116 wrote to memory of 2776 5116 BFC7.exe BFC7.tmp PID 5116 wrote to memory of 2776 5116 BFC7.exe BFC7.tmp PID 5116 wrote to memory of 2776 5116 BFC7.exe BFC7.tmp PID 3260 wrote to memory of 5076 3260 explorer.exe PID 3260 wrote to memory of 5076 3260 explorer.exe PID 3260 wrote to memory of 5076 3260 explorer.exe PID 2776 wrote to memory of 4480 2776 BFC7.tmp schtasks.exe PID 2776 wrote to memory of 4480 2776 BFC7.tmp schtasks.exe PID 2776 wrote to memory of 4480 2776 BFC7.tmp schtasks.exe PID 2776 wrote to memory of 1352 2776 BFC7.tmp voiceassist.exe PID 2776 wrote to memory of 1352 2776 BFC7.tmp voiceassist.exe PID 2776 wrote to memory of 1352 2776 BFC7.tmp voiceassist.exe PID 2776 wrote to memory of 4724 2776 BFC7.tmp net.exe PID 2776 wrote to memory of 4724 2776 BFC7.tmp net.exe PID 2776 wrote to memory of 4724 2776 BFC7.tmp net.exe PID 2776 wrote to memory of 4616 2776 BFC7.tmp voiceassist.exe PID 2776 wrote to memory of 4616 2776 BFC7.tmp voiceassist.exe PID 2776 wrote to memory of 4616 2776 BFC7.tmp voiceassist.exe PID 4724 wrote to memory of 3604 4724 net.exe net1.exe PID 4724 wrote to memory of 3604 4724 net.exe net1.exe PID 4724 wrote to memory of 3604 4724 net.exe net1.exe PID 4472 wrote to memory of 1452 4472 AFA9.exe powershell.exe PID 4472 wrote to memory of 1452 4472 AFA9.exe powershell.exe PID 4472 wrote to memory of 1452 4472 AFA9.exe powershell.exe PID 4472 wrote to memory of 4548 4472 AFA9.exe cmd.exe PID 4472 wrote to memory of 4548 4472 AFA9.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2028
-
C:\Users\Admin\AppData\Local\Temp\F5AA.exeC:\Users\Admin\AppData\Local\Temp\F5AA.exe1⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 73002⤵
- Program crash
PID:4644
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\23FF.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\23FF.dll2⤵
- Loads dropped DLL
PID:4648
-
C:\Users\Admin\AppData\Local\Temp\44E6.exeC:\Users\Admin\AppData\Local\Temp\44E6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3088 -ip 30881⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\7D6B.exeC:\Users\Admin\AppData\Local\Temp\7D6B.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
C:\Users\Admin\AppData\Local\Temp\A816.exeC:\Users\Admin\AppData\Local\Temp\A816.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3892
-
C:\Users\Admin\AppData\Local\Temp\AFA9.exeC:\Users\Admin\AppData\Local\Temp\AFA9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\AFA9.exe"C:\Users\Admin\AppData\Local\Temp\AFA9.exe"2⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:4548
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3948
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3924
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2840
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4644
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2552
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4068
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4464 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:4268
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4912
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:1624
-
C:\Users\Admin\AppData\Local\Temp\BFC7.exeC:\Users\Admin\AppData\Local\Temp\BFC7.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\is-I6HVG.tmp\BFC7.tmp"C:\Users\Admin\AppData\Local\Temp\is-I6HVG.tmp\BFC7.tmp" /SL5="$A01C6,7429766,54272,C:\Users\Admin\AppData\Local\Temp\BFC7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:4480
-
C:\Program Files (x86)\VoiceAssistant\voiceassist.exe"C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -i3⤵
- Executes dropped EXE
PID:1352 -
