Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01-01-2024 05:10
Static task
static1
General
-
Target
ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe
-
Size
18.8MB
-
MD5
ed2fd5173af900c56220101ce6648515
-
SHA1
d8783b8dc155314c5680aebddd4e36df7ddfebbf
-
SHA256
ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098
-
SHA512
ef7bac0140e2e492a4d1751d9a6d1fe6ec94649bd6a00006f159a067b774ee8870d567e0fae2e08ebf16db3d11c2dfe2fcf5884d7d27d74fdba34781500f9806
-
SSDEEP
393216:deNXiJAZn67vPin33BIkI5k/y0KX7rEtwbsAlx6A1wK:ExZGQIH5bVdbsU
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/1440-84-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral2/memory/1440-100-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1440-421-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1440-493-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral2/memory/1440-540-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3636-561-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3636-1330-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3464-2118-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3464-2350-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3524 netsh.exe -
Executes dropped EXE 17 IoCs
pid Process 1300 InstallSetup8.exe 4804 toolspub2.exe 1440 31839b57a4f11171d6abc8bbc4451ee4.exe 2208 BroomSetup.exe 348 tuc4.exe 5004 etopt.exe 3712 tuc4.tmp 768 toolspub2.exe 1176 nsiB44F.tmp.exe 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 3464 csrss.exe 1812 33CD.exe 4560 41A9.exe 3172 WindowsUpdater.exe 1240 injector.exe 3576 windefender.exe 3128 windefender.exe -
Loads dropped DLL 14 IoCs
pid Process 1300 InstallSetup8.exe 5004 etopt.exe 5004 etopt.exe 3712 tuc4.tmp 3712 tuc4.tmp 3712 tuc4.tmp 1300 InstallSetup8.exe 1300 InstallSetup8.exe 3172 WindowsUpdater.exe 3172 WindowsUpdater.exe 1300 InstallSetup8.exe 1300 InstallSetup8.exe 1300 InstallSetup8.exe 1300 InstallSetup8.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ThreadingModel = "Apartment" etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ = "C:\\Program Files (x86)\\Windows NT\\Accessories\\RTFCtrl.dll" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ThreadingModel = "Apartment" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ = "C:\\Program Files (x86)\\Windows NT\\Accessories\\RTFCtrl.dll" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ = "C:\\Program Files (x86)\\Windows NT\\Accessories\\RTFCtrl.dll" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ThreadingModel = "Apartment" etopt.exe -
resource yara_rule behavioral2/files/0x0008000000016968-2356.dat upx behavioral2/files/0x0008000000016968-2354.dat upx behavioral2/files/0x0008000000016968-2359.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive 33CD.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 768 4804 toolspub2.exe 77 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\ClocX\Presets\BlackAppleClock.bmp etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Wall Clock medium.bmp etopt.exe File created C:\Program Files (x86)\ClocX\Presets\apple.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\AJ-CityHall-500-hour.hpng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Nvidia2.png etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-SHRBU.tmp tuc4.tmp File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-QGONN.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\Presets\BlueBallOnlyDots.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\WidestoneStudios.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\bahnhofsuhr.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\AquaB.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\IvyLace.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Wall Clock medium.ini etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-TTULM.