Analysis
-
max time kernel
54s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 15:39
Static task
static1
General
-
Target
file.exe
-
Size
791KB
-
MD5
633c983c901941da05e19f89ca8e9d33
-
SHA1
82bc062a291c45b6e4ede5bf3bffbf85029d07d1
-
SHA256
5c65af0cf527252892c5d4a90aaef419ba9c76b3da19850acf7d393ad3fdc608
-
SHA512
8090fe04a680a7d9a7d782120f65f2b81ce7b25ba42937f7e561bfaf9a228d05a8dfa35659704c3933ca4394cdbffae791f09ed43e49f2fb62ea84bcda4391f4
-
SSDEEP
12288:7UStB7HU0I9Qnjo7YNQKeS2YcKify3iHTr4cnSr3/35elqxHGIF3S:TBPCQn8wQLsiK3IHDnQ3v0lql9Fi
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
risepro
193.233.132.62:50500
Extracted
amadey
http://185.215.113.68
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/3272-321-0x00000000036B0000-0x00000000037E0000-memory.dmp family_fabookie -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/1372-181-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1372-340-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1372-324-0x0000000002E90000-0x000000000377B000-memory.dmp family_glupteba behavioral2/memory/1744-556-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4512-779-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4512-785-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 5032 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4632 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation latestrocki.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 14 IoCs
pid Process 4708 explorhe.exe 2296 livak.exe 2568 zonak.exe 4720 explorhe.exe 4920 SetupPowerGREPDemo.exe 1368 latestrocki.exe 1032 InstallSetup7.exe 4976 toolspub1.exe 1372 31839b57a4f11171d6abc8bbc4451ee4.exe 3272 rty25.exe 2200 BroomSetup.exe 4788 nssE580.tmp 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 4512 csrss.exe -
Loads dropped DLL 5 IoCs
pid Process 5032 rundll32.exe 1032 InstallSetup7.exe 1032 InstallSetup7.exe 4788 nssE580.tmp 4788 nssE580.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2496 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00090000000224f6-759.dat upx behavioral2/files/0x00090000000224f6-766.dat upx behavioral2/memory/3436-767-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x00090000000224f6-758.dat upx behavioral2/memory/772-781-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\livak.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000392001\\livak.exe" explorhe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zonak.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000434001\\zonak.exe" explorhe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 103 api.2ip.ua -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive 93D0.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2568 zonak.exe 4708 explorhe.exe 2568 zonak.exe 4708 explorhe.exe 2568 zonak.exe 4708 explorhe.exe 2568 zonak.exe 4708 explorhe.exe 2568 zonak.exe 4708 explorhe.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 972 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2196 1372 WerFault.exe 105 4500 1744 WerFault.exe 118 3804 4788 WerFault.exe 112 2220 4136 WerFault.exe 168 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nssE580.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nssE580.tmp -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3260 schtasks.exe 916 schtasks.exe 1032 schtasks.exe 2988 schtasks.exe 2912 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1096 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates 93D0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs 93D0.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 93D0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs 93D0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 93D0.