C:\Program Files (x86)\VoiceAssistant\voiceassist.exe"C:\Program Files (x86)\VoiceAssistant\voiceassist.exe" -s3⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 93⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 94⤵PID:3604
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4040
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5076
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
Filesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
Filesize
2.6MB
MD5ef9b854c3bf29138d9d24292a50def6e
SHA18d498781213415902226843bde3b008266ebb5f5
SHA256d7a6209bc976788cc6c3f4480d0db0c824f63320cdf3b5717bb7f4741fe8ea84
SHA512401e66c92b92d99514f9e9ee8daec74b14a0ceab17458067dda282f3f1bd251e67f2cb27ea7066ffdac3710925033c4ea4a1e9b929fe2d73208638b8fafb93ef
-
Filesize
3.0MB
MD518356cbd55de61190244f9be22cf2f6d
SHA198510c90b004e98090a1462bf056fa916f1f2e0a
SHA256fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8
SHA5125c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe
-
Filesize
3.0MB
MD518356cbd55de61190244f9be22cf2f6d
SHA198510c90b004e98090a1462bf056fa916f1f2e0a
SHA256fdf19145c1592639e437eeca85b1538afb20835d0c87684378089fd03bc6d0f8
SHA5125c043e414428d03a71f61512b2f18a5b1392296830c21d00276ad03578c7614456615cdf8bf96a8201925bd5520cdddd6b1dfeb1dd93c1f649d7a4a89a14fdbe
-
Filesize
1.9MB
MD55251ab2960cc14aa925735a84fce288c
SHA16e6080511b0ad8a68729b190b1597a65d5ab867b
SHA256fa7f8898a16a926ef1df7f9560a3a16847d8e7e7ba14da99198c9548ad939319
SHA51208225b3319ea576ccffa1e97a27ad37cd0bf7d8427b587a13f4412a6ec8e834cb2564d1587f678e352022ee07e423df6ba19dab7dba47d1cf88d24368439b289
-
Filesize
1.9MB
MD55251ab2960cc14aa925735a84fce288c
SHA16e6080511b0ad8a68729b190b1597a65d5ab867b
SHA256fa7f8898a16a926ef1df7f9560a3a16847d8e7e7ba14da99198c9548ad939319
SHA51208225b3319ea576ccffa1e97a27ad37cd0bf7d8427b587a13f4412a6ec8e834cb2564d1587f678e352022ee07e423df6ba19dab7dba47d1cf88d24368439b289
-
Filesize
4.2MB
MD533c6731fb7512630217f405efc5c71b4
SHA1bf483f230f4bbaf53e0610182ef9f94a95dcb67a
SHA2560fb245e80fdb23c83dcef3ee510e7633acb208c1b07b825f0b6764c8faf5700b
SHA512eea6ee3169b2eaecaf84e78e42372d1000938f7eefb0bfb75a1b87a612676f89b1473fdbf1c7c4caf3949dae6eecbb9e39f85fb2abc2d702bdbc8ee3ce60fd55
-
Filesize
4.2MB
MD533c6731fb7512630217f405efc5c71b4
SHA1bf483f230f4bbaf53e0610182ef9f94a95dcb67a
SHA2560fb245e80fdb23c83dcef3ee510e7633acb208c1b07b825f0b6764c8faf5700b
SHA512eea6ee3169b2eaecaf84e78e42372d1000938f7eefb0bfb75a1b87a612676f89b1473fdbf1c7c4caf3949dae6eecbb9e39f85fb2abc2d702bdbc8ee3ce60fd55
-
Filesize
212KB
MD5c530211a06fe7c0aa83ab4d514ef1098
SHA121dd6462fb613ac1a71465164b18216efae168bf
SHA2564a5a19a2839b5d4dc586e75ac0a7adf3f3403fb995f5e787fd8e5ec7a4d5738a
SHA512539f797ec676ee17e50068e3f27810238e5111771430092c21df1ec624523c878dc1192ed6c51694cbe300d144d23005ad2e4b3de5340919d63908fdedaa3d79
-
Filesize
212KB
MD5c530211a06fe7c0aa83ab4d514ef1098
SHA121dd6462fb613ac1a71465164b18216efae168bf
SHA2564a5a19a2839b5d4dc586e75ac0a7adf3f3403fb995f5e787fd8e5ec7a4d5738a
SHA512539f797ec676ee17e50068e3f27810238e5111771430092c21df1ec624523c878dc1192ed6c51694cbe300d144d23005ad2e4b3de5340919d63908fdedaa3d79
-
Filesize
4.1MB
MD5cd5746d86404c8616fdd39e1534941b9
SHA160a8a9bba3ad19069af8d18a16ed433e89a9e381
SHA256d5af5aa139be830b6b51e5bb568afc242900d10cafa51257cde37914e22680fd
SHA5121d36af9fe458d6a51980492e073f21ca5c0ff35b734c6719805f01062dd034110ae1ac57d378998078d6397484a013e571bd73bc9382393a549a98c7f0937bcd
-
Filesize
4.1MB
MD5cd5746d86404c8616fdd39e1534941b9
SHA160a8a9bba3ad19069af8d18a16ed433e89a9e381
SHA256d5af5aa139be830b6b51e5bb568afc242900d10cafa51257cde37914e22680fd
SHA5121d36af9fe458d6a51980492e073f21ca5c0ff35b734c6719805f01062dd034110ae1ac57d378998078d6397484a013e571bd73bc9382393a549a98c7f0937bcd
-
Filesize
4.1MB
MD5cd5746d86404c8616fdd39e1534941b9
SHA160a8a9bba3ad19069af8d18a16ed433e89a9e381