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\Lang\Hungarian.lng etopt.exe File created C:\Program Files (x86)\ClocX\Lang\Italiano.lng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\BubbleClock.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\domeclock\domemin.png etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-DKL5U.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\Presets\BlackAppleClock.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\UniversalAccessClock.bmp etopt.exe File created C:\Program Files (x86)\ClocX\Presets\default.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\DarkCrystalBall\secondhand-7.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\domeclock\domehour.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Amarillo.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\BlueSphere.bmp etopt.exe File created C:\Program Files (x86)\ClocX\Presets\White_Apple_Clock.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\black and steel.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\earth.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\romanold\romanoldmin.png etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-MV4R3.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\Presets\Apple.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Citizen.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\White_Apple_Clock.bmp etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\lessmsi\is-EQMCC.tmp tuc4.tmp File created C:\Program Files (x86)\DataPumpCRT\stuff\is-O6645.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\Lang\Hebrew.lng etopt.exe File created C:\Program Files (x86)\ClocX\Lang\Japanese.lng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\AJ-CityHall-500-minute.hpng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\VioletteKugler.ini etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-2VNII.tmp tuc4.tmp File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-JU8I3.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\Lang\Bosanski.lng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\CarpeDiem.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\MilkClock.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\dragon.bk etopt.exe File created C:\Program Files (x86)\DataPumpCRT\stuff\is-8FVTF.tmp tuc4.tmp File created C:\Program Files (x86)\ClocX\BackupAlarms.bat etopt.exe File created C:\Program Files (x86)\ClocX\Lang\Arabic.lng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\AquaLarge.png etopt.exe File created C:\Program Files (x86)\ClocX\Lang\Simple_Chinese.lng etopt.exe File created C:\Program Files (x86)\ClocX\Presets\BlueBallRoman.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Original.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\black and steel.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\wonderglobe2.ini etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Verde.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Octopye2.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\romanblack\romanblackhour.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\Negro.png etopt.exe File created C:\Program Files (x86)\ClocX\Presets\roman\romanhour.png etopt.exe File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-MQUS4.tmp tuc4.tmp File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-GVI6L.tmp tuc4.tmp File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-1R9EG.tmp tuc4.tmp File created C:\Program Files (x86)\DataPumpCRT\bin\x86\is-9PLTK.tmp tuc4.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1660 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1256 1300 WerFault.exe 71 -
NSIS installer 10 IoCs
resource yara_rule behavioral2/files/0x000600000001abf4-38.dat nsis_installer_1 behavioral2/files/0x000600000001abf4-38.dat nsis_installer_2 behavioral2/files/0x000600000001abf4-47.dat nsis_installer_1 behavioral2/files/0x000600000001abf4-47.dat nsis_installer_2 behavioral2/files/0x000800000001ad43-1987.dat nsis_installer_2 behavioral2/files/0x000800000001ad43-1986.dat nsis_installer_2 behavioral2/files/0x000600000001ad44-2038.dat nsis_installer_1 behavioral2/files/0x000600000001ad44-2038.dat nsis_installer_2 behavioral2/files/0x000600000001ad44-2042.dat nsis_installer_1 behavioral2/files/0x000600000001ad44-2042.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsiB44F.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsiB44F.tmp.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe 3976 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3248 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs 33CD.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust 33CD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs 33CD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 33CD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA} etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ThreadingModel = "Apartment" etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA} etopt.exe Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA} etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA} etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ = "C:\\Program Files (x86)\\Windows NT\\Accessories\\RTFCtrl.dll" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx\ = "{2ED01936-560B-2947-7A96-1B4013412EFA}" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ThreadingModel = "Apartment" etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx etopt.exe Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID etopt.exe Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000_Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32 etopt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA} etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ = "C:\\Program Files (x86)\\Windows NT\\Accessories\\RTFCtrl.dll" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AD01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ThreadingModel = "Apartment" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\{e357fccd-a995-4576-b01f-234630154e96}\ = "{1AD01936-560B-2947-7A96-1B4013412EFA}" etopt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2ED01936-560B-2947-7A96-1B4013412EFA}\InProcServer32\ = "C:\\Program Files (x86)\\Windows NT\\Accessories\\RTFCtrl.dll" etopt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 768 toolspub2.exe 768 toolspub2.exe 5004 etopt.exe 5004 etopt.exe 5004 etopt.exe 5004 etopt.exe 5004 etopt.exe 5004 etopt.exe 5004 etopt.exe 5004 etopt.exe 3720 powershell.exe 3720 powershell.exe 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3720 powershell.exe 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 768 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3720 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 1440 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1440 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 4120 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 976 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 1812 33CD.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 976 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 2288 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeDebugPrivilege 2688 powershell.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeSystemEnvironmentPrivilege 3464 csrss.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeSecurityPrivilege 1660 sc.exe Token: SeSecurityPrivilege 1660 sc.exe Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3712 tuc4.