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4976 toolspub1.exe 4976 toolspub1.exe 964 powershell.exe 964 powershell.exe 964 powershell.exe 4788 nssE580.tmp 4788 nssE580.tmp 1372 31839b57a4f11171d6abc8bbc4451ee4.exe 1372 31839b57a4f11171d6abc8bbc4451ee4.exe 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 1996 powershell.exe 1996 powershell.exe 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 1996 powershell.exe 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 1744 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4976 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 1372 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1372 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeDebugPrivilege 1996 powershell.exe Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeDebugPrivilege 1472 powershell.exe Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeDebugPrivilege 3752 93D0.exe Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeDebugPrivilege 4796 powershell.exe Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeDebugPrivilege 3224 powershell.exe Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeDebugPrivilege 2120 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1268 file.exe 4708 explorhe.exe 2568 zonak.exe 4720 explorhe.exe 2200 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4708 1268 file.exe 88 PID 1268 wrote to memory of 4708 1268 file.exe 88 PID 1268 wrote to memory of 4708 1268 file.exe 88 PID 4708 wrote to memory of 1032 4708 explorhe.exe 90 PID 4708 wrote to memory of 1032 4708 explorhe.exe 90 PID 4708 wrote to memory of 1032 4708 explorhe.exe 90 PID 4708 wrote to memory of 2296 4708 explorhe.exe 95 PID 4708 wrote to memory of 2296 4708 explorhe.exe 95 PID 4708 wrote to memory of 2296 4708 explorhe.exe 95 PID 4708 wrote to memory of 2568 4708 explorhe.exe 97 PID 4708 wrote to memory of 2568 4708 explorhe.exe 97 PID 4708 wrote to memory of 2568 4708 explorhe.exe 97 PID 4708 wrote to memory of 5032 4708 explorhe.exe 100 PID 4708 wrote to memory of 5032 4708 explorhe.exe 100 PID 4708 wrote to memory of 5032 4708 explorhe.exe 100 PID 4708 wrote to memory of 4920 4708 explorhe.exe 103 PID 4708 wrote to memory of 4920 4708 explorhe.exe 103 PID 4708 wrote to memory of 1368 4708 explorhe.exe 104 PID 4708 wrote to memory of 1368 4708 explorhe.exe 104 PID 4708 wrote to memory of 1368 4708 explorhe.exe 104 PID 1368 wrote to memory of 1032 1368 latestrocki.exe 109 PID 1368 wrote to memory of 1032 1368 latestrocki.exe 109 PID 1368 wrote to memory of 1032 1368 latestrocki.exe 109 PID 1368 wrote to memory of 4976 1368 latestrocki.exe 108 PID 1368 wrote to memory of 4976 1368 latestrocki.exe 108 PID 1368 wrote to memory of 4976 1368 latestrocki.exe 108 PID 1368 wrote to memory of 1372 1368 latestrocki.exe 105 PID 1368 wrote to memory of 1372 1368 latestrocki.exe 105 PID 1368 wrote to memory of 1372 1368 latestrocki.exe 105 PID 1368 wrote to memory of 3272 1368 latestrocki.exe 107 PID 1368 wrote to memory of 3272 1368 latestrocki.exe 107 PID 1032 wrote to memory of 2200 1032 InstallSetup7.exe 106 PID 1032 wrote to memory of 2200 1032 InstallSetup7.exe 106 PID 1032 wrote to memory of 2200 1032 InstallSetup7.exe 106 PID 1372 wrote to memory of 964 1372 31839b57a4f11171d6abc8bbc4451ee4.exe 111 PID 1372 wrote to memory of 964 1372 31839b57a4f11171d6abc8bbc4451ee4.exe 111 PID 1372 wrote to memory of 964 1372 31839b57a4f11171d6abc8bbc4451ee4.exe 111 PID 1032 wrote to memory of 4788 1032 InstallSetup7.exe 112 PID 1032 wrote to memory of 4788 1032 InstallSetup7.exe 112 PID 1032 wrote to memory of 4788 1032 InstallSetup7.exe 112 PID 2200 wrote to memory of 1600 2200 BroomSetup.exe 113 PID 2200 wrote to memory of 1600 2200 BroomSetup.exe 113 PID 2200 wrote to memory of 1600 2200 BroomSetup.exe 113 PID 1600 wrote to memory of 3276 1600 cmd.exe 115 PID 1600 wrote to memory of 3276 1600 cmd.exe 115 PID 1600 wrote to memory of 3276 1600 cmd.exe 115 PID 1600 wrote to memory of 2988 1600 cmd.exe 116 PID 1600 wrote to memory of 2988 1600 cmd.exe 116 PID 1600 wrote to memory of 2988 1600 cmd.exe 116 PID 1744 wrote to memory of 1996 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 1744 wrote to memory of 1996 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 1744 wrote to memory of 1996 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 1744 wrote to memory of 3036 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 126 PID 1744 wrote to memory of 3036 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 126 PID 3036 wrote to memory of 4632 3036 cmd.exe 124 PID 3036 wrote to memory of 4632 3036 cmd.exe 124 PID 1744 wrote to memory of 1472 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 128 PID 1744 wrote to memory of 1472 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 128 PID 1744 wrote to memory of 1472 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 128 PID 1744 wrote to memory of 3752 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 161 PID 1744 wrote to memory of 3752 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 161 PID 1744 wrote to memory of 3752 1744 31839b57a4f11171d6abc8bbc4451ee4.exe 161 PID 4920 wrote to memory of 1908 4920 SetupPowerGREPDemo.exe 131 PID 4920 wrote to memory of 1908 4920 SetupPowerGREPDemo.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- Creates scheduled task(s)
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:3276
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:2988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000392001\livak.exe"C:\Users\Admin\AppData\Local\Temp\1000392001\livak.exe"3⤵
- Executes dropped EXE
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\1000434001\zonak.exe"C:\Users\Admin\AppData\Local\Temp\1000434001\zonak.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\1000441001\SetupPowerGREPDemo.exe"C:\Users\Admin\AppData\Local\Temp\1000441001\SetupPowerGREPDemo.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\XBox.TCUI.exeC:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\XBox.TCUI.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\SysWOW64\agentactivationruntimestarter.exe4⤵PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000447001\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\1000447001\latestrocki.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
- Suspicious use of WriteProcessMemory
PID:3036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3752
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:1536
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:2912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵PID:4116
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3260
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵PID:3436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 7446⤵
- Program crash
PID:4500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7485⤵
- Program crash
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"4⤵
- Executes dropped EXE
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\nssE580.tmpC:\Users\Admin\AppData\Local\Temp\nssE580.tmp5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 24086⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nssE580.tmp" & del "C:\ProgramData\*.dll"" & exit6⤵PID:372
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1372 -ip 13721⤵PID:1080
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1744 -ip 17441⤵PID:2124
-
C:\Windows\SysWOW64\timeout.exetimeout /t 51⤵
- Delays execution with timeout.exe
PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4788 -ip 47881⤵PID:2080
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\45AF.exeC:\Users\Admin\AppData\Local\Temp\45AF.exe1⤵PID:4392
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:972
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\93D0.exeC:\Users\Admin\AppData\Local\Temp\93D0.exe1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\93D0.exe"C:\Users\Admin\AppData\Local\Temp\93D0.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:4936
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\88b74190-9f9d-4bfe-a0d7-af91853e89f8" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\93D0.exeC:\Users\Admin\AppData\Local\Temp\93D0.exe1⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\93D0.exe"C:\Users\Admin\AppData\Local\Temp\93D0.exe" --Admin IsNotAutoStart IsNotTask1⤵PID:2376
-
C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build2.exe"C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build2.exe"2⤵PID:1184
-
C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build2.exe"C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build2.exe"3⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 22324⤵
- Program crash
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build3.exe"C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build3.exe"2⤵PID:3160
-
C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build3.exe"C:\Users\Admin\AppData\Local\2c49b5a4-dc85-49ac-9378-70dc9b385bf7\build3.exe"3⤵PID:4288
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\AD44.exeC:\Users\Admin\AppData\Local\Temp\AD44.exe1⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4136 -ip 41361⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\C09F.exeC:\Users\Admin\AppData\Local\Temp\C09F.exe1⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\C09F.exeC:\Users\Admin\AppData\Local\Temp\C09F.exe2⤵PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\CDFD.exeC:\Users\Admin\AppData\Local\Temp\CDFD.exe1⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\DA62.exeC:\Users\Admin\AppData\Local\Temp\DA62.exe1⤵PID:4628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\5197.exeC:\Users\Admin\AppData\Local\Temp\5197.exe1⤵PID:1628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
57KB
MD54d10baa547aa800a2d649ec99f51655c
SHA10b9f434dc0651470a3fc0e31b8b35e648b6e5455
SHA256972ba258826d2f518b0a854fd2010da88980bf5971288decc866cb55e9ee5874
SHA512d59aa98cadd93cbd031eb15816728c5568e22fe319c4f3e55a629254b3798a9ae8b2d1da1adad0efdb13b516781050f80d8bccdba07179faf61d709cab4e594b
-
Filesize
64KB
MD5fef383de063d9a06313fef7706559216
SHA1ae4bc1e98fd31ef81be55445e68fadb1e12b9d2e
SHA256a07223dcca324c67db2503a62e049839577f5bdacf3ded6bd2454aafbb7fe649
SHA512f3c3816940245957764a17f708cef9822188669407dfee4faf967fa6831391d2c3a5041054b6238c986c802b391c45089502598d46d558988c16f4c0f271107f
-
Filesize
10KB
MD5d2b03235e1f09472509ac1e8bec4e150
SHA120b502ec92bcca6bf6d2c45347648449016e6755
SHA256e7f7399c0fe43159c23bbc86d345fbf7c3bf20902c77fb98993c72e0379c3242
SHA512afb689312c7751efd2e868adc00550c5ae3282ef2d4b829db78eee15a2c26c23e5997a6aea093d959a0b240bc5b50209109b9155464400e8469e051ff0f604b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD585f5248d6f554137cbbf0ad7ade46fa3
SHA1e20af3bc07e1fbc8946ecde9d5b8f3797d44e664
SHA25655fd092c25ea288f42919a69a86a5ef3b464ee22aef0966db1c1fad9094113e6
SHA51207251a8789aed1854ed32637ced85f590c8927f182f9d30f629d91e49f9f7147fbb7d7e87b33b9892de20d0ae824ae993655c4aeec3885363f5fd4057e27e7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5909529dab099c4328664222573d2e823
SHA1ce6f7b40a057772dc111ec7c80cdb8bc4c7bd546
SHA2561d3bc0514cd6065af886279fd4e7c8130f89a749166811ce5c80a349086769a6
SHA51296a28d6cdab129394dd8756bb860376705a087ac71a982750bcfb2da22fc22f048e5083cad0cdff447b1e3081c39f4cd0bdbb5a14c7248f0323b1c80118b0eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD54f46c969e7f17501ff1d571831459e29
SHA1fbf56b8b45bc95820bd37944cb1109f525a775bb
SHA256860bb38bb5fc8a4f4eae89c5fba0080bd1321eff964e4f49ebfd3dbd5a9d5ddf
SHA51259d8dd17b0642972179ec5e2758ec2bb0576cebd96001049b0dca74ba1a2b7a7d7d6e77e0e1280ccdff021e40358ab4fb684e47097ca898ddac895ac4817cfee
-
Filesize
278KB
MD5d04d2f1ecbe2f4491d811c8b9afc477e
SHA19ce75cc8c7de520cb07767ad429223fa9ad23f6e
SHA256e3d16f3f69fa0857f966022387ee6f9408385ddf389d09ffe7dc44acc8ac1ad5
SHA512357322814852a60e7ebb7ff9d2bbbb346d52c7fd6b1f1fc43a265b229fe683f0403e1963d7ad054ced2cec3ddc3bf986ba997c9827d0f513f188b6e80d4673b4
-
Filesize
161KB
MD517df65a9dff2737cee6e9f65f724cb0c
SHA1761612cecf3cc6c2e327dd23b9946a610f2054b3
SHA256aa8006d6f3a4ea3f92bd8ecec5ae3575531b6d2bb3e79e431cb54574c041f633
SHA51221df7d49b552d70690beee7100665a3030a38b7c52eb9a70fb8edcca9280505495de02e0331a699125c4847d2cd4d76aa41af10848c610a4a231b8d47b753f20
-
Filesize
1KB
MD5845fe74261cb8f11c9087d94cd37bff8
SHA12eac92d899a2b0a26d9934fab1bf5ff3dbab4100
SHA256412a839510cdab940655a7bea00c097066a9bdc196c84bc949400705eff7d70e
SHA51258ef94e4eb21d176f5fa397ed168f98cdcb42eef1afc41f84307fff34d786924594c276c220e52528bf2544e9525e7c53499a14a9e568f5b198b6a89a1c5fa4d
-
Filesize
190KB
MD58249c1df69a842c8059f5853e646130a
SHA1ec944e41520b3230bd7913bd3225124752cb1244
SHA256b3831b3910f2c5b4c58cd9edf1b11923d5c16f87040722cbcda4b5ffe4e5ce28
SHA512b06d547a4849fb1339dc2bce549869b77dd1e36f40870ec6d5017abe6decbb9f55f4213500416943df49cd59a72db1fde922caf93a8d2c99cbd66bc49694db5d
-
Filesize
41KB
MD539fd8c4796c9c3b60232482aa28d75a7
SHA1b93ad067cc841c8b6766fbe6813de2ec925a4497
SHA256c8c2c30391b75236f3b28c15537ead43e363750abdb6d9944ebff511d8c855de
SHA5124556199f9fedb63288ac1c922d228f499b67835a7a62e64a0c609601f7ac3c48e658060e2bed6ea131683405c50fc9664ad53d28f8234bbc0bc4c91e1db0851a
-
Filesize
17KB
MD53da6a71202b245a0b5f1fc1a8e31e7f4
SHA16aba2c906cb2cfa3bc122e2fd35913fb58a22412
SHA2563db46d54060652018d3ea1f9b64dcefc6ee7be173bf889e0011d6b4d7ff755f6
SHA512e167a60e6a7340f1fba65d94716814c9b017518157a7378a8cb32e7efa1800b0cd5416f561f318b853c51d3ee1808bd00f569a76d221577665967806d285bf0f
-
Filesize
699KB
MD5ee26d58ac8362c9add47228590f265e6
SHA15c772668225ba54d6bf2b98561d70f0a924555c9
SHA256e9b3f4825a725c7f9b5adf52a5f638e386193247d39eca6fa9cd6527a8bb0d3d
SHA512bf7c91fe0354428ed465a631e897d2724bb5dc123d8875d0ae22d5ff43453207d484265f7a1c24764b29404878551de4c2da420fe6f3bec8955b298b535887b7
-
Filesize
661KB
MD5066a207a23f8ab2fb255a1bae7cebdf6
SHA1511bceff9cf799d77e102cb31e27a05f85f09b63
SHA256de1c0e92ecc4fe99aa1a50705685e6337778285090498d5e4a8b3dd88f3439a7
SHA512ed750ef50ee52a9bddccf009ba8b76400ac85136205654b492b0a2cbf74e5c1b098dd1b6e8a03a2f423082bb73a3942a53993157ff3b527d2b064114af2b0e1c
-
Filesize
647KB
MD5fc2b2ac5d0aa73033c19f168cdc7eeca
SHA134ed23d66014a5fd8a4cdda002bbbb43fbe12447
SHA256277ef04bf1094d624542ae7c4654b5a62ed3525ced01b1a951421e30ea06ded4
SHA5127ef0f1b7a049abb8191f18b35bedc2edf8d23ac6967c959e07823902ec244c2830eb971b50b2416c0a7d0f9fd81401c9f33d9789c4ff9d796d278c4e8e909aa5
-
Filesize
346KB
MD5db19a2adc206a24bf01790353b439a67
SHA147d84e33d4b65c27fb15aa53424cbf2b1bafdd40
SHA256d24d56ef1dcb69629a25558053b78a0ea0fe1b0b893b5700d4f158924d308439
SHA512c222bdb20ca64841dee34bd535d33f80341cd5bc20323457dc555127afd5156cce9c72be83dd2e720ea7df5931ebeaf81e784c621e58d31865204a054f86f1c6
-
Filesize
216KB
MD59762f52b5507e22298ce47d271ae4944
SHA1aae16a8418a87d0c1c5d61b7963d490e65025d70
SHA256dd2e34b65f1434eb658f611a37a85e788baf8b5529118328f69f72ddcf8e2876
SHA5120ae31051a5119356a8f3b3f52e15b53832a241e9a7c4dadf85d9db5589d0b38e269e7aac645119297a7848ffa913abb1febac7025b0f26a83b1e9bf8c60f603c
-
Filesize
187KB
MD5e0736edcd18038849cd8d7f847652c3a
SHA18bb3f34547b8a5a0cee8b1e110e1e266f2445a96
SHA2566bf46abf0649a33166d35b12d6ee61c2d8acadfdea5d2fb877348284f667e9a2
SHA512238962c851bd5b2a543074ccd7021c7f5f5c5c153aec65b0a8b5c0af8fca9c08fe3fa89812d3392df9d9bb1d65df73deba6fc5a95122f1ada39e9c284b445ea4
-
Filesize
75KB
MD55e79bd50745ac809f14da4e828c534e3
SHA1ebae03ea74f9905fce858bd675ee56ee05c2b08b
SHA256bb505ddae2c63a73f64515adcf7fda45e75bc6bac853f926fdc06578a820eca9
SHA512c327d35a4bb4282ea80b31762809cb47a3a2fc9a1209f858988836e3f9291ce6c170e70aff104b1da06a9208f94e281457e30a90b306bc56363ec725220d6312
-
Filesize
91KB
MD5e02ea8a29c338b347809b10d4d19fa20
SHA115af326d76f2535e866cb51a45358bf2be64da0d
SHA2566fb775f5a09fb4d9dbad3a21f6fd1523dde4f61280726a39d1776b6f3197b0f9
SHA512e27cde0becb40179cc91d44352d832e275ed01910424e2f4fe4ed1f882697defe16f91e6bf71468b5a6bf22dbffe41fb1da392d9a144aa72c021df5f617adaf6
-
Filesize
122KB
MD59c05835cdddbeb994b6cacf7e0d5a093
SHA16998b73187da11bdf1b58e5b74d54097a7c9aa3e
SHA25618ba797b4aed411d0dc50ed8935cff413ec9762c5ce538e3b3c098ce8ca9dbe0
SHA51294bf843dc40299967bf12b143f3d6200ed935179c402beb1cd40d0e3a573621cea3b8e7914584a02ed3898c8b1c7726fc76f4cc5d091ebfdaede974a97f2ded8
-
Filesize
750KB
MD53aba837abaec0400762eab4dd1370966
SHA1caf31ee43a89308c62fbc1da02e93173366a3486
SHA256d302f8b630f1f88d1a2d67c4374ab996267d3e263df4d69100ae71561b6e723e
SHA51268de8fc720fa99184e46386dc23a15c524bf6d73b4f6af91ad6994e8c4c19b3389fda5fc948d6ebecae66c90f0edb468ba784287c1ba579322ab23fda5521114
-
Filesize
513KB
MD58c5c0603177408a7b0ed9e31c0c87f32
SHA16601c0818427980e1353f46ba195e3ddb4fe9d22
SHA2562bee3d1ff303606f9665356e3bf5b35f31344794d294fa9fd90915cc2418d469
SHA5128390684c2b25dc0efd5bc0ef2f6c39923c6c9f15dc331407a919f1f3feae3031b2fefb65e3453642d241142f8576ee48d914f6086cb2f270c96162d46e6e4e0a
-
Filesize
431KB
MD5f0deff0e2a018d6268bbf68a2aeb5fb7
SHA1b058d5927abdc0b91a01c64c02ebf696be5f03bf
SHA256f9b17e391440927ec453d08e300d845549559ccb70bca8e271305ff51c305526
SHA51205b8a053eb70f55a54120703100b0adddc21110cf95df1e520ff174b7b4b72e2f5e10dd682eff9bbde5ca69e711124530929559c88252d09ee19eb11fcaffab4
-
Filesize
7KB
MD5c72ae097bc9d2737e20046b0610b9fab
SHA13087154a1d4752afc6cd1043ffed6f9203ad324e
SHA256a8a284f377cb9f21c53e5553234ecb693dc4c2c38f3306b6cde4aead5e05e913
SHA5126225e27319d828ae7aadf011a959a5b1b67cffdd1bedbbaed2a53bd3fd71457ed872016dcb17bfd1ba713e324c7fe4b3076923eacd067052cad28f038bd831fb
-
Filesize
270KB
MD5fa1160de2a03851a2ee690ca5cef888a
SHA1afc2ed4ee5017d4efa72cdb7f09feb6b708ea307
SHA256bbbb41a3fbc1114177bb651031b0ec4a382fd9391abd92ef51890f8daa59a5ad
SHA512238f270372266fa9a7c86a47f85947a52205d6138b9e1df4887528c12071fcf3e4e896a13d7786cde6532954b7a8c246abc36f6156c6ac035f50ed5be18005b0
-
Filesize
126KB
MD53f5c70ac655062b8a7480e3fadc1e9fb
SHA139bf7e91d8d6adb91adab9e8a8de723e02501964
SHA25667249008abdb5ac6a70aa4a9a060a277454911d8021318bd52b36df442ba3362
SHA512aa0b6dfcad8a4d8aef77cacf64ca8c2d2bce7242512676b80a6d86afe2de885f556547ded35aecd73f29fac6c67aad943cd47e218fab787ed19193a74d818b4a
-
Filesize
149KB
MD57a24f3010fcd24d67d16dc46d6a1e6cf
SHA18b74cbae13d0800472badf3823c2c23ca26ce8c3
SHA256579765d81b58f52e5fd1faa927d56df5df22544d4cf7ca4213a74c658a3a153d
SHA5120168061285ffcc010bde64fef8baf8c74dd7e88a56f2d7e7e9cc35ad19e539ab53b962f1cc9c562e289f1bee062c7a375e3715b128f47cd161fa1e060e036ac1
-
Filesize
248KB
MD57d2ebea7dcac1bcbb2813635bd335bc5
SHA107f8c65220ae13b78529c5392994467cd04f1b30
SHA25682f6d30de9f6642b743480d4248d9112a53b0bc7a26bc9b5a1dd7786952f3858
SHA5127ff4294975ce32a9e2d5d9efbcf7d452167f8e9c1403f3775a694dc7d7bf75dbb2bf57fa1ae1e7cfd3c42261a85d94d62728aa5db7d7eb7f72d8e45df3984e57
-
Filesize
73KB
MD52fff5a8ed0fcac94db58ddac819520a4
SHA103f84cf2111821efd2929b4c0426a7fe6d848198
SHA25661b24b1093e1f9735a1e2e67831426f0f820da590981c32d3fd26fcb8eb795b4
SHA5121d2a9e0fb0b863fa2d85033b9c67dbb78509555aa40ca16d412f15cfea58675dff2a355d63f4c73aa47dcae0e59eb78c3e022c0b6a1aea058bf900c582579614
-
Filesize
141KB
MD5a523052fc84b4f04afc91941569342bc
SHA195cd948f7ff169856a3e8af1ce8a0d8716a972e4
SHA256fb88f7670f5ea17213c2c00ed522613082b98dd2eeda70947ae1f3bc78d6b2c6
SHA512f8b090d285307e3fb3240981d22ea7288908f31a1f160e9998876f4eda10841f54fc53a94d6f8253fc7e2cb563add1d9dde576977811b14b96d038b61260019d
-
Filesize
117KB
MD5cb03bc626b7a2c95d7463172b5301e1f
SHA121565a3a0910af5d5cea5c0e48dd4ba6e1c14862
SHA256136effad59af0f0bbf6875f839a4992fe993c1b46e8cc0884953b606e495acdd
SHA512bdfd9ac3baffbd0bdc0adcf8081618fda606374c6283ce8d008884667f4e974ade19d58ed7c62bddeb14612ff210f2674b0333232d2ea81e92e64610607b3863
-
Filesize
156KB
MD554e3863da16587c880a3877656ae25f3
SHA1a6e9e7ed59a88e20c6baaeacbabab76ee5418d43
SHA2565ca963e72e15bb39e0413cb9d28c96e20ee964386d0e87488593ae5561740a06
SHA5121bec5b4833f04ef58c9620f1182e05fc1fbd2630297af51274efe40e6d951babd6ee5bea715a83a86bfae73baf77b625a679250d05ca193385c8c91c160cc109
-
Filesize
163KB
MD501cc4f4d8047109f0706fefc799bd20f
SHA12fcde3576e7ecef09f3c36459e830d028826e015
SHA256829c4297af338aef445f53eae7daa86ce7b5aca8f2f8561ad1d0c1b54289c4d7
SHA5127413a120effe984e205eeff99808f207d4fbec0ec39aab23dc55ea3df5e471e205b1fd759aa830edd6180c80f92f8109468cfdf731129521a6dd4d173927028d
-
Filesize
83KB
MD58595ebec7256f8a3f4c0bee890558641
SHA19209ab669aabacfed2760e78e0fc70b7f6e8b3b0
SHA25650012deb76b8e4ba292b2eae2e61bff41db08231d5e66d2d80b0026da3e1e361
SHA512e2b73bddb9beba293a5c32abe0d401d3e270ffc212b8b020b9e7ef41ab9e703e2b7e45b4cbe0257cf2417503e7543ae09a4175a64f2925900b93685451e9639a
-
Filesize
13KB
MD5ca90eaf60be292b4073d68d587559503
SHA148a629422e976ee1b0d184cd2ec4ca76bab4170c
SHA2563b48218090744c5c76189b0560554bc159065cc3389d622849f0cff466eab86a
SHA5120f18193d23bf1fb4bf4e05e4a4193fd7818fa666fd4dd145b4efff9c785951d687d5552b29906cb7d135c283c6a185e70169d1aef2beb66838e31b991913d60a
-
Filesize
1KB
MD502f7144e9669f2205e5695d3580197a6
SHA1bcd64d58211e70efbb2631316512f30dc1ea3a4b
SHA25600b79dcacf738ca9212bb6083f159f1c43295644458c6b70140f9d710ea6450e
SHA512df157fcb37b11a9b2b15639c5ca59bf6dc1d9b696a85ccd6cdb0cb8b56d2a2a27d75e231edcf93c4657ecc8df234083125812472ad6888fc5a79ade78b15ab17
-
Filesize
227KB
MD5b1680ac07c2985839a114854b9e0422c
SHA16d2cf61528c58ad49ee5a302f390181a623846cc
SHA25638acc535621272c22ecc1d607e29858169265da9c3fe714aeb602bbdb1928e06
SHA5123d9c57f284a9dd48defcccec4fbe23f669101fa0954a292bc7db88a23646debefd4dc4d388c5babed365618a9c93090f5eb3394eed679ceb9b25c15c20aa70b8
-
Filesize
481KB
MD5490612da386b6af7ebae9fe313f1dc93
SHA11891b5293933ff536b0c7cdd629308976ad6c875
SHA2560d258350341201bb128da6eaebeb707f064ad2a96a618028edfa8ec911512003
SHA51261f14186c0cd2becf72daa86c4d1c20fda8be8b5f9136f696060d391bcf1fa92b54b06a56cac348328e84c4a76a2b954a558e99a3b162786fb3be5581ab264f1
-
Filesize
445KB
MD521e66c8fe4e061d248b72ebc6b7790c7
SHA1feeb2558c5094787ad01f7315d2500d2a0922081
SHA256ebbf1f16cd0b8cb07c27457db52ebfe87652bd8817b3ca63184e84194e1bf62e
SHA512054b37a466f1e699fad90f9610d061ee0f773d7731f6a963015bd345b2d6abe1329ebea9ad784c6dd457a7c75e3af9fcc25dcb8c0777fe997257d56ab354ebfb
-
Filesize
286KB
MD5c1f6120e4139e0c4bcca372118363b9e
SHA123409ac5b0e547de2b098e15f201fb7fca7ede9d
SHA2564d4882842c6ba25c227621f023c6db88dc99084df1e37aaa00a0775ec3a9fce7
SHA512474b940747b4762e977757aafc943df84b38e7c72292ac40a8ba8564b927b98fbb6b905150074bb3d5ccb4e11c4f0ca6f6eeb63f61b15c95fcd6c11f57d07e41
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
44KB
MD54717d2e5bfb734beae28ebeb35969305
SHA1dd7bfa006aab3b0503061ed6fdae6b171fcca245
SHA2564dc984a331fbbf570192e479a0e2af9759762740bf0dc4772edeabcbd2ca5b9a
SHA51289e16bd08695c96c8fa989e5965ef9b46d994bdb940bea04da3a3314a837204d75f780f2fa37202ac4ad13e123115f47098a7eb57c4f4ed9392cd8bd38c7f851
-
Filesize
28KB
MD5a66b1b81213f015020ab8cb4fa920f20
SHA1d51a0c5122b5837aeef3ed38ec3bcf8da3835e07
SHA256b4765a5c7afdf607b1e65555d2525cbcc7df7fcb2e4d03b122ed7456a7cf9ad4
SHA5126b47afbb4ac6a54feb7054712621ebe74ff50fe9d6e819c45d8f1d656c3bb035ed1d6db504aa14fa72202fa1a38992f0ab484d22c56448b5655bec850846e64d
-
Filesize
125KB
MD5f5bc651eef2e68e0c77fb92c49b870f3
SHA182455a42f0111eb34aef3612a2df553166ac0efd
SHA2567e8957a3371e923633e85abc8968059bd4d9aa37ca745fe1323c02f109c867ab
SHA5123f4b629d85bf4ed99dc952c5a1c4d079a15df47a1cd7d6434948f43156b495050092a484afc1d0711a1d68e81043ce0debad141546276b00ad68f6158ff56d65
-
Filesize
392KB
MD57b7cdd1513e110d8707f2a8c5b1cdd45
SHA18d172c6f809d94cbf189e088384903477a0161ef
SHA256cac96731a6f690892e536287c32bac3920fcade90f9acbcf9c0ef2e7c7879016
SHA5128a071f3f06ff4ac15ebc133984ff04cca52f11580137428611713485ba2d2d8723abcc1720371edbf0b31519a4b830d3342a6265109ba894e0d6e61c9fe0d9a3
-
Filesize
249KB
MD54522b5c93b82b1cfe289f47eccaddac0
SHA16741f64f310b56fc47b6429804ef7ac0ccee665c
SHA25698ec2f5818651786068e77a4a3b9735a8e9f4258092429683529c8117848c02d
SHA512d397716ca6ad6bd64acd3d78cae9a77dbe22ab5b8c02d551ba20cce473f78fd8cfbc5a6201310538bf07b59ac208115ff5e55b8f710cee19540b57e725321dc4
-
Filesize
409KB
MD52cc3d3acba97a93f226cabe684a85028
SHA165bc337ce4c00c17d5f0fa00fd80378ff5b10c96
SHA2563e2a31a2d226226085487850bf9ff62c783f11164069ddf7b9fc25f452753eb3
SHA51259cca4fff0708d8042e6675a74524d779fed6e66eb64e0e151821add12e8856056f9f436162d2a488d1691dd96356c4a0da133f54875c04396e811fe0c5daa05
-
Filesize
58KB
MD5132e9cfc3e5d460561ed56fa04fa719e
SHA1bf03e550b196eb36aeff7a9e814df6d3e80d4b01
SHA25654c1f1ffca192a7e50221c70ef154bad69991166f9b17fdcec038c71ec2fd59c
SHA512609d90e2b0ec6bb523187266521e545e9ba60b85b749c715d2fc9a1ae83238c4d5633a60ed8f743396e01f86b8f1eb48a694bd11ef9c0767838de823cd6d2694
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
129KB
MD593129dad700fd21acd4d17c6078259c0
SHA10dadff28b68b5f7b413880ba3e36bbea9d499f51
SHA25657b6829a020cd1c4e238436befb9a6c7b115d7f2dbce9fac1aaa0008f6d32ffe
SHA512163943a7a07006134e5f660fd4a3114770159f1f555ec6b900eb92b2cff4fc9cd145284119b7db8a3eb36e0da9e15fea3180e610dc524f3ed212364818f5cd8b
-
Filesize
89KB
MD5db036aec414ce9c82523826b5d684980
SHA181e12db10b02b40f082745a3f18944f78335718e
SHA25684349822fc9d0464f3bce4c023f0178d2669c275102157f5a4e2c13c13ad7270
SHA5121481565a36f546329dbbc955959c5494d6a60b6ca6d78f5bc2106c3c8ddc9a8fe6c8c263e754b276be0590eb1ee558a6a4d2ba439866536c69d2c79ca1e0e885
-
Filesize
290KB
MD56147a3d0b0c086886c364691ecb9ee3b
SHA14bc56a7d199f6c3de75873d0b8af9f1966a2abb6
SHA25612045ca94b62aeb517837f02b7f45175c3e5d7e60dd7f0ebf73cb25a2a0061d1
SHA512593d4a253db1a6f73856009c6b5f9a7cf34622ca8fb1e91f8e68a156581399b9ef74fd69dcf47becf5bc495b3ffae1abdc6edc2454d69803400941140f9cb752
-
Filesize
174KB
MD57f378edcf6826fed31a7698ba1e9d51c
SHA17867b3fefcc89f03dd059dd0e5e98abbf8b1bfb7
SHA2568015e53af8d104ab3572c4ab2f99e05dadfb0008168809b2fd6bdd99c262709e
SHA512216e851382f866c1cdbec3856fe963ea074e3cca1c8283bb985ae44030f362bc4154ee8aea771a556b6b94476325aacb28de81a3ab241dc31ddc765c1af37d11
-
Filesize
202KB
MD5b78885e121e2547ac9f04062d979599c
SHA1794bd07b70ba01524d59358db3e32509749d94a8
SHA256f465d4aaf36fe039ea4228c6d51419d14b45115cc93814331c800a3cbc355806
SHA512f577163ae4342d892c4cbdbe9f5b67eeeb7065451309f7b7a052f311c018f5dd5d586d76f456db677960ea348710a3716f8e0130af70b28099bce82d2a170525
-
Filesize
234KB
MD5d5f6b1cd4f54966a2f6b263d79e62ccb
SHA15f17be2980c7f37e7e14ca9bc2f0a230fe3ef37b
SHA256430c04122ba81a231c4b036c6444087d5a7e28f9414552741d43b592a47dab6b
SHA512a01eacd2085f89cfcd67edfe5dd3072616ad6b76147b289b20fab83c40c95ef7f1caac58d54ef865ee26e5b4e85ace27bb134c2202938923239fc0fa07915439
-
Filesize
202KB
MD5432892779a56988e9443c4188ea50616
SHA1a28a063a4a5ad422a54844358bd1db664d19e93a
SHA2564d2397e55834e327e665e561204205bd153569c5b3f6d3d4658488cf1e76f5e6
SHA512c803bdeed1e48a16d341bee25bb5b0bac1847d6807aa5fa09651f2948444dee3ccd7ea13671cba3cd7740be892d0433937566af72c0445769e3f877adcdefc25
-
Filesize
102KB
MD585af6c99d918757171d2d280e5ac61ef
SHA1ba1426d0ecf89825f690adad0a9f3c8c528ed48e
SHA256150fb1285c252e2b79dea84efb28722cc22d370328ceb46fb9553de1479e001e
SHA51212c061d8ff87cdd3b1f26b84748396e4f56fc1429152e418988e042bc5362df96a2f2c17bcf826d17a8bae9045ee3ba0c063fb565d75c604e47009ff442e8c8e
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52f9af0d5f273bfc8db039e1021040360
SHA120f970237a2846c2aab5f052f026d695ac0dae36
SHA256d101caf476723fb0db7a89dfba29f7b2fa7107ec285112e5c725e7f40ac4783f
SHA512fb07caa8ea7f64da107d3ab90c651b3b19bbfdfc27a353f57c034e253b19b05ab696b2e7cadb11f0b4ecc935b9c5d25bdb9412b514b38eb2d0ee842b46740b8a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5877cb27672ceddc6db831bb70f5ceb2c
SHA170779e90882b34850f323330940a4c3e0604aa4a
SHA256ccf4ae823e6986c5eb12c4dee5bf490e8626a26518b7e34201ecd87c22216ead
SHA5120cb364d86f1a86ad365b92165ac41effc35b4db0686d3aa03c8c013e030d67a0adef92f756777dbca553086211a2f971fda673642f942b26b242d9d7e7bed67f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5af094da0a957cec2c0e67e0c827f1298
SHA193cbcdbdb29d378b5177ae0776b59856ff9c58dc
SHA2568c7530f7c5ee281c86030505d0ebb4e54a08b246c1c4462450a9921544dcc500
SHA512272c6cb9aebbc4c76cbea03fb5363020d6131ab197a18cd82de4c9c0cce60c6ff243f493a6bef9cb64249160a3e5e1f323786375e463d2babddb6e9a869335a8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize11KB
MD547972b9b5e007f74ead187ad442c17ab
SHA1e0661517a3fc51f01b7be98d4f0176a2cef16c3a
SHA2560cea7d89042f937cca82fc4c8af0f8dee02c7f9f15533a0961e433a6689164dc
SHA5120071e3463f11b4f8ad975ac4ffb25b155c367c980b1cb6779764d1070bd1a73ccd3d21340d242b349a305d457159113e602eec872302db76eec2ce585150de76
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d2c3dc9a107a1b69d007840d847a30b9
SHA1cd205fae7ad5fc4929b7747f92dc8c7f0fd8df9f
SHA256ac6709c24de7cb95d27eab6d75f085a4e8bb7e001fe9b99007638da44924305b
SHA51243db19cba045d252d5bbb69377388f9797fa7b62011e4c8aa570dea19e264ef0bdcf60ce9c8148078db78bec7315886745a51d467e066a6c7fecdf5a7d22c723
-
Filesize
105KB
MD5ad6f5c435f7a55876f55abfa0c7be4fb
SHA135aa0f619f7d56da5251dd44be0354be7199ed67
SHA256860d3866cb08a5e331939884d9096de9b4029adad49bd28050fd86fc48180c18
SHA512904dca9282a3db805c9dd7e83e79398e5dc4be205e24e40af93650490d2735b5d368bab1577f54a20e62be829812352bc5d64c9eab26611b0f6ed6fbd79e04e1
-
Filesize
82KB
MD53b34935d396b1da20963df14c02a8f72
SHA139613e6cd0531542bd0de510ceba24f1afb7c5c2
SHA256835ad38e4778f0f498adcf213934e6e3447ac16f765bd11aa82b3b163727940e
SHA5127dbc7d631605764c89ed8f5ca67b2b435556520697e815d90a50a3c64f25a5064751cbc35941d0bc5364eb0db7efea9d9bfa4d69f04dd106a02f5a11dd0f8d2c
-
Filesize
130KB
MD5f0206d9152f43d8a4e7f7dce5a5c8843
SHA1d87d135efc0934b5100c7dd0a42f8532e0b285b4
SHA256b6b7feb61d07d418d8da09f62570d9943deb81a7452f01f9f28e3ad09b56e9f1
SHA512b8e8c320fdf629572b5a3579ccc885e09b798d2c113c8e184df8c972ae143514f893e452fca0e572fdc6e8129bda34dcf141da122771e3e0c67a3f8833465ff7
-
Filesize
40KB
MD50a7f75047e6747970ec86a08466090bb
SHA1696d668a61d607d444d59766545fdef28c955fd1
SHA256407fa4d125574b3c6e312fff8f48b608c0cfa302d1d671122af70a58ae0ea3fb
SHA5125431744c76daa970c8170eed3aefb7a6abfe219540414966fe597717bb0cff543cc85c63ccb30cf4234af9cc685cc03f5ce31507f6d60c4d057bed8ea28c3317
-
Filesize
19KB
MD5f99047dc9df987dd7812356d7322db2e
SHA1c6253ea220a2817068ae97921ea891586c7ccf9c
SHA2561ab655243b81ab30efb955ade228c6d721c298a971e08796bcf0b0790b97758f
SHA512c92207adcf205d093a955b17179c0e63f56e7620d05edd8bc403f7fdd7e842b241ca62f56397c6a8455b727ffccbf79b3957eebd90eb7f350030221f79853978
-
Filesize
14B
MD5e89ac1f7b3083ec3c93283ec05fecf79
SHA1489b25a1a12157a6b3ce503b091feee61522ffc5
SHA25660a8cdd10cb25eef274723b0c24b5d140a5ef2402455f7a03dc44844b867dbde
SHA5121c498b1b8733fe257e1c57e1b89641909af085b35a3becfc9893616205e9d3efce9e14345a3080b0d3b75bfff97bd36ecc819126b511088ab10476fb77ca7187