SHA256d5af5aa139be830b6b51e5bb568afc242900d10cafa51257cde37914e22680fd
SHA5121d36af9fe458d6a51980492e073f21ca5c0ff35b734c6719805f01062dd034110ae1ac57d378998078d6397484a013e571bd73bc9382393a549a98c7f0937bcd
-
Filesize
7.3MB
MD5c32f40a99687153ca534447171355d75
SHA1eec4f7dbfb438da30a0cf128843d7a2f4e3fef52
SHA2560ade3f0d7bb672fb96794f5032b41fc6803d4266bd0dc688df85f8051e2806c5
SHA5120edb691fc6eebe0a07386cdd5ec3c8a412a3cb6da700e25fe0442ea0193d8ef05dfec6ba508819e4bb6f8c0d1eaedbb5fbdeb27b71c7771a17651e3eb1175357
-
Filesize
7.3MB
MD5c32f40a99687153ca534447171355d75
SHA1eec4f7dbfb438da30a0cf128843d7a2f4e3fef52
SHA2560ade3f0d7bb672fb96794f5032b41fc6803d4266bd0dc688df85f8051e2806c5
SHA5120edb691fc6eebe0a07386cdd5ec3c8a412a3cb6da700e25fe0442ea0193d8ef05dfec6ba508819e4bb6f8c0d1eaedbb5fbdeb27b71c7771a17651e3eb1175357
-
Filesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
Filesize
237KB
MD522a51b329fa194d51f68705a25d7396d
SHA1aada03d8b7f1e28dbf6d72c1503981ccc5bb94da
SHA25682857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742
SHA5120d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
212KB
MD5c530211a06fe7c0aa83ab4d514ef1098
SHA121dd6462fb613ac1a71465164b18216efae168bf
SHA2564a5a19a2839b5d4dc586e75ac0a7adf3f3403fb995f5e787fd8e5ec7a4d5738a
SHA512539f797ec676ee17e50068e3f27810238e5111771430092c21df1ec624523c878dc1192ed6c51694cbe300d144d23005ad2e4b3de5340919d63908fdedaa3d79
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f415d91cb344e2409527765d9bee605b
SHA185d6c5e3fb91ac8deeca17f37abdc063d986c9e8
SHA256dea7e6161fa1ce37de0dd6befe691c1861af35bb2d66091a32ee40b9ba39ee0e
SHA51296ef5920598ddec38b1568975832f1ebd9b53cdae2491b41635a6ac7afe36c12afcbb6b3cd2e435e435a56e0bd863218ef358572c1d09a56ae493409377c5942
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e15e89e05371cdb014c0c602c91a3bc4
SHA13863e928f7aea1998f88bd65f56994d9b3df183e
SHA256cb32411a6499c5d286c1be7eca86cd725de95bf9eec239e0f270d2185776e7b0
SHA512132a7616ded1acf8f30eed6b9138be68970ba84ad5b4876bd40cbc1a4b7ef1a1f250e7611dbb9edb536735cf8bb3354f1e2e254a0ea79a1874631701e9b0a00b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5af29f691c5b36d5b7c743145c54fcc35
SHA13bdab43ab66696d7119b27fcf00e63b05e21f312
SHA256a02730ae63ee982ca1eb4ae516e7be2a673bd8eb8171544907245bdb0dde9e95
SHA512927e5ac4bdde0bc7f107b0580355685f9ee792abb8ed7120ea5f7dd2d036194e49fa18ec715cceb25a690b6587331b38ec0ca973bc4422e82d392f83b533bd51
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b322c6f5341974876cd31635d5bdd5d9
SHA100ed7f03c20c0d777150f27b8f7611fdb2a6f08b
SHA25640b7ecf12f6a7a0b1006ef3f80763a238457d683601d400a244b6c44a8cc2edc
SHA512baa127ecc7da26d74301534acc23ff7b71feda17b8e51c910d984d23feb02b4551da10b38c4be97548f9c3548f033f4f5e1b55c5e0d660796da4142846ea3ddd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b7dca5fd16144998eef69f7c3b580891
SHA13afd70e293a17b487725a57e01c64fa412a7fdf9
SHA256416b08a8cb78a71987a657042e928eff65d7dff915ed0005dd09355c13764351
SHA512f737251a4fde5c592a966f2e7e1f05bfa38caf8d42ac3510e5a770f2c12a9e8caa1655d29047a0cd9c4601ac9837c2a8fd32f6a2ebbec338888e84b77a12d7e7
-
Filesize
4.1MB
MD5cd5746d86404c8616fdd39e1534941b9
SHA160a8a9bba3ad19069af8d18a16ed433e89a9e381
SHA256d5af5aa139be830b6b51e5bb568afc242900d10cafa51257cde37914e22680fd
SHA5121d36af9fe458d6a51980492e073f21ca5c0ff35b734c6719805f01062dd034110ae1ac57d378998078d6397484a013e571bd73bc9382393a549a98c7f0937bcd
-
Filesize
4.1MB
MD5cd5746d86404c8616fdd39e1534941b9
SHA160a8a9bba3ad19069af8d18a16ed433e89a9e381
SHA256d5af5aa139be830b6b51e5bb568afc242900d10cafa51257cde37914e22680fd
SHA5121d36af9fe458d6a51980492e073f21ca5c0ff35b734c6719805f01062dd034110ae1ac57d378998078d6397484a013e571bd73bc9382393a549a98c7f0937bcd
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec