Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
General
-
Target
file.exe
-
Size
6.4MB
-
MD5
4bf40a595b37b88d2f0967eb52a30d7d
-
SHA1
4ae12b7d109b46943121a6ee5feeff34b454e5f6
-
SHA256
1cf4a4b0f9432f78cd76b30cf8e6070d2d49b70d42ec4e2192da86d09a0a02fa
-
SHA512
01f49988f45eabe58fb2b33cd5e367d83373a87a7afe1bbc032e60d2cc5938b23b43fd39203179bdccd10f54217d20dad1339a372108a07cdf2b4611044ea2ba
-
SSDEEP
98304:v627llWkfUUxdWhVwDGd6wJgl12SS3aayEb22ZA6EbK54UQYvhvWgVPWGAMh1uxT:v68XZ1dMgGYwJSax6u5JdBS7UkxT
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276�6914c4.php
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
45.15.156.60:12050
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 952 schtasks.exe 3860 schtasks.exe 2152 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe 4584 schtasks.exe -
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/816-131-0x0000000003010000-0x0000000003140000-memory.dmp family_fabookie -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/2320-418-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2320-422-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2320-420-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3724-447-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3724-449-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3724-446-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2320-439-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/3944-49-0x0000000002C90000-0x000000000357B000-memory.dmp family_glupteba behavioral2/memory/3944-51-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3944-120-0x0000000002C90000-0x000000000357B000-memory.dmp family_glupteba behavioral2/memory/812-123-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3944-129-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/812-235-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-343-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-480-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-537-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-549-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4868-516-0x0000000000400000-0x0000000000454000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 1060 created 3352 1060 Looksmart.pif 39 PID 1060 created 3352 1060 Looksmart.pif 39 PID 1060 created 3352 1060 Looksmart.pif 39 -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4836 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation C17C.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation nsg5779.tmp Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation C5D0.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 369E.exe -
Executes dropped EXE 24 IoCs
pid Process 392 InstallSetup7.exe 2724 toolspub1.exe 3944 31839b57a4f11171d6abc8bbc4451ee4.exe 816 rty25.exe 2528 BroomSetup.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 4484 csrss.exe 5056 injector.exe 3860 nsg5779.tmp 3288 windefender.exe 1496 windefender.exe 3708 B3A0.exe 1092 C17C.exe 2320 C17C.exe 2420 C17C.exe 3724 C17C.exe 3092 D44A.exe 4952 EAA1.exe 2036 C5D0.exe 1060 Looksmart.pif 3328 Looksmart.pif 464 2EAC.exe 4036 31AB.exe 1180 369E.exe -
Loads dropped DLL 5 IoCs
pid Process 392 InstallSetup7.exe 392 InstallSetup7.exe 392 InstallSetup7.exe 3860 nsg5779.tmp 3860 nsg5779.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1504 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0007000000023227-361.dat upx behavioral2/files/0x0007000000023227-362.dat upx behavioral2/memory/3288-365-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x0007000000023227-364.dat upx behavioral2/memory/1496-501-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1496-550-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\d5473b6a-447f-4deb-9b2e-3cd4d9e26941\\C17C.exe\" --AutoStart" C17C.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\369E.exe" 369E.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive icacls.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1180 369E.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1092 set thread context of 2320 1092 C17C.exe 138 PID 2420 set thread context of 3724 2420 C17C.exe 147 PID 4952 set thread context of 4868 4952 EAA1.exe 152 PID 1060 set thread context of 3328 1060 Looksmart.pif 175 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 380 3724 WerFault.exe 5004 3860 WerFault.exe 129 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B3A0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B3A0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B3A0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsg5779.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsg5779.tmp -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3860 schtasks.exe 952 schtasks.exe 4584 schtasks.exe 2152 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1320 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3936 tasklist.exe 2824 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1168293393-3419776239-306423207-1000\{ABBFE4AE-03D5-48FE-8264-0167FE8D2453} explorer.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4240 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2724 toolspub1.exe 2724 toolspub1.exe 4620 powershell.exe 4620 powershell.exe 3944 31839b57a4f11171d6abc8bbc4451ee4.exe 3944 31839b57a4f11171d6abc8bbc4451ee4.exe 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 4908 powershell.exe 4908 powershell.exe 3352 Explorer.EXE 3352 Explorer.EXE 4908 powershell.exe 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 812 31839b57a4f11171d6abc8bbc4451ee4.exe 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2724 toolspub1.exe 3708 B3A0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 3944 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 3944 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 4908 powershell.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 3696 powershell.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 2180 WerFault.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 2736 powershell.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 3880 powershell.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 1504 icacls.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeSystemEnvironmentPrivilege 4484 csrss.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeSecurityPrivilege 1932 sc.exe Token: SeSecurityPrivilege 1932 sc.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 4868 RegAsm.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeDebugPrivilege 3936 tasklist.exe Token: SeDebugPrivilege 2824 tasklist.exe Token: SeShutdownPrivilege 3352 Explorer.EXE -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1060 Looksmart.pif 3352 Explorer.EXE 3352 Explorer.EXE 1060 Looksmart.pif 1060 Looksmart.pif 3352 Explorer.EXE 3352 Explorer.EXE 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1060 Looksmart.pif 1060 Looksmart.pif 1060 Looksmart.pif 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe 2412 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2528 BroomSetup.exe 1180 369E.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3352 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 392 516 file.exe 87 PID 516 wrote to memory of 392 516 file.exe 87 PID 516 wrote to memory of 392 516 file.exe 87 PID 516 wrote to memory of 2724 516 file.exe 88 PID 516 wrote to memory of 2724 516 file.exe 88 PID 516 wrote to memory of 2724 516 file.exe 88 PID 516 wrote to memory of 3944 516 file.exe 89 PID 516 wrote to memory of 3944 516 file.exe 89 PID 516 wrote to memory of 3944 516 file.exe 89 PID 516 wrote to memory of 816 516 file.exe 91 PID 516 wrote to memory of 816 516 file.exe 91 PID 392 wrote to memory of 2528 392 InstallSetup7.exe 90 PID 392 wrote to memory of 2528 392 InstallSetup7.exe 90 PID 392 wrote to memory of 2528 392 InstallSetup7.exe 90 PID 3944 wrote to memory of 4620 3944 31839b57a4f11171d6abc8bbc4451ee4.exe 94 PID 3944 wrote to memory of 4620 3944 31839b57a4f11171d6abc8bbc4451ee4.exe 94 PID 3944 wrote to memory of 4620 3944 31839b57a4f11171d6abc8bbc4451ee4.exe 94 PID 2528 wrote to memory of 3368 2528 BroomSetup.exe 98 PID 2528 wrote to memory of 3368 2528 BroomSetup.exe 98 PID 2528 wrote to memory of 3368 2528 BroomSetup.exe 98 PID 3368 wrote to memory of 4208 3368 cmd.exe 97 PID 3368 wrote to memory of 4208 3368 cmd.exe 97 PID 3368 wrote to memory of 4208 3368 cmd.exe 97 PID 3368 wrote to memory of 3860 3368 cmd.exe 129 PID 3368 wrote to memory of 3860 3368 cmd.exe 129 PID 3368 wrote to memory of 3860 3368 cmd.exe 129 PID 812 wrote to memory of 4908 812 31839b57a4f11171d6abc8bbc4451ee4.exe 105 PID 812 wrote to memory of 4908 812 31839b57a4f11171d6abc8bbc4451ee4.exe 105 PID 812 wrote to memory of 4908 812 31839b57a4f11171d6abc8bbc4451ee4.exe 105 PID 812 wrote to memory of 3560 812 31839b57a4f11171d6abc8bbc4451ee4.exe 108 PID 812 wrote to memory of 3560 812 31839b57a4f11171d6abc8bbc4451ee4.exe 108 PID 3560 wrote to memory of 4836 3560 cmd.exe 110 PID 3560 wrote to memory of 4836 3560 cmd.exe 110 PID 812 wrote to memory of 3696 812 31839b57a4f11171d6abc8bbc4451ee4.exe 113 PID 812 wrote to memory of 3696 812 31839b57a4f11171d6abc8bbc4451ee4.exe 113 PID 812 wrote to memory of 3696 812 31839b57a4f11171d6abc8bbc4451ee4.exe 113 PID 812 wrote to memory of 2180 812 31839b57a4f11171d6abc8bbc4451ee4.exe 149 PID 812 wrote to memory of 2180 812 31839b57a4f11171d6abc8bbc4451ee4.exe 149 PID 812 wrote to memory of 2180 812 31839b57a4f11171d6abc8bbc4451ee4.exe 149 PID 812 wrote to memory of 4484 812 31839b57a4f11171d6abc8bbc4451ee4.exe 116 PID 812 wrote to memory of 4484 812 31839b57a4f11171d6abc8bbc4451ee4.exe 116 PID 812 wrote to memory of 4484 812 31839b57a4f11171d6abc8bbc4451ee4.exe 116 PID 4484 wrote to memory of 2736 4484 csrss.exe 117 PID 4484 wrote to memory of 2736 4484 csrss.exe 117 PID 4484 wrote to memory of 2736 4484 csrss.exe 117 PID 4484 wrote to memory of 3880 4484 csrss.exe 121 PID 4484 wrote to memory of 3880 4484 csrss.exe 121 PID 4484 wrote to memory of 3880 4484 csrss.exe 121 PID 4484 wrote to memory of 1504 4484 csrss.exe 141 PID 4484 wrote to memory of 1504 4484 csrss.exe 141 PID 4484 wrote to memory of 1504 4484 csrss.exe 141 PID 4484 wrote to memory of 5056 4484 csrss.exe 128 PID 4484 wrote to memory of 5056 4484 csrss.exe 128 PID 392 wrote to memory of 3860 392 InstallSetup7.exe 129 PID 392 wrote to memory of 3860 392 InstallSetup7.exe 129 PID 392 wrote to memory of 3860 392 InstallSetup7.exe 129 PID 3288 wrote to memory of 5040 3288 windefender.exe 132 PID 3288 wrote to memory of 5040 3288 windefender.exe 132 PID 3288 wrote to memory of 5040 3288 windefender.exe 132 PID 5040 wrote to memory of 1932 5040 cmd.exe 135 PID 5040 wrote to memory of 1932 5040 cmd.exe 135 PID 5040 wrote to memory of 1932 5040 cmd.exe 135 PID 3352 wrote to memory of 3708 3352 Explorer.EXE 133 PID 3352 wrote to memory of 3708 3352 Explorer.EXE 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsg5779.tmpC:\Users\Admin\AppData\Local\Temp\nsg5779.tmp4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 24405⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsg5779.tmp" & del "C:\ProgramData\*.dll"" & exit5⤵PID:3776
-
C:\Windows\SysWOW64\timeout.exetimeout /t 56⤵
- Delays execution with timeout.exe
PID:1320
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4836
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2180
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:5056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4584
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"3⤵
- Executes dropped EXE
PID:816
-
-
-
C:\Users\Admin\AppData\Local\Temp\B3A0.exeC:\Users\Admin\AppData\Local\Temp\B3A0.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\C17C.exeC:\Users\Admin\AppData\Local\Temp\C17C.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\D44A.exeC:\Users\Admin\AppData\Local\Temp\D44A.exe2⤵
- Executes dropped EXE
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\EAA1.exeC:\Users\Admin\AppData\Local\Temp\EAA1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\C5D0.exeC:\Users\Admin\AppData\Local\Temp\C5D0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k cmd < Butt & exit3⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd4⤵PID:3828
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵PID:5064
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"5⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 194555⤵PID:4844
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Promotions + Forwarding + Enrollment + Dive + Screensavers + Gender + Orgasm 19455\Looksmart.pif5⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Beds + Hardcore + Cheese + Nancy + Violin + Refused + Wells + Comment + Pts + Money + Rebel + Socks + Ranging + Nj + Travel + Menus + Washing + Crops + Mail + Clone + Reflected + Workstation + Malaysia + Accessory 19455\X5⤵PID:2736
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19455\Looksmart.pif19455\Looksmart.pif 19455\X5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1060
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c schtasks.exe /create /tn "Techrepublic" /tr "wscript 'C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js'" /sc minute /mo 3 /F2⤵PID:3564
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url" & echo URL="C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url" & exit2⤵
- Drops startup file
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19455\Looksmart.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19455\Looksmart.pif2⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\system32\svchost.exesvchost.exe3⤵PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\2EAC.exeC:\Users\Admin\AppData\Local\Temp\2EAC.exe2⤵
- Executes dropped EXE
PID:464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe3⤵PID:8
-
-
-
C:\Users\Admin\AppData\Local\Temp\31AB.exeC:\Users\Admin\AppData\Local\Temp\31AB.exe2⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\31AB.exeC:\Users\Admin\AppData\Local\Temp\31AB.exe3⤵PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\369E.exeC:\Users\Admin\AppData\Local\Temp\369E.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2212
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 43⤵PID:2648
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- DcRat
- Creates scheduled task(s)
PID:3860
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:4208
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)2⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1496
-
C:\Users\Admin\AppData\Local\Temp\C17C.exeC:\Users\Admin\AppData\Local\Temp\C17C.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2320 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d5473b6a-447f-4deb-9b2e-3cd4d9e26941" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\C17C.exe"C:\Users\Admin\AppData\Local\Temp\C17C.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\C17C.exe"C:\Users\Admin\AppData\Local\Temp\C17C.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
PID:3724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3724 -ip 37241⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 5681⤵
- Program crash
PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3860 -ip 38601⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Techrepublic" /tr "wscript 'C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js'" /sc minute /mo 3 /F1⤵
- DcRat
- Creates scheduled task(s)
PID:2152
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2412
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5080
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3676
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
9KB
MD5788b958408e61be7dd1a0801d8d80edb
SHA1d34fc289345d89d8ae816189093256acd000d79a
SHA2564ea5db70ae6c613de2f869f5868074361c84ba491c6097b800ff1716bed613c5
SHA5127040e67f374ce83dc0428541b52ad1bfb6cc4ad7ebd9902f00cec10b2cb1a541fad472b6a5f6751a691507f08853574a2fcf5ba5cc8bdf5d467516207a1f5bdc
-
Filesize
71KB
MD580d0448ec0963fb298d5f037a7d807bd
SHA14946bf302e5b96795ee55653d983b78afbdc52fa
SHA2563520b47b01315fc030a08f7dd15cf965cf48c8b254b750ddc07c63111bfdeca2
SHA512d68ca3eb65f286b6515701e34fa579549d230dec86a8a341a8fb9f954771f17b71c9d7644a1ea7357381d05a6e51788747f4885f5dbb71ca4b65bcf57b466899
-
Filesize
24KB
MD50f82a90775942848252ccb73b86fad85
SHA16b27c62165df4a0f15bc5c31804828e295fe63fb
SHA256fa863a41ea285a5df640df49ff1b44b349412433f0fe6da8e2330dfd288025d9
SHA512f906b67319960dc60eb603414d4ccbec2fb71f490d4b9d91117067acd3fd7795b12406cc952c2dd09101fe9fab853bc541174f23c51e07aadfbfb56b561a1a61
-
Filesize
193KB
MD5ee844e0d328370d77118b6f69b515bdc
SHA11311684f36fd7212870f467d785003a79bd92baa
SHA2560b96e3e8d213cbab14f519ac5f24809af3cba58648a671ef7fb6d2e22d091156
SHA512cf1150f3fafc96850d5cc31e32b93d2490b4f8d49a9546a858cbfaad52fa2938f10454d6bd8300e83216bc47972465f0be15289a1f54304b6d07a717f35add59
-
Filesize
321KB
MD5234f404040702eb0f7fb32e419b3729e
SHA15458963b5af3369e345927ae70f22904bea02489
SHA25663d359c8f99cac6b799cbfbb0c8c17dd0a4b808c1a7cf8b8c4b5bae7166c828f
SHA512f062995d432ffb38c63a87cd0b800d0d9adbb9aba95bd51d9ad7dccfd5bc7f514698b1217e2b8cc0aa7f28e9319583bf4970e3d153e5f8ca4f71d5d1e51e6b4b
-
Filesize
181KB
MD51fc3191a70a8b1fb6dbe0c62eaba5860
SHA1c0826968d5ca1aec202c38b9aac078301ccdae71
SHA2566b567183c9745885e32a87abedd333d41c1b6dc5a9e237e5c2d511e753276fd6
SHA512f57accb1e35a8646df80bba4675cf38a75d38473b0850cef1b6b5cb4054228d34933f29eb9a9a12c6fff0124ed75acdac00f6747f97667fec18b415daf6ae09d
-
Filesize
168KB
MD5946fa0261cd1ad81e9fe7ba686af45f4
SHA192cdfcae23147791a6918f4ff183fd4a9b72c869
SHA25698912a5dd9616ebe85c3882741eaa5f7c879025af06cb2e87283653eacbe0ec8
SHA51249eff56023186d5630383438b7fb3d19d26b02232f2f10d1275e9d9bf8de1ecd4af1db4c4874e91708e724410e5e30760759ac31b21d6eb0850d131cb8b31d2b
-
Filesize
299KB
MD5693b797ca2972240d0787b717f8f2270
SHA1ff93584e7c659d933b20b4990720f3bec448ffff
SHA25603b8adc66636b151ab7c6b855cbcf98d09e56225681c36a8cca4c928c21cf70a
SHA512689fbeef79e212de6524e0cbf37d88ac521a30f9dcaded6c2145eb56438be8b4aeaa9b2ce35ea7952a29d115d231861806ebf7c2225a62688632328e8f4457fd
-
Filesize
16KB
MD57d51f461be553b658c50c25c700ba646
SHA180d136845ccf4412a140a9e1b57b7a7dad38ee18
SHA2562e7138cee7ce2e3244fb0493c75081001f1f8445e4c0f4321c865c8c6746b5ef
SHA512aea16af7832393aee1b1c2c1362fd0bffd433b47e68cac31537a493b591aff1fdb065ab4d6a50e5b49702763e1ce5e1d30a540090e4a1f4e55b7b0363abf2389
-
Filesize
99KB
MD5147f3719aab2ce1db3060faba9d19a77
SHA1f706378f02b0df59b9e04753bec2927ee79e9d3c
SHA25695785d17d66d51d7d45528458f12db06aa018d913bcad155e7a98556155e38f1
SHA512cf2bbb7b81b1b7064ce2698747e66dbe8f921b693bfdcb1d63f9de1eab562f7ed8c1e1df1ecf5a84bbed08e200226b31baa9852af306b8da198113211f7df8d4
-
Filesize
98KB
MD53689d552c23a93b87f5374335dc3b24c
SHA13f6b70060e370a3eb2594b9011ff2c097d8567d4
SHA25638f7701872b322c41bda4a4526533995aeda362d836f113ec7a8ef73433c7708
SHA5121b886f27922817f0647fc6b7f07bc0161e98cf4ab5eba3d16524ba079256625caac84801a2f252579f180a5ef3ba346d793fb778e8a28a0de5fefb053886c1eb
-
Filesize
209KB
MD50cee0fd91e8078fda07c9f889685fd46
SHA174c20df458e1c3db7ee18391be23438176049cc2
SHA2568d352265f3438fe56b17d4455a39c672a35bacd52e816ac3d1c3095e5fbee01a
SHA5128af71a229332cc2ada96058583003e1d5c6b5a2ed4e1f445a51c61c46930c188bd82f23d4f7d477d6c48d865b0c231756c46c618a2be8649c821458c7054e5de
-
Filesize
110KB
MD5bd18a57cfa2813fe8d47249d568574c6
SHA1dbb4d494ea7d3d6a49a6ac88979567e3f2a4732b
SHA2569b731412ddf6307eafccef500e4ffc0ed4064eb827f4c65b41bd0d15102a9032
SHA5123cab3df02b81b44417b6ebaebbd8f857d176c5c1227c995a3b80f048804cdc9726950d9199d326004049fce0024c2501321f962f4f93dbfe30fe803088f231d6
-
Filesize
184KB
MD592747ca1cc5e0873a745121cecbc5336
SHA1728bcaa779a56e55bb7fe67b21cd60ff1c82d61d
SHA25661adbc2ee3702f32749c3088146258245aab73fa00a4b57c9500e5c0812b7a44
SHA5120df14a4134acfa583440ce4b7d029123ae564ccb609371357766829966546f3a80c4a6aecf1e180bfa733306e8a6970c73548d734e0ad4e983c8318c136d4895
-
Filesize
102KB
MD5c9a68724c980d66cf8928d5c65fe66e3
SHA16560cdb69d3adb6a89846c590c695e69a34170f2
SHA2569650f9de615a7532fcc11c0bea921f136bee54999f824f0cfee533dc4a367ba4
SHA512bd4c655c1283a034a6feaf465e1114b8ff431820071ab1d42a2393fb244e74d91c7e3541c1149396d1fea9a73fa6c226e6ced7a530689d6867fe103800448281
-
Filesize
276KB
MD50f096a3528ac2d8e4bd715dc1b217611
SHA134d4e3e58de1c41a45325829f0cf0ab917b9b4fc
SHA256eb0587b286878844fcf81db0d5671a55bb81be08660bdcc427957ba87a09a980
SHA5124e6884f33b5171c981068b95cddccb24fccc0f6834caf69e41e9c6f7e72158360714bce5487a3c30ab715f1f1f4dd3f83e5694ef67750685875b9eae14c06e0d
-
Filesize
69KB
MD562230c216dde837c3b8e395c4f25a547
SHA159b520d1a6f6b2a841851992dee7c515d8ad8da9
SHA25647a9f996c4010b49ad743df65e7bb839691774bf5c7422ecd2c8835f75b032c7
SHA51278aafd19412f3c259d57002c0074881d13a015213bc1f5c499798333e156676052998f5a1732e6da8e5565f2338796752a619227b42ca2b52c58555233c594f5
-
Filesize
111KB
MD5ded32634afe31dae99c404b466cc2379
SHA1249a84adbc6d7158a0bb73931d1cdb6cbdbfc95f
SHA2565a92e3cb783852083d294e87cba69c9693dfc03bd3104da8ccd0fc69a5a61d6d
SHA512eda5bebd65352457c0f1d98fa6559397e3623de005641ccf852da9ed03bea29df1f148d8385b8d4b9245ab2351e5e0bb07e47adec55f6457bfdb4ab5af47e648
-
Filesize
115KB
MD59ba1b9a9af4d072663b3a38f1909af9b
SHA1b7f4dd56a2316e9ef0173e54170e3c5f74e3fc5c
SHA2565d38ed752dcf3f1743e60881be9e0f0538c609d4657ba09a2b7202d8776fb325
SHA512441ec94f79aae8dbc1e887dd14212f35418e51ccf57ceae948b5fa233c89ce3e88d9197773ec9fc545d42e9696c1e3cab45bb6a5d7c7103e006aaea496a9b306
-
Filesize
202KB
MD5247f9ae5d8cb92864e5fa63767afb500
SHA126d41294c79a4d2b6821ae892da4efef73169799
SHA256d10c4371c4f4ffc53c1705c0805199a05eb9d5b5959de9adee02df9b4a02b03d
SHA5124df21e7c082429f9f4cc42a7587394cab411d37d6b758e9f8f9b4200c112bb5f38e717c91c2052b17638ffb7b57291347a30fae4463716681fbbfd3592b9f552
-
Filesize
49KB
MD5fdde5bad2c3ea053a41289836dbda0f1
SHA15ab9e65a2ced3ce4ecec358dcdd2a793b556f84e
SHA2566a6c2f610a5635eddf2bd23871b99cf0c0a4c67e83ff9b86d5c80519f4b9c039
SHA5121392f3a44f27d32e1a9853675152373b7c83a8039b6d53484bd15e4ce46926cabf99b7d04465435dd63f66b40b9003ccfba0d0624e5e860d569441008d9df5ca
-
Filesize
86KB
MD5873a7eb96b6fc25ce88af08d37855516
SHA1192da53eb3f512616cda916e3db66ad15bfbbcb1
SHA256a38d334af574cc5eebd46f1faf857fe31d2ce4cff1304ef6756a48eae115b2ca
SHA5123ce2235795e640a9c5540572c4f166a4480e9ca4cab8339a7be3b6019701309fea16781f59b92c6dde72486af97ba9c94147b37a28e45080769fc9307b240f7d
-
Filesize
96KB
MD53f429d87d21bedcaec429bb5620cb009
SHA1ec5fd72b844a4068d23061ff92395758e0ce1841
SHA256e0f844976b862e124701d93d1a10c810037183b36d97b377994d619c2960237b
SHA51276387b33860c7a0f7d1e0a23b0b009998e16732f07337a5681f716e0550e10fa7743cb3bec8d89cd4467ec8665c292a4de8c3e4db212ef6ba499d0bd9a7d2c7c
-
Filesize
124KB
MD56f16ec1eb0541b1bfebd1fa24fcdb6ba
SHA1c6bf809be636f4f3cd79ba41425eaa38266be261
SHA2565d1df1211b570de076468be7283bcbb0befdb478972bca90b6ccad9c7acb44d2
SHA512c0828519fd0f06acd2a3ce79ad0be9e25712740d1d209f1691cdc124b040db60fa818312ca5cbaeadb11193e7c99cf2f60fa0d5b5013523f4ab93247ca6c8cda
-
Filesize
108KB
MD54e7b304aa0a13a673c06ff9872d6c6de
SHA1919c81954986e214a7e6d7bf259ee5d9fd9673be
SHA256ce0764cea60fc78690ce7334b2ff8530b11a9b697be9f8c4b276afd57879b473
SHA512c514766f44225aa0b13d113f786b3e50d5be8818b9333ee85649e630f186f06b0b08e9ffcd924be8138262fadca65fb42a612d5f5799d6aeba739ed33f1e26b4
-
Filesize
92KB
MD56925e23977d124977f409812b0c32d5c
SHA1b4fc3fb0edee5c07d8c09610bdfd870f94c24595
SHA2568129fa5f2b4ae8a4f38ae8a53beb74a23405826bc237e0ba7f76149dd69ba4f9
SHA512af36e4eadd9e96a7589d3e6af689c67d632506840e08b687641ac8a61d16341f27a7addcd706373cbd58055313272f31f6f649f0227565378cc5de20e0609ff8
-
Filesize
156KB
MD5601bb7238db1a52d9c206aaee78e62ab
SHA129ac315a7c8c33364de7ab4ac3894f45c11ed527
SHA2564e1170f7986e57013af5feebea15167842b0e038343d9042e978c165a6b21178
SHA512b8957ec4991945a22f869d159ca7985c05397861216a683059d153a554a96878dec5f862ae77fdbd32d197a962be66870936deaa9e562a024c64c7ea016850bf
-
Filesize
126KB
MD593b9e686c358f1508b38e4deb0556148
SHA1e50eced18909e5bf4ac812be998d02f5f54e8a55
SHA25642a4325d0ab491d4f2afced14906b3ceb3c9649277c4be67d20f67e5aaffd031
SHA512dd8178ed153eb33fdb9c155bf5b2441513cca0ddc22b8df3f8ecaf13588baba8e2a1ef462122b79b97f4a3a1860ef48197df52dfd82e340ece51c06a90c69805
-
Filesize
220KB
MD5f2b84f645a5bd44970b18146386ae7b1
SHA12463edeede50f1d12176a781b612028ace0a8110
SHA25689b10b3c47bdc4c7882cc0db2014c87451ac02a0eb0614e28913455c80c71859
SHA5124a9176cee05afde4e67e2a280c7e1ef28015b5dd885ff7e69eb8e31b0529a5826d06c04cf9c85e1579e1750551b79f52d571581a4e66a6d7a46fa62aca3bfd4b
-
Filesize
222KB
MD5727ca5c69ebf4f21f17899cc2bb1eb94
SHA13072f71d78e015e469ab804492256b31a018e513
SHA2566cf9a3fc500e51837e61c569cad6b323eb50e294697f2074585ea5ed9c078192
SHA51200269dc01938970c48df8ec5cf94e149ac73847a3c3e903ff8385782fde0d3533190b8a1602e7febd893cb1cfa4d37c5c42be16c0bffedae0807076c6f06a504
-
Filesize
115KB
MD5d9b9a2e99ac422ecad87332976adef7d
SHA147e17d5d944c9c1676b141209948ac3af1378e98
SHA2560dada79b2b56902ef36f743f31fdf2b5ab94d3c8b5829855f88874e00520affe
SHA5120a40af4ca67407a76fc55d18af27339699fadd0c246a2db606fc00137cf197627963e77c31d71d7d968a7bcc31212c2fc50fec18e645f8d3d974589637842b27
-
Filesize
92KB
MD50e2ac541e89bce7c3b7830f756187756
SHA101b326804d1dab3df983b5df396a54d52323794a
SHA256c7c27bfa61e3e28dd3017ff8f5ef65a0c9eb6510ade2539a07884af867751264
SHA512c9f37989d0401fb8df442b311fb69796cca7a6389e8ed19ab51a8f544901795449fa462712885f9645f68dff56da7548f4f1500529b2521862cb1cf4fa18ee7d
-
Filesize
1KB
MD5dd249c54dc46b4ac48c41833517de08e
SHA187ecca4d0704e00b7cba3bcd367d1af6a04567f6
SHA2562af90efaddea4d059f2301e057f4d208475c40709e69c1e6a2e76e5d229257a5
SHA512180e333ea2f375722b30a73c703bf68624e86faef9a804f50f4becdd20c68500461f8c8c453d5a3e6563ecee6379ee988ceffb38a7101f548266af619e1b2e69
-
Filesize
196KB
MD5ec9c9a9e0267ede15678e23d37bf37ad
SHA16a9c9b14d4d607d0a0f2289137a24ab5870ba735
SHA2564659afaaa60af9156393cb56dd680ff9fd1f98c9d8592f30952d56c384956f63
SHA5123ca611c9cea8feed5743548cd519f130df24c6d959ab9bee20c5caf482adb1b167950ce11db8118b86ce0b4759f8ac6ce8324ed39b7206205e89c3a859a1768e
-
Filesize
5.9MB
MD5e3465bcef591b93b16788fb546b71b7f
SHA10d6fcf9407712deb6cc44b022ba70124756e36d8
SHA256e51dd4d244b9c9b15888106770b107644eff238ee7662007733d94f68282c298
SHA5123eb4d5f1a704b2fd76959491385f63974e63ba8e5e9f8cc0084a32bfed49076f2ff569bdb3afaa2b20be4e981eb00bda97e0fe18bd9545ba4cdd073ba7d84e4a
-
Filesize
84KB
MD5a157ae17cc7898a0fe244f1ef4ed9032
SHA199e44af57c7fa1759e6e799b0ca1376b7ed2b99c
SHA25619bc31c04da2447f28025ba528f7759a451295735371cba8f89cb49d4cf4e4a2
SHA512cbe1e60b59add5928d92147f567556df0f5177fb698a351296f35b4621837d635e5048f47ed8280b33fe2c6ddeb16680a9d2e6152aaa58c4cc342885fa5974ae
-
Filesize
36KB
MD5fcd3d56573bd21b9637e94e5805d05d6
SHA162c11063ae86880ec6b4d009373adc13e5bc9d75
SHA256f8d3c4c415813a0cb6126ef27562b9d00bb0a3d7f345e5eba3570131b70a0547
SHA512cbb1f4629d23f2eb1f755bc315222f44a6a6096f6df7128c655b30a8a183b6de54e19d6b93ac18d49482c34f50917655b2d3f44d3682602f30385ce987cdb951
-
Filesize
85KB
MD533ed1eea8091ef20f81d21181cf051c0
SHA15ba7de718c5a8e5d6961cd64529ac7d140228218
SHA2563dc7598dd95fa135da3362fbc56393351be13a834b829ce3a4a1c9d8902034d4
SHA5122d80c604aa69751770b40b3c2b635bbf21a324138b9a6708702dfc8dcd4800cb4cc8c9674e4f75520ac3c218f60afeacd6cc7577c044ba5789129d0a9784b292
-
Filesize
116KB
MD5d041babea71657ba4e0892e70b292456
SHA121456182406aa04724a328c9e42c8ff1e872e844
SHA256e95777a6c6d7b5d8a009c8cfb14be22858ed60c1dfc4bfb23a5c289d73f54dd0
SHA51219fb2a7a18aa7cd79505dc372d57a6a3d34de8d8f4e172536f6db4cf5889fba410414f45a2fe7fc0d5f0e14d042c07e7dbabc175d6f0bd071aece0ab1ea6f12f
-
Filesize
172KB
MD5b8315cfd2eb8934e055797d5bb146077
SHA1e99938c326061397585b0fb9040636bc5c053790
SHA2564667e44f4a30db7ba87046b2a65da65c0c1edeeaa66ebef2a2b38d92fad1ce0f
SHA51259d826f1c810421b8eb8fc803a75db1fe2e300895f744d2805cd2570e902c4b6084955969ee0b973fc2b59d7839af9b4e15ad88455d7bd7be1d3c941f49c4db1
-
Filesize
355KB
MD5957a80a11cfe590a3f5abb7c75b47d87
SHA103a008700cdd519dfeba21e0d7c4cd81c2b399d6
SHA25661757fe6382b42bb845d4f88d25561d3cb9297188fdda1566560c1993cb97325
SHA512fb70def1928924d6dec881edea4499293f87540a1a9f7ea84ecc46bee61473d535ccffdeceda4fae10ffd13b78637d129fafac1c2960c61625a1581ed636bef9
-
Filesize
272KB
MD526d351b9ab12326d71c2510b9ed4be25
SHA1154b303cea739c2d006ed7cffc4638f14699831b
SHA256c8de8f609792c1168f56c3ac9c96338e5773b449bbfc7a89b25f2a845bdee889
SHA5123e7b15d35de4081dfc5b26942a54d9981a3ceb14a35fb582fb6d83104f28cbf847ffcada3148935cd00bb3a2b401eec63a1ce5b8bda32a174d2f3f0c00066916
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
33KB
MD5443561ef0e3ec8b2af1f9480859c1a5c
SHA19014a1c4d184f16d1eb7c01a0a075407bcda1cb0
SHA2565c1f9f9780eff756f3f633d82ed80b68c0dbee22c3b4d651aadd59095d18d38e
SHA512712e7f5678181fd3a8cb522d309a2797f7ea5e30a3b14e3b14c8112aef051a3d52f48c6ea740c1d716f80d8574a6dc0939f967148a9ab4aa43b0700e0854ee22
-
Filesize
29KB
MD5d333779616873dffa5a094b85ebf3736
SHA1e730326af889171f65065fc24237d183f7a3403e
SHA2560b51d3cd0da4fc2eceeb9be0176ea7896cb57ced335cc0553e6d65c56f337fb4
SHA5125ede4c74271dd8a90e5c1bdf7f14250c8df44883f3a5be8d8fb165544a2f45204b119034c14ce2fbdefbfa0826d163f5d8920a0e8d13c17c6aaed40c6f1fe87e
-
Filesize
763KB
MD514f7c4b98e2c837e555d030bfbe740c4
SHA1695e50ac70754d449445343764d8a0c339323a04
SHA256585892aac1dd2104c9dc5badf75efbc0d5f363456c084741af5e251402473de0
SHA512c72065546378ea95362d370b6e5fe6aa75e197c2a156193057f6ffe0f4c010ad3a2d7b6d024b02f7aee91b97dd6740833911107bcdb8a7fae2316e0ef8228cc5
-
Filesize
85KB
MD5ef6ced7c8674793c749ec94b1348f68f
SHA171e369ecd7436ba84d606c595e06366788861781
SHA256f2e0b6c6aba26c73ec21827f35d4411c440b8ccfc1db807df0f9106620861be1
SHA51262ba3b93a9190e401adad9d4b5bf5786cafabd8e5a2142bd87c928d1e541f458f06e6ad753395591c57d015ca0445fb0275ac8f85320a7ba7883e29546ca2c89
-
Filesize
102KB
MD58d086334d668e8893dae7aad3d7b7841
SHA171adf1431a988e334307cff0a3f66cc90e2781e5
SHA256da5aa804363ed8e916b340fe07d8f4272d1fb2598be844daa5e583b7a36ca469
SHA5124f50a17e9440f128306db587c53e7bdf55e050fcc41c848e9e078123264e46217ae99d70abdc21db87b3e347e1065615718485bbfd55fae054aabf07e595fb60
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
210KB
MD5b6e24fbaf738d30b963e11683884a677
SHA1e3a807617f79bdb6e9664ec8b582960206fbdd99
SHA2562f623c7c5d6e47bbb68d80dd0b98630b9e3abf65d140e5ca6749dc5b69b347b6
SHA512668df5aeff20636f5ae7625b88df05abb37aff50287b0c99b91592eced87c69cdde543d207746251a104e0fb6498ef0ff731f49535acb971ffaf755c98df648a
-
Filesize
184KB
MD51685a9bf9c71c192ef0bad6c72bb111a
SHA19282e6a7c2fa8e17f47cfb1717d0c2b500a2d010
SHA25693ed4551852528edc7153df42b33b2bda47dfebd65ada2a57005c37f013abef7
SHA51281f36889f2e9ee7004fdc15788f7aa294647f4ac8715297782d4416f39490f1ca497741ea2a2ef2ec9bdbaa3479e43a8725629c7d6ab9b918580682e0d7f173f
-
Filesize
286KB
MD57023d34f9dbd4144eb81b586268a21a7
SHA1966b76c061352a8eb07bfd1a66446af0a212c918
SHA2561e2bbe1dff7ee04555e7851b63f2e504461b2dda4b2d4948a247dcf4dc9ded75
SHA5129e140767316ae716414b17544113d9bdb883fc6394c62f2b543ec1eefb46f6b83d369c5ab599faf1d28d391df887c1ff47e0850b5a34ab92f041cf1ee5a90578
-
Filesize
230KB
MD5219e7425b61f8b9f627e1a4659901f2d
SHA1651ef7d25f58ddcc3d71d2d43078a9112929cde9
SHA256137aaf991507d90ad86343ea960b798f349504fcbdc3b004ffd9a50366b6c1b9
SHA51270c20cad836330c262939882b31456c17e19c7fb120f64642910f69cdb68a4bf9a97b9fc46e337f3715b73ba7e7415ac7454b38d97124d98c626a6b6a4243694
-
Filesize
1.0MB
MD5bfa84dbde0df8f1cad3e179bd46a6e34
SHA106ae3c38d4b2f8125656268925ebde9eca6a1f9e
SHA2566de412b8674ffba5d78ff9d36abffbe2cf86fd08b2231592fca2fcf41f1f2314
SHA512edd4c839437570003e1cc4a04e6cb7bf8c70c0ebdae741e69782e9bdf47c42441cd8d709170898859b94b3248cccf0e9dfa5e183c110b93ded935ce69a0ff82a
-
Filesize
21KB
MD597bd0e2442d4a0e07006be0ae0a2e99d
SHA1faff74d28e929c95bbd675a016d077be6207d064
SHA256827e2f8ecb648dffa6570c3785c73fe5ae1abdba80ddd9316b05111e4d97b041
SHA512d69d5b082d29bb5965e787fc79479be87cda3d78e75bdddb33ea2c0a6454078092517a8b40b1159271957a28e6e51ef5cd115a6c5621855c42baab0610911b33
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fde1a0c3372534c4ab896954353a0aa1
SHA1dec6475db21a51320ba7cb50e47c142a706a9004
SHA2566d20fcaa4533883850b585216d5dabeec5e14c1bc130e5bf879420a404741de7
SHA512df13c8e6b4747a7ba1fe0a510c03fec6cddd9a236299eb0df04de74df813fe7117a2815b4697fd5ab798aaebe45bb95857a62904947a1e9fcc56e32e2453dabe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d9b9586b771060254fab47c41991c5b2
SHA1cf40cc6165ce36974627565eccf98056576c4aa2
SHA2560ed0b3284bd56b7923c96a1002e75017fe0b27a091d2b7f542f5ae7cd13c058f
SHA512f6cb74a0ea9071d8a336204f024937fae96a168b8b62403a4d40ae2775af589b34e32ffe32f81c8bb51d0cba4f1671f5621c64368932528f9f09785d8761e6d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51e4d66eefd9e4205ffe3b4c39c500a97
SHA1bc7e633bba35635f04eca91fdfafb55151e31124
SHA256f8ba34bb4157cefcabc13bd3bedfc13eb6d7e393a72d5200604836fd24cec264
SHA5122c0192e3ed3bb53c6fb5360012a9af07dd599bded3c058298485f642fc074b62c9bc7d25344acd7530d3b31e0a0da1da52af44730e0fd5fc267a908daf0164d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize11KB
MD579e34fe229c8ddc3f965ab3fbe46bbfb
SHA1e7a551d8d281658fedde0a59534a34810a1d7482
SHA256ac4793cb0797dc819465abd9305a4ef8306df7aa4e14d99ddb033d81080cfd29
SHA5123da551a1947b8f5aafc9414ecef414b28a03c3acd5a183e007f8436b22686c418d8be80716c66c9d416a10b532c8ba7a66490b195e728124ff873db2e1fb955d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b2e3d81e743402f095c197f3388d2ae9
SHA1dc08908e76a92227a1480fdf10e7f0582fe083fd
SHA25635502b54bdeeb970d4a2d3b346e319ae212f29b9efa30a3c0bed72c1d88a6340
SHA512e468c62bf33f68f921496e3f54fe73fb21a9d4a11593c12492883b92677fda14a0c90b9199a0fc571edcb5cd7f6de04947d0ddbbcf93056e6a40659393499b9c
-
Filesize
19KB
MD5e6d884994c478ed751b80739009d9171
SHA1b2f41ab5a514c8099ef66bbb0a614bef52382403
SHA25604bb4a04bac7c9aa88a9938fe836dc5646379b96750866ce1841d61365ccddca
SHA512a54cae739e76adf3b3bacfe2f0174f7990b812c580692e35e488dd7c575f5f5a3c0846e5840cd8bc9df54c76c006de8143e7a3c83075588eeaa54bf2d52c5981
-
Filesize
125KB
MD59c0a3a5194bfdf87cd62c4d2d93f7422
SHA18a29a23943104e23d7479700fa333823d7857ef5
SHA256adda7b28875b21fa0bba1118c2eb267a045cfad3499460a5f65984fbb88e20c4
SHA512935012dbfc7fbd5cd5d694d0f14426666538103efeceacc7bf03cce609865043be41829757c2923599b066c2b5e47dff8f8c5adbff8d5f3b2ed02d3a0912f800
-
Filesize
113KB
MD5e17a0911b10bed11e8813cceaf99a8a8
SHA1548e4ce4dc66b2a597b5a786d587c76a998e56dd
SHA256953d4d6d34095dc435d16aa7ab1fd7a0cff14e75079b23382e5329bbd6aa56aa
SHA51264a442af33d854144a831dbeb1cde79eebd2c9cfc65dd3a43850f8cd2e1ec5867bc10b88bdf66cea8510ad9cc70602ab5ecd986051bb3be293b17e5302ffdef2
-
Filesize
93KB
MD58749fbc252c78aacf0215699077c4fd3
SHA13e40881d93b095dbac99a979a79068b0de6eec6d
SHA256edd53c872c1033ad121b7639caf6fc6c345b7b51bcdc8cb1a8ae195ff415f9bf
SHA5123eb2feb95e696a748d4bb39ed3c72e7c95399e983e17c4eaf6138a06b13517951c5efdbeeda9adb6f71d94b5dbb3e5254224d0afe2353a5fa1b187f4ee847936