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1300 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 71 PID 2148 wrote to memory of 1300 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 71 PID 2148 wrote to memory of 1300 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 71 PID 2148 wrote to memory of 4804 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 72 PID 2148 wrote to memory of 4804 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 72 PID 2148 wrote to memory of 4804 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 72 PID 2148 wrote to memory of 1440 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 74 PID 2148 wrote to memory of 1440 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 74 PID 2148 wrote to memory of 1440 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 74 PID 1300 wrote to memory of 2208 1300 InstallSetup8.exe 73 PID 1300 wrote to memory of 2208 1300 InstallSetup8.exe 73 PID 1300 wrote to memory of 2208 1300 InstallSetup8.exe 73 PID 2148 wrote to memory of 348 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 75 PID 2148 wrote to memory of 348 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 75 PID 2148 wrote to memory of 348 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 75 PID 2148 wrote to memory of 5004 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 76 PID 2148 wrote to memory of 5004 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 76 PID 2148 wrote to memory of 5004 2148 ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe 76 PID 348 wrote to memory of 3712 348 tuc4.exe 78 PID 348 wrote to memory of 3712 348 tuc4.exe 78 PID 348 wrote to memory of 3712 348 tuc4.exe 78 PID 4804 wrote to memory of 768 4804 toolspub2.exe 77 PID 4804 wrote to memory of 768 4804 toolspub2.exe 77 PID 4804 wrote to memory of 768 4804 toolspub2.exe 77 PID 4804 wrote to memory of 768 4804 toolspub2.exe 77 PID 4804 wrote to memory of 768 4804 toolspub2.exe 77 PID 4804 wrote to memory of 768 4804 toolspub2.exe 77 PID 1440 wrote to memory of 3720 1440 31839b57a4f11171d6abc8bbc4451ee4.exe 81 PID 1440 wrote to memory of 3720 1440 31839b57a4f11171d6abc8bbc4451ee4.exe 81 PID 1440 wrote to memory of 3720 1440 31839b57a4f11171d6abc8bbc4451ee4.exe 81 PID 1300 wrote to memory of 1176 1300 InstallSetup8.exe 83 PID 1300 wrote to memory of 1176 1300 InstallSetup8.exe 83 PID 1300 wrote to memory of 1176 1300 InstallSetup8.exe 83 PID 3636 wrote to memory of 4120 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 88 PID 3636 wrote to memory of 4120 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 88 PID 3636 wrote to memory of 4120 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 88 PID 3636 wrote to memory of 1668 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 90 PID 3636 wrote to memory of 1668 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 90 PID 1668 wrote to memory of 3524 1668 cmd.exe 91 PID 1668 wrote to memory of 3524 1668 cmd.exe 91 PID 3636 wrote to memory of 976 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 98 PID 3636 wrote to memory of 976 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 98 PID 3636 wrote to memory of 976 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 98 PID 3636 wrote to memory of 1812 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 99 PID 3636 wrote to memory of 1812 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 99 PID 3636 wrote to memory of 1812 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 99 PID 3636 wrote to memory of 3464 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 96 PID 3636 wrote to memory of 3464 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 96 PID 3636 wrote to memory of 3464 3636 31839b57a4f11171d6abc8bbc4451ee4.exe 96 PID 3464 wrote to memory of 976 3464 csrss.exe 98 PID 3464 wrote to memory of 976 3464 csrss.exe 98 PID 3464 wrote to memory of 976 3464 csrss.exe 98 PID 3280 wrote to memory of 1812 3280 Process not Found 99 PID 3280 wrote to memory of 1812 3280 Process not Found 99 PID 3280 wrote to memory of 1812 3280 Process not Found 99 PID 3464 wrote to memory of 2288 3464 csrss.exe 102 PID 3464 wrote to memory of 2288 3464 csrss.exe 102 PID 3464 wrote to memory of 2288 3464 csrss.exe 102 PID 3280 wrote to memory of 4560 3280 Process not Found 107 PID 3280 wrote to memory of 4560 3280 Process not Found 107 PID 3280 wrote to memory of 4560 3280 Process not Found 107 PID 4560 wrote to memory of 3172 4560 41A9.exe 108 PID 4560 wrote to memory of 3172 4560 41A9.exe 108 PID 4560 wrote to memory of 3172 4560 41A9.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe"C:\Users\Admin\AppData\Local\Temp\ff3022cc92fd5e0eb46d34568825a3d914a3ce7d24cea60660cdb3247956f098.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\nsiB44F.tmp.exeC:\Users\Admin\AppData\Local\Temp\nsiB44F.tmp.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsiB44F.tmp.exe" & del "C:\ProgramData\*.dll"" & exit4⤵PID:4504
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:3248
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 19643⤵
- Program crash
PID:1256
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:3524
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1812
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:872
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1240
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3976
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:5000
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\is-0BCQI.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-0BCQI.tmp\tuc4.tmp" /SL5="$30242,7884275,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\etopt.exe"C:\Users\Admin\AppData\Local\Temp\etopt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\33CD.exeC:\Users\Admin\AppData\Local\Temp\33CD.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Users\Admin\AppData\Local\Temp\41A9.exeC:\Users\Admin\AppData\Local\Temp\41A9.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3172
-
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
260KB
MD5b02d7976790d284883b5728001e83cd1
SHA15eecedf43d7b335648489504ab93ad822d6ba53e
SHA2568643c38bed80cba1e365943db7f90ab1a2119bb486ed87e3f601974afc75a134
SHA5120b3d37779704b3543ca40b31f6eadaeae68326f77beaf63a09d646675b65a4d706ab0aa2b71c7d7e7f7d78b4ab6245a237f561705f12774817331c274693becb
-
Filesize
95KB
MD5f3e1a5faef887fd80df08e56939d6a7d
SHA1b6e4b617ac1cbf6147c893974b290b988b08a3e5
SHA2561757135909acab902603479c2a508dadb5dc0f46766128815452a7f8345a65a4
SHA512814bedd303d0df2c0b8a5158c7dd6c37a1fb2d6356fbd1cf3a18ff45e8ad3952b8c3c2462fcc12a64c49c4a53e136aec53816a32ae2496b6669b4cc5bdf3ee6d
-
Filesize
334KB
MD53c0711643148033063d6ce76da73c1f7
SHA1e6df1e008194275c8a2099d0baedd6749ee41ace
SHA256f8c678f5893ffbfff22199834ae5104d5118ea6be61faf137b5c990512eea848
SHA512f7d42d1bbecb6cd44d7fed7ed03414144a8532abea0ddd97006f03623456de130c2edd0cb8098743c973a8d79055ee3137444ceaab9a2e006df224d2befa3f75
-
Filesize
216KB
MD514f0b3ca0d43daca74db5ea3b3d4e178
SHA179b91b8099e1afbef20dc52c6d4d73260e502740
SHA2566e5e7606dbd92b5ff31a83728c2c0084c83a79c603712b087dade77c68ee1bb1
SHA51260bdda2e179bdcd5ac443de9cc1537942269eb54f50d24b7a0b57b86a65b660a0c646b6f3e3067fd32b29cfc946b9a86980b4d9dd0bfdbd61052692496f5c098
-
Filesize
209KB
MD53930255685b6ee43bdd42d35c5715457
SHA19258a56bccc577c5a4e7d494884714fa5d4ef678
SHA25655c9d0c3c894c8bd1df65b547d236ee732ea7da92abc30ba3df988f24e2f4f99
SHA5120cc5cff341d1ba2241111954f003e1979a8b92e7917575a62d6cac039a2b3d17c41f27155a4eacb031f1df9f21e1c3f7d08231e4ad4c78c568e493d5c4782298
-
Filesize
85KB
MD57334c640d824e27ac6d6c492fe8c7d8c
SHA144008ef1ddecc0a7854616be7364017966572cb7
SHA256af0e75c6329b638a17c6906b7cb7f5cb3474e27a03064a0b64677d29753e1956
SHA51281991c56e7de30a240e4e7d1d6839636790ba13a65cdd3522ae78c4fe787c2579ad1671b6deed693a46594d7ec6b338508165426c8888e50391b98516d19187a
-
Filesize
11KB
MD57a81a9df017f7f1fd54be40c2d207e6d
SHA129e7f0661b0162e9b30c128de8982ff1d5ab8855
SHA256413498f4f26802a0f5140c4d675a6b856c07fc037654f1827a8296cf528429c1
SHA5124a647efdf0698a261dd8fdf2d652b9955894fbef83c30c8770a939be5a8c4c5f53ac48107be2440b0e6ea41c9bfc6d6d134f9fd85047434546445f0eee7ab887
-
Filesize
64KB
MD50a90f231fcfede6e071cfa5e88b244f7
SHA1161954936f6bef19c895d6798a9ebc1e36eb8d5f
SHA25679ea00cd8c63517f97df7948f4ecd1ee2a9b675d3e5af787ee27fab78abe576e
SHA5120f9ce57279ce81200514c843038b640c4a2138badf12a57651360a906dab9f3ee4c6e3b4473a2eebc4e819db587ef217fd49d5871d1607f8609e8b1942d7c171
-
Filesize
146KB
MD535d25aaf3bd5a847bb793b18f3dbf7df
SHA1e605252244c34fc1ca6f529076def7885c37d000
SHA256cd21147cf924dfdc5aaff066275576685e515577c03e7f22b1ffa5559075bc33
SHA512fdfc2e5249d1230cdd3a1ad0d81224bd52c069d8558c9f17486762c586ceb7e491eb36879be1f6171259eda0b30efb3518167ef1cda84ea7e8ce3f1b0930b8e2
-
Filesize
80KB
MD508310741c4cab08645ab1176c972e74f
SHA1934aca6bf737e288056894fb5d7ace9f6cf7bd1f
SHA256f89de75c4ecf28243586fb4f86537434afc1beef5ca75a2895ac40dae1f52ef2
SHA512a9ac26ae239be2148c2518a6de98f842d57d9a8b8f2dfb30f224110f1258642598b93c00e15c2faf9b25c7236f0f2e83ff844114881a0ab2946002dca3c5b115
-
Filesize
219KB
MD50376209f653cef7c9bc75796baf1115e
SHA1b47b0194e45f16625cf93fbac080fd1374f2ac15
SHA256e3d98d5dfcfef886e69fa3158f7f064e01321b245dd2fc0832270ff6874d4aeb
SHA512c2b3f448201101463e3fe288565e4d9e7890c8e410ff0ae1dfb464b9343e34dea3efc351978796b84c796ed05f8819b5eb54f250a37ab9c4d756e580bbe3d23f
-
Filesize
241KB
MD5b9013d4cd2e374aedfb886a99e0993c8
SHA1db62f1380a4f369218ab6297e9ebf1746d239d51
SHA256e57cf659351369c13abb8585c284e13ca035401d0f4c615dda30bd02139ba9f2
SHA512964287950081d794d6cfa0c490f4f9ea615a49805f778bdf28fc0bb55e38661be392d6ad4f4144f47661be80170fb66c6fd53516c034e6996f9fd2ee8db02a4b
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
149KB
MD5eba19feb9850a55878ff70f54211d405
SHA1cc007ff190155f86d3ca6abcafc8c52bbeaa1d46
SHA2561ede4ef80361ab14b3ee032b16fdb2aa23dcb6253c3ecf3b36dc22248a5496e0
SHA512151512f880d0fd5bc3b14ddcb7a6bc0670b0ec6fe2b0795963541da36232e3cbfdf41e78dc81b0d5d6f02a13caf572a7d746768b1fb9d0af119eb62f06be3991
-
Filesize
276KB
MD536d1956c6dc60f308e85cbb8c9ada4fe
SHA1ce9b9ad20f62513da80eb1d0fe634c2404e16c4c
SHA25658fbeeae6de2042f0e63c7e9c3b7edc10edae7304584b5e6839c76dd8c750886
SHA512aa8b8db6d6f40b8a83c6e9efcfd9a12e1b9e9d0585fa2010d1c0583f3330a4364f472756b5593e85f0a5d4473d809569e2f5402d78fbfbf0b5d9c2af41ddcece
-
Filesize
225KB
MD5644900c76861a7979824217135a97c46
SHA14bf601b33a295f748ec062184e00cc17f24b029e
SHA256b26afb80dad4a94b5d5b179bcb7493300f0b11041e9958cac842f4650390a62f
SHA512f9af644eceb9db321561b2c09b48500b86872c1fd6a1e7f8ef3ccd976a339f59d3fdafe0df98e64beaaa19926981e7aa96f7226e9b8311f1061a6e31aea52746
-
Filesize
143KB
MD596f1e363803fb5c39826446ba96bd92f
SHA1fd15f4e2561a88622a30043184bef804a6c7050f
SHA256f4db5f0059afbd554a084382ebf915c3bc4c4d1e68e0973d1363360e794937e0
SHA51266a059a87db1eba0f3a3a2de59ca21ca4d773fb0a3e871daf5bd5e5d3a01e1f67829a2e40bc3f62ef9c90d3b180a4ae5c8c60097ce2d7ee1c47f7ef5285b9046
-
Filesize
160KB
MD55c696a78acce026c4acafe4653c223ce
SHA11f58121fe1b1aa37771f53f8f5e6c4afd87ab489
SHA2567453be1e9c4a6f1d0dd5e8edf266bc1dd74b19fff3f717530b97d425def5c2ec
SHA512eea8053532082975cc5a8f72624a0d7ba5fe49760680a885b95691bc5f26ef8e4755a305f46927c2fa9bf6a82ee24eba4572efe0bb528d87ee737ed45cd79b64
-
Filesize
147KB
MD52ccd2e5ffd36bc1feb1cc642202a6f9c
SHA184eaaecddd42dcfe3a5acc874095da99e3ec1c30
SHA256f3c467b5953a70d51b73d792a8c41d8e6fca8f87e3802534de35bbcbf3ca0b80
SHA512ddbab61c518b51b40b8ef1bbf751fc502b0129231f65ab2b30b9e657c261fe657c29e9c5709d78bea4a94c863fa0522ce76a4b321cd833dbf49bf291aed2b7dd
-
Filesize
211KB
MD53ac0c49a63653233dbf329ad571664ea
SHA1f5dbef303c578eefcb37b06544df1925553b0100
SHA256b5200cd9510d780ac478532f1cdd218ea18ecf5fa17cb9d40a69ec9eca7dc9b4
SHA512a1c269ebdc59dbbf3670b0ae0c3c45f03f1811e3aab1c520270cd3cdcc10bb2c9b1569e136e2d439c4d1cfd21f3d51d91ab74b1d70a754e62425866b6de30b76
-
Filesize
72KB
MD57918253f23f851843649758394280f66
SHA1b00c4c3a4534b7516dd128452b301caad5802dbb
SHA2560c9dcfabe1ca373d6fd12ddada5ae1db8b4941acef8d1dcb365edb6b0e4b89d6
SHA512c01ee86ff68573890709115a22a0bbc0afff25e194d45c98d0134d763f2b524cdf5d7966bcc8418305ffc2da3a5a22b753d77f01459d13d6a99c7ecf1453d204
-
Filesize
143KB
MD5353d514756acf0b9a24f0e607c4cc2b6
SHA1c5c13e8dce399fbad725e93c6a8167fc57186003
SHA256d640e8ed2c7e5824b43c8bcb408722758917125b2c85a525081396dcbb9c7333
SHA5124ee827d0af9f6106be17cb13d118d78b9a345e291f2d5bf4bf00c330f632a1006e82f4f7a7c8f6a623cf960c3bbe33a75888b29dc64cf8db5f8112db40b44d07
-
Filesize
253KB
MD568c62cf0534e97eac21d9390af8c8fe1
SHA120a170fc7944bcac0ba8fbc3fb1c506bef7a51e5
SHA2569c0646e4ad0b588168a233f6852f06441d7898569f048a320b85e8ac67870d54
SHA512a5b26326a6458644ad5ec5b6ca4b0aca79106f1607f4319c6a7b89616518570bd9ff5e909abf20907ff24db32f5c5f74e94a3a8df467eba6425b16467b0ef699
-
Filesize
516KB
MD5e9539a1908bfa5dcd0f61223b5a6f2aa
SHA14b3adb0b6f1b1254b062efd9674b6bf0b325d9c2
SHA256ac5dafa0e04af7612c8e4dc7bb149018146f32c4d69f7393de44fa3fb62aff25
SHA5124a7c31a897845a715a3432e99460f9e1c9388114358c5eeaae966b26c3345daeb07523b7101a281b38930b458474f92d576c7ad474dd1a6028f8d2f33eb48342
-
Filesize
444KB
MD54d6b7ce808dfc3efc7724bc99b00b091
SHA1f063fcefc4b671926cbb753caeb609f804cc1b44
SHA256b0b00be3c42868c055230f96d382482107fbd066b1429ebbc2e06b88fe899f07
SHA51299e48268cda74b05300de2bb4b17a93ef43da7fd7a8a2fb2bdef179847dd8c47e606a25fe75f6854e06c44f6a46c3781fb2d8d31617575807ace9ad8d73216c5
-
Filesize
1KB
MD52563184f1985fd4c6bac5163f4d704d1
SHA1a4647c24b1cc4698abe5ac3211982c3cd5423c71
SHA2568096dae81a1a9a4f8e0ac5b4a3d45daac1f7b0603dd705eef1931cea8084d802
SHA512375442bd93db6a7123c166e858ca3cff6d92289c69d3269e463397a7a02098c5b04d0c09a5d480790fb22af9726277b276c2adb614f76288cfe4ee9ac6360110
-
Filesize
810B
MD5602f0f7430a1f991d9fc25d514c5d47a
SHA1a71ff0d9a56fb55fa35d1ca2973b44cdadb475c7
SHA256bfec0466932f3bc8ca68fb9286dff5375ad29762caec4786ed600e1380142f0b
SHA512f8a7aeeefb951a650253af599dd3e89fe8ffac8fcc0aac87018eed9430eec1a2c5dcd45e5f8525427ec8a2aeb2ca5d2b955ae257edfec08b99daa9fa943c9913
-
Filesize
69KB
MD5d7b9a48ba529546ea3a09d94fc161a02
SHA18649791c40b4483fa68b709fedd8b89384c679fb
SHA25621eefe2070035678aa73738832e6ce5260b978a32bcd7ae5ef4e0e3f22233679
SHA512f61858b8de6b560a12fabe01aa3d02d2562d26c30f687bd64b1740937be88fd88d0d2e502fee48b4e8aa0d9d88fe31d93349624c0b217da5b7d2acc52a23b79c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55b9894825da8063318a8b7f322f31548
SHA1f605b53d5176b0a74c50d5e99c2853b82bede214
SHA25676377c9dde167623fd9bc14142843d91a0f5e86a572b66c5b9aba80230e625f9
SHA5127dc3395cafbe152501798813db6457a474406a1af124f3d6fca9e81595a17db4a806a68c2e7dc3a16e43f52bc544d3299f53a2410ab21d6af12e9d3dfbd29ef5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c639a676e924a6e28be850150a81f9a5
SHA1828bf71914d241e739a62a86e574d72fe0703615
SHA25669fa73a1828af0dd9febab59ac2afc2f4739ece7151f7398314d9463ae5ab6cb
SHA512aabd99b6c846d3556fa565f3b0c641ffca0a7e294352e022184c93615b3fa3ef562784d4130a3835208e0075b022cf61a873b3afdd3e5a007dde7abe5746bb17
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51fdda71a353599f55b8f3ca5197f27d0
SHA15ba296cd9017a860dd08167eef3729c5e1e637ba
SHA256dca26f1109c852a0af367b28efd454b816f27e1a06819230b2a43bac65f578f1
SHA512d28cf6b6c94b0607b0e32ed72f1c40a19c178acfe99f7d5e70d2a6dd9bf16342d64dd348ad728d70cc4cfa58d7b955ec18672a96226ba7c807a84ad1f9d09406
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD54d4a03462d27370bdeca7d2e8e9ffdaf
SHA1c01b6bba35f4e94ff1a7da18b1b74a312393547a
SHA256a717df16745023437ccba5a22e7036bb01ba53790ead99773d1ee76471c2d690
SHA51283cac8627c66f403ea686e3db279bc1eaa57c772d21e9c782feba0800a0ad4385547dfb34148b5dec1dcfcbc32d42690c3e3b0ef321f8c5df0a27b36594a3673
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD503e6736a4a5ce24e360114789d0ca6db
SHA11a1853c5ab1bfc8ea438465deef1be32987d7b17
SHA256084a48ba6757f22e1599a27946a8deb365e70afdb16b555b1412f7cc7084ba43
SHA51260a1c85bb99ab7d9959b3e7813cd903fd0afe38629c3fff2ef6e2a9582fab4c709d814b7fc972b2f60c2716ffb1828df9dff6eb154a7d60a75fc52582846bb1b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f40627c731caddfc9b53e4e0dcf53e24
SHA19fb1f45bd68b95dea519b974acd40de6fb1de8b5
SHA25675eb08b1e00626f6e58e530ea77e10e0d6ef80fb4726a41d717bfe937906dd1d
SHA512191a73b9cf6417b68e7eca90ddfc5928b6ee50fa7c5c296d7704904a416a9874d73792930d4ee0678da848b8581a4ccdb76264198e47163c53d26799ddf2058a
-
Filesize
33KB
MD5bf72fe5535f00d7ba99a971413c47631
SHA1a69a27d25a8d722d698031649b47c479447f3316
SHA256f0f5b7fdbe2858628e155c0845f0b71c10c9c118017ee6266ede4058ff90e6d2
SHA512923916c394d08fa3fb0fce5c6ffe04fe5228b8559b0dd0555f5811cbf23d472b41cad391ea6faa78a65e3e4da60b3d66b3c3334f1b1adbb47c539b31d46e4db5
-
Filesize
135KB
MD58247f41550ee878d7cbf6d8c9731db07
SHA1d805cd69607b8076f9d4cc4a65742c578a8599e5
SHA25673c7fcedf4a03b38a13232a8f31db403487ac8cd8bc6817aeed7f6f4ae082362
SHA512b2cb118c08f388f2fa2c2ece14230c344e4692530048759893a76da2b1cf38bd5a83727a6e46784fce78fef8071ca0560aa49819f18615fb2f0876904fa0953b
-
Filesize
66KB
MD57f7356d64369c9fa026a16876c7a6ba3
SHA17ea5ce29494baec4e8a972082b316aeac242dae7
SHA25641e96c23d3cc5548700042272911f8d41b9d4de983ef4efbc9a3030bdc73232a
SHA512347a58e280691d4689691283da07e79eda7aab4a465595282f8afcba08260cc886ea9ce284a247f4554dc6037cd09155bec715bb141169812c96bf8311abf0b6
-
Filesize
329KB
MD577cb09f84641d2c7d91711c761fcb4f1
SHA112f7f17b8a0925fb5baeef123e335499b0b2d9b6
SHA25656489b20b1d5a63a99da87a5a438a8c4c9994cff2d7a08aa74faf7e6fe4575ea
SHA5124225556dfd552a6607289c316c271f0e541a221b34141b10bdd9f3026581154251a38c96d86bde31ade30b42777df630808d932df0c736039c59c2577c4c4bb7
-
Filesize
314KB
MD56ba3a456580b5c15fc5076ff9f0cfec4
SHA12b3dd375a4dcf768074e3eae9d542127597b92ae
SHA25609c13b0fe77aecdb07ed3de30aa465c4a618d4c40439a1b31ef45400a7eb4a9e
SHA51260ccc7261202cf92e8f4367c9061a72c6732607fa9654fb5ff6932ed894a6f64dcff264c52c321e8e3981e413c9d6920e50aa1d4e4cd83e3cdbbca4e390ba7db
-
Filesize
372KB
MD5a449614951c7f48edae9352968044170
SHA1005d58ed884fe446ee46e33d7bce81bd36cf81a1
SHA256d11ab31d5c08cd05adb937536df8b4c64738de75880b54b0d6a273bc8439a365
SHA5124b0d4121da2b485afc9ffbd3c63cf4cd01cca9ea95a893be8bb6ae717b6af71fa87a619971b56fdcf7ceefbc6e0fa8b6d4e061c23bb33589dde06b75a144c018
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
149KB
MD5c15355dafb8f8a5682636e6880c3aee4
SHA181176f2f508b85e5eedd52be14d5b773b47d77ae
SHA256be800521c337a64153f994d2c8bc42badaa8ebe2fad06cdfb669557e8dd61493
SHA5126499d953f9e1e088c99cfebc14679b159918ae178ba9e42242dca73b819db44fe494e385459b05acd6d5d2b9f5da7414d5d862bbdeeb86660c20f621fb6beb63
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
41KB
MD58dcc038ce15a235ea9e22fc9663e4c40
SHA1cc702c128e3035d42220bd504d6c061967d3726f
SHA25664b23aa5ca4e2e516fae3d2480957d6f1065c91caa930e0ffac2bda1cadea76a
SHA512bf81fee736e02680b2d5cd23dd360430b9bd97ad1f75ae9485e82b548f61b83a092c5e17a4d537a06ece6384003aeb9b7b9e7eac4a7ffb2b371160570bce6b81
-
Filesize
76KB
MD50f459c2bd249a8b1f4b1b598d8e5299d
SHA1ca47103107cd686d002cb1c3f362efc5750bfeb4
SHA256acd3d2b809c320bb8b93385212bac23536bd6894e8e2638a5e85468ccd54fb3b
SHA5121a7e6e48ee9d966a59082f2ad3b6405d8bbdc1a45f54dec1de9fd1a16b34bb0dc422683ecffd5dfb484db3c5c42caea410d49debeae50ba3979520834212afe0
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f