Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
Resource
win10v2004-20231215-en
General
-
Target
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
-
Size
6.3MB
-
MD5
c67cb967230036816fd0cbbfd96959c6
-
SHA1
d2fe988a302dce4bc0f34a1003a623f96a06b250
-
SHA256
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76
-
SHA512
2f51046e44bdfa470f676071c69da8c05d50d8f79e748748f25ac13ec53d346f1c3988148000fea3ece38623fd629d1b3dcc943006e80b7bee95da7f1f42920c
-
SSDEEP
196608:GHqO3grg0lAc4G+JCJjsP8BXkf/hmzJzFYngA13jvHKvj4:GHzCOc4G+oB0BmdFY31zq
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.ldhy
-
offline_id
pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detected Djvu ransomware 7 IoCs
Processes:
resource yara_rule behavioral2/memory/4736-426-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4736-424-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4736-427-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4736-441-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/532-452-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/532-453-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/532-455-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-53-0x0000000002DB0000-0x000000000369B000-memory.dmp family_glupteba behavioral2/memory/1124-54-0x00000000029B0000-0x0000000002DAC000-memory.dmp family_glupteba behavioral2/memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4092-191-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral2/memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Detect binaries embedding considerable number of MFA browser extension IDs. 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5012-189-0x0000000000400000-0x0000000000647000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/5012-206-0x00000000008B0000-0x00000000009B0000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/5012-331-0x0000000000400000-0x0000000000647000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs -
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5012-189-0x0000000000400000-0x0000000000647000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/5012-206-0x00000000008B0000-0x00000000009B0000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/5012-331-0x0000000000400000-0x0000000000647000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5012-189-0x0000000000400000-0x0000000000647000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/5012-331-0x0000000000400000-0x0000000000647000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables Discord URL observed in first stage droppers 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables referencing many varying, potentially fake Windows User-Agents 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a00000002324f-464.dat UPX behavioral2/memory/1268-469-0x0000000000400000-0x00000000008DF000-memory.dmp UPX behavioral2/memory/2152-475-0x0000000000400000-0x00000000008DF000-memory.dmp UPX -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 660 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
EC23.exed2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe905.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation EC23.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 905.exe -
Drops startup file 1 IoCs
Processes:
EC23.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe EC23.exe -
Executes dropped EXE 21 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exeInstallSetup9.exetoolspub1.exeBroomSetup.exensz853F.tmpd21cbe21e38b385a41a68c5e6dd32f4c.execsrss.exeWerFault.exe905.exe905.exe905.exeinjector.exe905.exewindefender.exewindefender.exe8DB6.exeeuuffsaEC23.exeF145.exeF9D1.exeqemu-ga.exepid Process 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3372 InstallSetup9.exe 3476 toolspub1.exe 4504 BroomSetup.exe 5012 nsz853F.tmp 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4824 csrss.exe 4524 WerFault.exe 1544 905.exe 4736 905.exe 3812 905.exe 3252 injector.exe 532 905.exe 1268 windefender.exe 2152 windefender.exe 1864 8DB6.exe 4336 euuffsa 2568 EC23.exe 820 F145.exe 3244 F9D1.exe 1820 qemu-ga.exe -
Loads dropped DLL 5 IoCs
Processes:
InstallSetup9.exensz853F.tmppid Process 3372 InstallSetup9.exe 3372 InstallSetup9.exe 5012 nsz853F.tmp 5012 nsz853F.tmp 3372 InstallSetup9.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/files/0x000a00000002324f-464.dat upx behavioral2/memory/1268-469-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2152-475-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exe905.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\3f05755e-c4a2-4c90-9d8a-58c689a7a9c3\\905.exe\" --AutoStart" 905.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 80 api.2ip.ua 82 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exewindefender.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive windefender.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
905.exe905.exeF9D1.exedescription pid Process procid_target PID 1544 set thread context of 4736 1544 905.exe 130 PID 3812 set thread context of 532 3812 905.exe 136 PID 3244 set thread context of 4280 3244 F9D1.exe 153 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 4 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.execsrss.exedescription ioc Process File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 1196 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 5076 5012 WerFault.exe 88 4692 532 WerFault.exe 136 4836 1864 WerFault.exe 146 4452 4280 WerFault.exe 153 648 2568 WerFault.exe 150 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeeuuffsatoolspub1.exedescription ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WerFault.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI euuffsa Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WerFault.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WerFault.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI euuffsa Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI euuffsa Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
nsz853F.tmpdescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsz853F.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsz853F.tmp -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3748 schtasks.exe 3392 schtasks.exe 4896 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exewindefender.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub1.exensz853F.tmppowershell.exed21cbe21e38b385a41a68c5e6dd32f4c.exepid Process 3476 toolspub1.exe 3476 toolspub1.exe 5012 nsz853F.tmp 5012 nsz853F.tmp 4136 powershell.exe 4136 powershell.exe 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 3464 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
toolspub1.exeWerFault.exeeuuffsapid Process 3476 toolspub1.exe 4524 WerFault.exe 4336 euuffsa -
Suspicious use of AdjustPrivilegeToken 55 IoCs
Processes:
powershell.exed21cbe21e38b385a41a68c5e6dd32f4c.exepowershell.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.execsrss.exesc.exeEC23.exedescription pid Process Token: SeDebugPrivilege 4136 powershell.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeDebugPrivilege 3672 powershell.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 1092 powershell.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 4292 powershell.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 1268 windefender.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 2432 powershell.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 4776 powershell.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeSystemEnvironmentPrivilege 4824 csrss.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeSecurityPrivilege 1196 sc.exe Token: SeSecurityPrivilege 1196 sc.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeDebugPrivilege 2568 EC23.exe Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 Token: SeShutdownPrivilege 3464 Token: SeCreatePagefilePrivilege 3464 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BroomSetup.exepid Process 4504 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exeInstallSetup9.exeBroomSetup.exeWerFault.exed21cbe21e38b385a41a68c5e6dd32f4c.exed21cbe21e38b385a41a68c5e6dd32f4c.execmd.execsrss.exe905.exedescription pid Process procid_target PID 2592 wrote to memory of 1124 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 84 PID 2592 wrote to memory of 1124 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 84 PID 2592 wrote to memory of 1124 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 84 PID 2592 wrote to memory of 3372 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 85 PID 2592 wrote to memory of 3372 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 85 PID 2592 wrote to memory of 3372 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 85 PID 2592 wrote to memory of 3476 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 86 PID 2592 wrote to memory of 3476 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 86 PID 2592 wrote to memory of 3476 2592 d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe 86 PID 3372 wrote to memory of 4504 3372 InstallSetup9.exe 87 PID 3372 wrote to memory of 4504 3372 InstallSetup9.exe 87 PID 3372 wrote to memory of 4504 3372 InstallSetup9.exe 87 PID 3372 wrote to memory of 5012 3372 InstallSetup9.exe 88 PID 3372 wrote to memory of 5012 3372 InstallSetup9.exe 88 PID 3372 wrote to memory of 5012 3372 InstallSetup9.exe 88 PID 4504 wrote to memory of 2424 4504 BroomSetup.exe 89 PID 4504 wrote to memory of 2424 4504 BroomSetup.exe 89 PID 4504 wrote to memory of 2424 4504 BroomSetup.exe 89 PID 2424 wrote to memory of 1040 2424 WerFault.exe 92 PID 2424 wrote to memory of 1040 2424 WerFault.exe 92 PID 2424 wrote to memory of 1040 2424 WerFault.exe 92 PID 2424 wrote to memory of 3748 2424 WerFault.exe 91 PID 2424 wrote to memory of 3748 2424 WerFault.exe 91 PID 2424 wrote to memory of 3748 2424 WerFault.exe 91 PID 1124 wrote to memory of 4136 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe 94 PID 1124 wrote to memory of 4136 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe 94 PID 1124 wrote to memory of 4136 1124 d21cbe21e38b385a41a68c5e6dd32f4c.exe 94 PID 4092 wrote to memory of 3672 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 105 PID 4092 wrote to memory of 3672 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 105 PID 4092 wrote to memory of 3672 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 105 PID 4092 wrote to memory of 3984 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 106 PID 4092 wrote to memory of 3984 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 106 PID 3984 wrote to memory of 660 3984 cmd.exe 108 PID 3984 wrote to memory of 660 3984 cmd.exe 108 PID 4092 wrote to memory of 1092 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 110 PID 4092 wrote to memory of 1092 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 110 PID 4092 wrote to memory of 1092 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 110 PID 4092 wrote to memory of 4292 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 111 PID 4092 wrote to memory of 4292 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 111 PID 4092 wrote to memory of 4292 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 111 PID 4092 wrote to memory of 4824 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 4092 wrote to memory of 4824 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 4092 wrote to memory of 4824 4092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 4824 wrote to memory of 1268 4824 csrss.exe 141 PID 4824 wrote to memory of 1268 4824 csrss.exe 141 PID 4824 wrote to memory of 1268 4824 csrss.exe 141 PID 3464 wrote to memory of 4524 3464 147 PID 3464 wrote to memory of 4524 3464 147 PID 3464 wrote to memory of 4524 3464 147 PID 4824 wrote to memory of 2432 4824 csrss.exe 124 PID 4824 wrote to memory of 2432 4824 csrss.exe 124 PID 4824 wrote to memory of 2432 4824 csrss.exe 124 PID 4824 wrote to memory of 4776 4824 csrss.exe 127 PID 4824 wrote to memory of 4776 4824 csrss.exe 127 PID 4824 wrote to memory of 4776 4824 csrss.exe 127 PID 3464 wrote to memory of 1544 3464 129 PID 3464 wrote to memory of 1544 3464 129 PID 3464 wrote to memory of 1544 3464 129 PID 1544 wrote to memory of 4736 1544 905.exe 130 PID 1544 wrote to memory of 4736 1544 905.exe 130 PID 1544 wrote to memory of 4736 1544 905.exe 130 PID 1544 wrote to memory of 4736 1544 905.exe 130 PID 1544 wrote to memory of 4736 1544 905.exe 130 PID 1544 wrote to memory of 4736 1544 905.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe"C:\Users\Admin\AppData\Local\Temp\d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:660
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1268
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3392
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3252
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4896
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:3548
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵PID:2424
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:3748
-
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:1040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsz853F.tmpC:\Users\Admin\AppData\Local\Temp\nsz853F.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 23564⤵
- Program crash
PID:5076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5012 -ip 50121⤵
- Suspicious use of WriteProcessMemory
PID:2424
-
C:\Users\Admin\AppData\Local\Temp\F405.exeC:\Users\Admin\AppData\Local\Temp\F405.exe1⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\905.exeC:\Users\Admin\AppData\Local\Temp\905.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\905.exeC:\Users\Admin\AppData\Local\Temp\905.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4736 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\3f05755e-c4a2-4c90-9d8a-58c689a7a9c3" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\905.exe"C:\Users\Admin\AppData\Local\Temp\905.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\905.exe"C:\Users\Admin\AppData\Local\Temp\905.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 5685⤵
- Program crash
PID:4692
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 532 -ip 5321⤵PID:4580
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2152
-
C:\Users\Admin\AppData\Local\Temp\8DB6.exeC:\Users\Admin\AppData\Local\Temp\8DB6.exe1⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 11722⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1864 -ip 18641⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4524
-
C:\Users\Admin\AppData\Roaming\euuffsaC:\Users\Admin\AppData\Roaming\euuffsa1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4336
-
C:\Users\Admin\AppData\Local\Temp\EC23.exeC:\Users\Admin\AppData\Local\Temp\EC23.exe1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"2⤵
- Executes dropped EXE
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 23162⤵
- Program crash
PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\F145.exeC:\Users\Admin\AppData\Local\Temp\F145.exe1⤵
- Executes dropped EXE
PID:820
-
C:\Users\Admin\AppData\Local\Temp\F9D1.exeC:\Users\Admin\AppData\Local\Temp\F9D1.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3244 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6163⤵
- Program crash
PID:4452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4280 -ip 42801⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2568 -ip 25681⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.1MB
MD58a78157e59dbe3153bc4a49b22c75013
SHA10ac3ea2a8001648f7e07bf499ae3e3885da6c0ae
SHA256a8f68e83eece64f3f0bd55e6e2a967fca72e66648d2c6a59dbbb76ed08f7e7db
SHA512a64ed84fd1430ca7b8639f2d83a8ce724ecbf3b047ba5d4562a8fa9e0be0756942882def4f4a4109c2a30c81f91c91511eb739361222a7257636169a635b616a
-
Filesize
797KB
MD5716e02298e8fb35cd001abfec9bab229
SHA11e2298f1f2fcde255a700f80c61f5229d4f73593
SHA256d63f2b24501bb15e0b8a5a6bc0c602461bafbd6a7402f71ed42f8c1123c3cd13
SHA5128f4aef250ee8dbf14902eddf9a9eaf26e10a50ca150407aec19dceaa89d1e6396670fa97948f9f5118132b195d793fca357654537578d23aae44af581e10db0d
-
Filesize
929KB
MD544b2e76f7b568f3726392e8093283081
SHA1a8728ee5efb344e44863ba74608a901e2ac0fa1f
SHA256bf0771194b1537da6cd845d93f0541e23a96781d3e940bdbfc14155c0e4c7cec
SHA512000e93e486477c685e8581c274279cf5234b06160680f36f1393262adcd27a9e3d56e52df1cc47ba61d74dd0a3b0695a86356d746f695c0336bcc007783610f7
-
Filesize
733KB
MD587c9f29baaf99fbb589a35656083ee11
SHA18cf90e5ddb110ea99094d38dcf7128afe22f59a5
SHA2567de9c2b4d366ffa1b0d90ceea2c25e6639a9cba23972b7f82d44a8acb1fb6e5a
SHA512ec35e2f770f762bb4fa1a697accd1b82e17d90b5d5245ff9cac54b3b8225e89d3cdd76fd1ebf630d02835513a26bd3e9f175baf1c975e6acd9112db5170662b5
-
Filesize
495KB
MD59c5f0db9c84e20b74c6aee34ae16ea43
SHA1def67dd79ad4dd06682fba50a6a9ecca351648ca
SHA25631ec6b8a2a16827b787a00dadb19476bff55183e45cb61dffe3e6b72a9344635
SHA512d0606b57e5ee689ba528af57428355c9980b5fb5b48f6d6815063735094e79ac2427e080a3715fc39e37d39271be2da576ea3d99fa998769f59f6c39cd7327b5
-
Filesize
4.7MB
MD55e94f0f6265f9e8b2f706f1d46bbd39e
SHA1d0189cba430f5eea07efe1ab4f89adf5ae2453db
SHA25650a46b3120da828502ef0caba15defbad004a3adb88e6eacf1f9604572e2d503
SHA512473dfa66a36feed9b29a43245074141478327ce22ba7cce512599379dcb783b4d665e2d65c5e9750b988c7ed8f6c3349a7a12d4b8b57c89840eee6ca6e1a30cd
-
Filesize
649KB
MD535ffefa212414c2538df410e5ad3afa7
SHA1e7721fbb85e400c74c7f4de95f1c27b6318caabd
SHA2569217999518147c602f16ed7d80c9b95dec621f442192ce49192736a27e73847f
SHA5127bf9ffe99588a1e6e01a6c84fee7bd998b337653c908e33d3c10f1aa9abc7af925ca9d86a884099824133947614aa070181c973b220163dd99dde87765152a25
-
Filesize
824KB
MD582d7425c9f8297a3ca6dd38b2ed71920
SHA1911bc54e20cd1f31cfa436a321862dd33df606eb
SHA2562c842e8a9e3ab59cd6d22f252ac5ec9647585fd522c4df7d09422c80a9990777
SHA512769f0c1bca2f0a3c5ff6d9e9327f32211d66364d900b3345017abc76065988ee1ffcbfc1fc8e691c21e4af7ad11de809d3870eb6d1676181f09f3510b4eea9c0
-
Filesize
170KB
MD5bbe17beb5322cc197cece72e5988f2fd
SHA145741111a6aba5044cc5a113f5a41a607f54b1d0
SHA2561551739422761204577406d511108a62afb653aaed9353b405fee25ad14c19eb
SHA512d525b4e28f1aadad80e9fa825fce51b7964cbdbbd3f3abab2d54668021a5a2df7ae398ab0e2690279e04bfd9fc86a8b9d9ccbf5bb8294f1b1cf7e0ddb4f084ab
-
Filesize
4.4MB
MD5276e222938520cbb4c543f45e65e463f
SHA196a78a7dbee03dce0748ea8fb1a295232e7d027b
SHA256bd546aa016fc5a48c8c613816af6b0fdf4403ad2dcae86ab8a891d200448365f
SHA512137dddf225fc1514652d90b2eacda201329b350e7ef088ecb40ebd083ac657dcd9846beb64347f455c3072e725dfe61f738bb58969854802e515fdb84199c046
-
Filesize
2.0MB
MD5c7dfcf13b0dc4dd685114a6a2f0233ac
SHA1ade01a01ce38e49de0136340333aa26f92a6f43f
SHA2563786f3f45f703b7faa2b971ac1d9cddfa14115b1926a874a294809bf747355dc
SHA512ff5769daa32508b261d807eaa2a70ff5e942f02b1903523d6cc280ce8c07c0bc58dcc2e555e5d24ddf240570da5f821ba01540904350804dea6eafa7131f9d29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
199KB
MD5da0f27d0be65c3a609833eba0d5e1994
SHA12aca9500ab37844a9d68aff90b6230d1023e0d51
SHA256405f810724804026572d50b3feccae023b077f1b17d8d33cb4aaab2a65260bac
SHA512efb0a3be93b6c69182fa3deb0a3e699ccd2fece482481754a7ba710b238dfe9ab03cb5a814e001d74a03cb5aa236085d9ebb331b4a058bce280fc9fff6a28e6c
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
620KB
MD596ceebe6e8910ff53893045bd67dbbf6
SHA12b689676edbfc399f34056a42202723aefd363b1
SHA256f8b4029224cbc6de20ec168fa0fa63b5bc563a4285a829cfb0c2b69a1c3cb840
SHA512fadbe70800278991088499b87aaa5212adbfe83027369342e96a24af61eb54d13dae7e26ea4e4b12eac5ab8d5d30bb214f6da7b389a0f29930550fb644352710
-
Filesize
4.1MB
MD50f396cc0dba8c2ef01e51ffa06bd2f93
SHA105bab98b65b1211b1207936f9e23626c7fd4eeee
SHA25617dfd514df0d171e7d96202740cdb98cc71444c580f5b317712b58bc8e74be1a
SHA5124685fb04d756177b28c9b8dd7cac28503d68d72d205869d25d2d8cacc50a2b9c973d2194942f5de1bd4e43e2d543904b0667c57dc9000eb2c1c43bbd47217128
-
Filesize
3.8MB
MD5d8d19613fc043e59754238eec3a1f6c3
SHA1727e6d46f99d20cb12662b4346c9dfe0f70b23b3
SHA256738bce797b1777dbb6116be10b29373bdb339855b4db9b5bb30947d38b54f811
SHA512c0ecb0eb03429923d879b7f2e5328c223e323598a8ad0ffb79958903f2ec6c9a7f42da5b9bb5b03d994323c4a460a856f8513d705120b4e07bcefdaeadc18992
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
246KB
MD53244c06695ef5135a8af748ee200eef9
SHA167a29f86fe53905448a7c72328464c8af3a85b61
SHA25654e08a1eca7dec78755da1bc1075471945e0cc5a2baa0050c9a6341d242024c3
SHA512af2d25e50533ea1b7ab25d6e7e08dad3f2aad144bef69ffbd26f7ec184846dc2a69c8c158cba2aaf32d96e623e3dc91109ee4174e1ee3cc2257aa29160c64d73
-
Filesize
171KB
MD54d1a4b3096f4a39f3a91df2f6efd43c6
SHA1af7b52300363fa6f5ce8b5f99f753a9b1e0af94f
SHA256ca5b5e71addd8a56460eefad5cd368a5f6aca71b7a2d6dcfb312f45d1ae6e20b
SHA512d7cc6cf36fa0da5c22b531f7b3f58cbbcc206aaa47d40ebc0256fa5ede758fa7f636f9b70fa8077664067c8cbd3b38633ef2ca1e2e8e349b3b05c3cec1f8afd7
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD589046794f52bb3bfa7c051c98f957831
SHA13b85fe69446c93433566c5b6a7611110eba39b29
SHA25635c258c617f486a22257c18218bc42d3ec527420ff323835acdc02f7dd2de983
SHA512c7934173a2dd935bfe79ef9fde23379dcb530aa46514e9d205fc4b51dc71c20136c0d9f3b37285cfcf906faef1a14769694571c446cb806a392a82d7757f9b68
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD582b5e0d0e926bc2c4185a8797cbf4f7d
SHA155d93406803bdbc1e3869dbe363f768e1076e0ae
SHA2564b6846f53325be2306352959f3227b6697818ad15f42c711f27d79eeca1ffbf7
SHA512f1465bc5ff83a6b4caa64388a2ffb2c36acc755f5b987eb61daf4aaab313952a1fcbe0f99722e2cbcd8821daff84048249a0bf168f4276d307491cfa8e3052b7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54f1d9beff3fb471963df5c4c8cfd88f0
SHA15b4214f3451cd42ac2bafa14d5dba1b5bcc8f1e5
SHA2568ea844bfc9a349703373f1eb7bfb4be4f48c178a033a474b1d0746ee2945ef39
SHA512c1c46545cc63edb5dbae6be9cb599bb952fd6b4281a4226d391eccf3c9b7ff5f600e1af262091fcc52af6a5bfb41dbd76f424e0fa994c3bbecb85a9124cb488d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cf37e5c29774bea3f568b350a2fdca69
SHA19394a34f197d7dd05a4b1cacab87b4722b94f555
SHA256e5ab0a21a9aebf1943a0e26e051f1cd234a916d85f985d783d325b9e475ef7ed
SHA5124668afd6574100f5977fdb56516aa2c97d4d4afeb30710a381c09a112c00b17f0d1ed91d74f502d62b09865b0e4aab7b4f080bcb9a76216009ef4dddc2636f70
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bc9b122542aebccf84afef18b786dffa
SHA1d61c2f5defa95379b5d6fdaafb4a4e5eb52d2b9f
SHA25694e6194efc6e74f96de79fc61d70c328877420b992af4ed8344811afa466f0d1
SHA5129fd23d42f45268f4d1ec1bfbe9f028a0784d448ecd7c9703fa503d517a7c0766c92f2b7a6f66c73b18fa67a5348319d477b7b647498e91b13de5f7481c809d95
-
Filesize
3.2MB
MD5471ce98cd3576984522e66a66364cd95
SHA1bd254c8c0fc000ff59d9005340f379fa01de7549
SHA256728c2599a73678275e5053fc10cad742e8b82dfe5f40596e5d08ce824883a266
SHA512a7a4031f7ee52cc20828c039f6b74b01e959326eaa8c59d020465f3190b62a9d61f7cdf3c837ae99e2a2c6a5676e6beb246fe098f4f0f35bae7d4859a77d0ff3
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec