Analysis
-
max time kernel
300s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-02-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe
Resource
win10-20231220-en
General
-
Target
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe
-
Size
5.5MB
-
MD5
c4580e8db0c3dbc88891842fd8a31158
-
SHA1
744f03fcf10db1459d3f40beaea2bfe1b000582b
-
SHA256
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922
-
SHA512
cefd412e0d5aba56d6603fdc46a056474ce387dbb220b32a9317dca0822bef9320515afacc2ab2086db46f9e01b3456c87a0dc83bd99c246550d87efd3606945
-
SSDEEP
98304:Fs9EI6sZJrf04Hr3VvPkrcRizJ6krK4JLQaEHlXU+vG9G1jMaZQRrkp:W+I6sU4HjZkwkVJo1+G1jMaZQpk
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.ldhy
-
offline_id
pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw
Extracted
vidar
7.7
655507914130aa0fe72362726c206a7c
https://t.me/newagev
https://steamcommunity.com/profiles/76561199631487327
-
profile_id_v2
655507914130aa0fe72362726c206a7c
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\USER\S-1-5-21-3934047325-4097474570-3437169968-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe 4632 schtasks.exe 3036 schtasks.exe 524 schtasks.exe 1784 schtasks.exe 4560 schtasks.exe -
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/2212-2022-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral2/memory/2212-2027-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral2/memory/2212-2059-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/files/0x000700000001abbb-2077.dat family_zgrat_v1 behavioral2/files/0x000700000001abbb-2076.dat family_zgrat_v1 -
Detected Djvu ransomware 13 IoCs
resource yara_rule behavioral2/memory/2932-1973-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2932-1975-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2932-1970-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2932-1988-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-1993-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-1995-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2005-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2004-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2011-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2012-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2009-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2029-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3604-2048-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/4996-32-0x0000000002DC0000-0x00000000036AB000-memory.dmp family_glupteba behavioral2/memory/4996-36-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4996-396-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4996-401-0x0000000002DC0000-0x00000000036AB000-memory.dmp family_glupteba behavioral2/memory/4388-403-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4388-1190-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1160-1945-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1160-1996-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1160-2051-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 756 netsh.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000700000001abbb-2077.dat net_reactor behavioral2/files/0x000700000001abbb-2076.dat net_reactor -
Executes dropped EXE 30 IoCs
pid Process 2180 InstallSetup_nine.exe 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1672 rty25.exe 684 toolspub1.exe 3608 Conhost.exe 3804 u1ok.1.exe 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1160 csrss.exe 2108 injector.exe 4064 D4A5.exe 3040 windefender.exe 4316 windefender.exe 1968 EC07.exe 2932 EC07.exe 4104 EC07.exe 3604 EC07.exe 4728 build2.exe 2212 build2.exe 1032 build3.exe 352 274C.exe 4484 34CA.exe 376 build3.exe 4816 mstsca.exe 2512 mstsca.exe 4200 mstsca.exe 4092 mstsca.exe 4844 mstsca.exe 1540 mstsca.exe 736 mstsca.exe 3420 mstsca.exe -
Loads dropped DLL 3 IoCs
pid Process 3608 Conhost.exe 3608 Conhost.exe 4484 34CA.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1784 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000800000001ab8f-1956.dat upx behavioral2/files/0x000800000001ab8f-1958.dat upx behavioral2/memory/3040-1960-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000800000001ab8f-1955.dat upx behavioral2/memory/4316-2042-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3934047325-4097474570-3437169968-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3934047325-4097474570-3437169968-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3934047325-4097474570-3437169968-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\e5344f4b-2a5f-4200-80b1-4847756ecea0\\EC07.exe\" --AutoStart" EC07.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 1968 set thread context of 2932 1968 EC07.exe 124 PID 4104 set thread context of 3604 4104 EC07.exe 127 PID 4728 set thread context of 2212 4728 build2.exe 129 PID 1032 set thread context of 376 1032 build3.exe 137 PID 4484 set thread context of 3628 4484 34CA.exe 140 PID 4816 set thread context of 2512 4816 mstsca.exe 145 PID 4200 set thread context of 4092 4200 mstsca.exe 149 PID 4844 set thread context of 1540 4844 mstsca.exe 151 PID 736 set thread context of 3420 736 mstsca.exe 154 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4424 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4872 2212 WerFault.exe 129 868 352 WerFault.exe 133 2220 352 WerFault.exe 133 4196 3628 WerFault.exe 140 5040 3628 WerFault.exe 140 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D4A5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D4A5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D4A5.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Conhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Conhost.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4560 schtasks.exe 4632 schtasks.exe 524 schtasks.exe 1784 schtasks.exe 3036 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 684 toolspub1.exe 684 toolspub1.exe 4632 schtasks.exe 4632 schtasks.exe 4632 schtasks.exe 3608 Conhost.exe 3608 Conhost.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 4992 powershell.exe 3436 Process not Found 3436 Process not Found 4992 powershell.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 4992 powershell.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 684 toolspub1.exe 4064 D4A5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4632 schtasks.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 3624 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 1680 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 2564 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 4412 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 2408 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeSystemEnvironmentPrivilege 1160 csrss.exe Token: SeSecurityPrivilege 4424 sc.exe Token: SeSecurityPrivilege 4424 sc.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3804 u1ok.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 312 wrote to memory of 2180 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 74 PID 312 wrote to memory of 2180 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 74 PID 312 wrote to memory of 2180 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 74 PID 312 wrote to memory of 4996 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 75 PID 312 wrote to memory of 4996 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 75 PID 312 wrote to memory of 4996 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 75 PID 312 wrote to memory of 1672 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 76 PID 312 wrote to memory of 1672 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 76 PID 312 wrote to memory of 684 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 77 PID 312 wrote to memory of 684 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 77 PID 312 wrote to memory of 684 312 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe 77 PID 4996 wrote to memory of 4632 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe 108 PID 4996 wrote to memory of 4632 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe 108 PID 4996 wrote to memory of 4632 4996 d21cbe21e38b385a41a68c5e6dd32f4c.exe 108 PID 2180 wrote to memory of 3608 2180 InstallSetup_nine.exe 102 PID 2180 wrote to memory of 3608 2180 InstallSetup_nine.exe 102 PID 2180 wrote to memory of 3608 2180 InstallSetup_nine.exe 102 PID 2180 wrote to memory of 3804 2180 InstallSetup_nine.exe 83 PID 2180 wrote to memory of 3804 2180 InstallSetup_nine.exe 83 PID 2180 wrote to memory of 3804 2180 InstallSetup_nine.exe 83 PID 3804 wrote to memory of 412 3804 u1ok.1.exe 87 PID 3804 wrote to memory of 412 3804 u1ok.1.exe 87 PID 3804 wrote to memory of 412 3804 u1ok.1.exe 87 PID 412 wrote to memory of 3708 412 cmd.exe 109 PID 412 wrote to memory of 3708 412 cmd.exe 109 PID 412 wrote to memory of 3708 412 cmd.exe 109 PID 412 wrote to memory of 4560 412 cmd.exe 85 PID 412 wrote to memory of 4560 412 cmd.exe 85 PID 412 wrote to memory of 4560 412 cmd.exe 85 PID 4388 wrote to memory of 4992 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 92 PID 4388 wrote to memory of 4992 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 92 PID 4388 wrote to memory of 4992 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 92 PID 4388 wrote to memory of 1808 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 95 PID 4388 wrote to memory of 1808 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 95 PID 1808 wrote to memory of 756 1808 cmd.exe 93 PID 1808 wrote to memory of 756 1808 cmd.exe 93 PID 4388 wrote to memory of 3624 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 97 PID 4388 wrote to memory of 3624 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 97 PID 4388 wrote to memory of 3624 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 97 PID 4388 wrote to memory of 1680 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 99 PID 4388 wrote to memory of 1680 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 99 PID 4388 wrote to memory of 1680 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 99 PID 4388 wrote to memory of 1160 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 100 PID 4388 wrote to memory of 1160 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 100 PID 4388 wrote to memory of 1160 4388 d21cbe21e38b385a41a68c5e6dd32f4c.exe 100 PID 1160 wrote to memory of 2564 1160 csrss.exe 101 PID 1160 wrote to memory of 2564 1160 csrss.exe 101 PID 1160 wrote to memory of 2564 1160 csrss.exe 101 PID 1160 wrote to memory of 4412 1160 csrss.exe 105 PID 1160 wrote to memory of 4412 1160 csrss.exe 105 PID 1160 wrote to memory of 4412 1160 csrss.exe 105 PID 1160 wrote to memory of 2408 1160 csrss.exe 110 PID 1160 wrote to memory of 2408 1160 csrss.exe 110 PID 1160 wrote to memory of 2408 1160 csrss.exe 110 PID 1160 wrote to memory of 2108 1160 csrss.exe 113 PID 1160 wrote to memory of 2108 1160 csrss.exe 113 PID 3436 wrote to memory of 4064 3436 Process not Found 114 PID 3436 wrote to memory of 4064 3436 Process not Found 114 PID 3436 wrote to memory of 4064 3436 Process not Found 114 PID 3040 wrote to memory of 5008 3040 windefender.exe 120 PID 3040 wrote to memory of 5008 3040 windefender.exe 120 PID 3040 wrote to memory of 5008 3040 windefender.exe 120 PID 5008 wrote to memory of 4424 5008 cmd.exe 119 PID 5008 wrote to memory of 4424 5008 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe"C:\Users\Admin\AppData\Local\Temp\1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\u1ok.0.exe"C:\Users\Admin\AppData\Local\Temp\u1ok.0.exe"3⤵PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\u1ok.1.exe"C:\Users\Admin\AppData\Local\Temp\u1ok.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- DcRat
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:1808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:524
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- DcRat
- Creates scheduled task(s)
PID:4560
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:3708
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:756
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}1⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\D4A5.exeC:\Users\Admin\AppData\Local\Temp\D4A5.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4064
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4316
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Suspicious use of WriteProcessMemory
PID:5008
-
C:\Users\Admin\AppData\Local\Temp\EC07.exeC:\Users\Admin\AppData\Local\Temp\EC07.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\EC07.exeC:\Users\Admin\AppData\Local\Temp\EC07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\EC07.exe"C:\Users\Admin\AppData\Local\Temp\EC07.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\EC07.exe"C:\Users\Admin\AppData\Local\Temp\EC07.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build2.exe"C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4728 -
C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build2.exe"C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build2.exe"6⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 14007⤵
- Program crash
PID:4872
-
-
-
-
C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build3.exe"C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1032 -
C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build3.exe"C:\Users\Admin\AppData\Local\bb16e596-a849-4491-a8a7-6b45f003ffc5\build3.exe"6⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
PID:1784
-
-
-
-
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e5344f4b-2a5f-4200-80b1-4847756ecea0" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\274C.exeC:\Users\Admin\AppData\Local\Temp\274C.exe1⤵
- Executes dropped EXE
PID:352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 352 -s 10122⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 352 -s 9762⤵
- Program crash
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\34CA.exeC:\Users\Admin\AppData\Local\Temp\34CA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 9323⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 8923⤵
- Program crash
PID:5040
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4816 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:3036
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4200 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:4092
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:3420
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
172KB
MD5ae7aa3c7ff5c63e45049d62dc85da3e6
SHA13bab37d0f80b42037c9cdfe66763dffe98eb8f34
SHA256648de06a854bd411c5ae415662cab3d220341c9a929cee05136abae3d3416066
SHA5122f153372b65bc6315e37c17e793b09f887d77570e72a248d7bc1084d82e78ec9457fa9a08432ec4b2bbe9da33c69151fb0865f6537b20408c7d1a6241f941f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57f4af2405aff3d0a84677da6112fd6e1
SHA17bd089299f58130df6a005086beae1b3c9226504
SHA256ffbfebf9fa8d2dd3623557f872d0879054e1cfc733c562b15805aeee1cbc45b2
SHA5126dec95444331c43ad02ba64bc3e3aae12c3e72929b65a41955bbce973597e13c01cb6f063a45f29e598740d901190e7bc5f8d832ac0c3f1bf00185e1428c7b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD50f800c651c0053b46e7944fb12cc0451
SHA1bfbc7be861d2a55d33c0bcce17fdc24e768162e4
SHA2564068a5c8cbf743e35fc513a040d656227f9a09412a9a85120953863cdb52fa6d
SHA512b2fb01abba172360ae3dc2157b29ef50de16b4bdcb7cf004f0baa196f56aae38af8aca93bca1bfe4c12204db51f7686981ebcdafd73a15be1f582b738ac5df72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5ad9177a0dc8a55e958a84283ef899001
SHA17cfdfa80a69d3d3d3679ca45427456fc7b0369ad
SHA25691df43be78fecb2028980ea69cc62bfe7ed114da439d7887c0fc3d22933f3407
SHA512364b7dead88d76029556c527cfcb1ebd78a5e1b1b6eecbe607f354b4640f8bb4cd611583c2c532f5d3619591ebe72217b0727e2a86602e59c12ef50df847fc5e
-
Filesize
306KB
MD50914392b75e6f2307f0f3f0e4a081d0c
SHA11a5ad3e5683a9d7cd49fc716fec815908f80bc19
SHA2569ce21461af6fc6ffb1825c7567165530833a734cb1d5ee414ebe68ce7ee33b6d
SHA512dab1ca149e23a259c0d05bf953251645b9913bfd1477c1ac10b5207d8ee91754d0bfed3634a0a3cabb145dfcd47aa314a0ae1a893f45de68fb6269d75ce3de03
-
Filesize
247KB
MD5d6c2a7ae754d76248a98d57555fd7569
SHA17601f19cad0e6f3b657c58791bde34c04f1ac460
SHA2568df197a7d6ca7c5b0f4bb0cda991ed4c918c3d50b2a318497fe0439fb9dc56be
SHA5126a9883a9f80f67bc52673c42b1c5ee692f10c9c35be146e1bca0f96d8374608695c8c0634effd2fae8db795773674a3373143a95d40875a6b04be820e46562d2
-
Filesize
417KB
MD5fb170e32e883751ca44093fb2e9da6fe
SHA19b46107b0a1f3c50b769e7624b28e6e4f4adc046
SHA256f42b749a984fe92a93de1e0f8bcfdf1540bb8c01882cc0656c600f2b468bce05
SHA51219f7a1cb7a1da95e544e135aab5e760f1e8cebaedbd4608d256ff6aaf174267dedf9a187299ff1b4370573f7895362d38510a1a4dfd192d148b6d87835b93282
-
Filesize
486KB
MD544428f9a2bfa46f639fee5f33507f694
SHA1922cf7f7efa7bd5a5d2b21af02976e249d91de5a
SHA256ea5a13f15b8b9877b274e1b83387c19b2dfb7f6870bcdc4fbd627dc218d5d188
SHA51239f497db5356beeced00e458230150487b14739b420dea9e15a77119172b81bedd7f1c5e3bc79fe5c89b1819e506ed7f192024ef5c278b44e4890ef3345d6b9d
-
Filesize
1KB
MD52ed784624acee236ed6e195b9d78f663
SHA101138232491ebb6edb323f42b4ab9877b13781c6
SHA2563d94b6ffa1651cbbd8766990c167d9567b940b5d85ed11b1c43814d6284ba619
SHA512c5713a040181216b92421d6215453dd85acd95f08756d13a71e02b3ed9ab43cbd3e20ca082272f2700b5dd4d674a37f4928f8a50e37b3b074c1cb38a91122db8
-
Filesize
93KB
MD5f2a159940ab289e01b6766c08d81b4e7
SHA17ab920919c2c4ed76c3fdab1caa1a77dffb7a88e
SHA256a4d81d8e7d49cf5cb4e099ed03d9625b08f57260d17377b327c03ddcbc0b20d6
SHA51205f40ac19522519c271f2ea3e9dfeaf3289002b82c05459a38ce6e879b1d8f127fcb50bb294f1677d4891fbc6c91b36e4e3e46e6a01fafe200a68ce784db380b
-
Filesize
57KB
MD59a31813734277555e33af29abf9c34ad
SHA1e302e465b22b7d7e73b924036cafba26d55e6310
SHA25656ddc85ca5e8316f7f31700a61ae6955242a5de89078a8a53b980502f087a020
SHA51266996b384faac5113b1d2eb287da093f31ba8cf4b9a98c8ec09551a6d31c26a7d89973ba2eceefa90577fe553668866754d91f2f7a340272a5cc0497cf9edbf3
-
Filesize
249KB
MD51c9712800b9bf80caa58a30243690549
SHA10379b4a5d251759ccc4c6553eb2e05d971481d0b
SHA2564be13a0669595d30d23f6f8988ac6a8ebd91f5343df8a7c9c1771c9656d540bd
SHA512a476978c98934f5f73217f80fbce80e0cafed42a3bc4c9597649805a830c2e283fd4456ddf6b14634cba8095db8545781389bb441c978df5fe539b89fc9b564e
-
Filesize
162KB
MD5f64bd94b7d3a0eed662e10a77c4a6d0f
SHA1022a1c69c494b5a0f3fad19be3e89e86476af595
SHA25647db6f09f3df2c294735d71454ffd258fadb2f731e8a70c7e2126bfe0cd2a1b2
SHA51213de1187fc2733a0da503fa19b61163e938448e6c4c47616d16db3e9928f89f3a4bb6fcfe31e5545665d343761d73745787a1dcc2c75be24c85d1e3224c17411
-
Filesize
92KB
MD5254ff89e58f358634121866bc051fb72
SHA17c0726e394f0c90bfb8b262c6b0b420ae6dd87bb
SHA256ce6c1e437aac60256861aae442ea579f2b9c76548c6b140fccd2619f67a67c8b
SHA512b9573a5e326565bac94900b2949ec8e0d03ac2dd7835b4a122516fb4e88e4720ffd74ae50e09985ae40ca8c52d5fdce8174e545be3e57cfead0330e1137ea36f
-
Filesize
172KB
MD55963c92ddd539134e5d4603e4e626e91
SHA154873ada9d1deef43dc4e69b277a9479255035e3
SHA25687c35c3c4c8aeb9b8de5938c48ee315b7e7e80eacc20028e93431a1c6ab66a02
SHA5121b3b91672534d736f2fe19b0f956ec56965cfc6879fedd36e3fa1313d10abb66fad2c26c34819359a8d8626ae1b26629d0fbd2da66dc4d55d1630a23ba0b1112
-
Filesize
83KB
MD50c1832ef5cc89cc677f883d56f5516f9
SHA13952c79a78c53601e4dde8fb80bd20e81d2e51c4
SHA256aa2376085cdb9b24d10fe635bfc362b5e3da4428c0d8962754730a143fe24996
SHA512d2c4deeb3f037b940ddcb1d614649d1d8b72ad03befd56eb56655b10ff862afa46a08ce176e07008c2dbe07cd080e1fdf381688ee22ff8d5ca1c0e540a22c858
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
26KB
MD573672991c92294b08fa5f2da7affe406
SHA176b441d7e86d85336c9fc8a77e4d163a813e835c
SHA256bc740ee9f7b10f71a087fba3bfd02330c6cf927a03808cbe199c1987a42619e9
SHA512873dca6a9a82564579dd3a233823f3ca72132170a59fb1ee7bb4405fc5644f66ee5ee2799344ee18efeaebbab1792ff091f18192a169c8d4919c0310f6966d2a
-
Filesize
9KB
MD5bea47867bdf9390ab317127edf3abcaa
SHA159ee58ff73659905af74017a360cd00bd97d5b0f
SHA25611b5aab93aca42d2220dd9764716ccc91aae6af4c60d82b5e746dd1b35d1deb8
SHA5128fa7a70b021667ec7ad7b2ee61775340b904345e1c011c1b2756a6f1b24c83126e3d019a78a96ff28c89e92e76c5e4d0ed6abefcb6f8cef9e0654d3b3eb99013
-
Filesize
39KB
MD529bad021933bf1fbc1e5f6fce4980fef
SHA1d33b40df8a22941367ba09bc0b6255dc8cde54e7
SHA2562c6aeff4cb0a9d6dd480c53f8b35b78dc76092f6f86e046e11156e842414c2ba
SHA512178b447e96d41ac438d4df90e2ad1a0eed3f4b3e781fdbc76381b07b95e5e4dd5871540252e8ed9c321eb66d832c4189996be17dfa8a4212ee5713f416b34e77
-
Filesize
64KB
MD52823c442890c8c753975dd583ef3a2b5
SHA164c3010426aa1389fc8d1286833ecf421f59f524
SHA2562993e0f534b2b44b41a68a0aa7302a919a153a343c3d143e837b45dfae965922
SHA5127d704e5326da5228397413fdbfeda7132aa21433ec4f09b3e809cb1829b9d0238d681b8fae182af1e8e4725a6d77bb7496c38de7fa62d79706115f44502cb035
-
Filesize
384KB
MD50ea19f8585b60cee188e6f67b9dea06f
SHA1edd60404abff92a84b911e794fbee96a87722b15
SHA256bb3eab7c3fd89fddbab2da454358d435980d5e83c2f0ba84dcbbbcaaac571f20
SHA5125496736eb810f726e51598aeb47bf106153df4d21348a898582cb4ed83e2edc18e8901872bd359ec2896dd9fdd949250121e446430084ff0aa6ae64a4352f219
-
Filesize
715KB
MD58dc1f88ae1fcedeb3983c5f5c3d486b0
SHA1d40e67ba5558d90cb11eeca04d213322159336fc
SHA2564a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca
SHA5120b2263fe049e280af1178fd396a06a04e6b99f7c971839207ae225161257ed9d9b7eaa8d0ceb1f14d3aa2094b53ce91dd045ebc169102e707ea7285f91432ac1
-
Filesize
238KB
MD58c20d9745afb54a1b59131314c15d61c
SHA11975f997e2db1e487c1caf570263a6a3ba135958
SHA256a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
SHA512580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
Filesize
32KB
MD54d3bf968204cc533fdf371469d17bad1
SHA14bdcb0845d92780f29f5a7e128c39f40f4b856e2
SHA25645dfcdffe0b02672a25781e90eb0e6dde309e0f286bfaddd1debe08aee4bd9a3
SHA51216bd2d115f2b8662549834cfddadbe52d450e6264d6336f44ae649b2dadafadc54007baa50542657898cf0682aebeced6392c6409db80af4042b84bd6ae288d4
-
Filesize
55KB
MD54097c6980b8d6b0c303cc8503671e2bc
SHA1ffd2e594fac1e292113137f7dd7bfa4eb400ead6
SHA256b9e31f4b1eac5443f87a7503b02a75774f3c69ae9c85f9a253230c91f57b3117
SHA51289108cd28750fbe70c320fd9de5768d74515289787af4a54aa1bad343a2108b1c4e7419fe35aeb416932d19aed129beb7ef8c9826a732cfba8853422f429e90f
-
Filesize
312KB
MD52e300efcd7d9acf7562022470002d86d
SHA13ee237c6282e7c16cc11e2b0e9ce087ecf8c18af
SHA256ed46b0985fc1c5328cde87fe7649228dbde302ee9e288cce7aacfaf9d9630454
SHA5128c078f50569d05620f2398a4567a8c4e82d171a55980e0c024b86229212f7ec67836bbd814d837d087f340a2a17da257d3ac80f0671058daca7d05373e985e85
-
Filesize
216KB
MD513c7f054f59628ddea54debd87fa5255
SHA1e5dd0e67f5dbc084a51cda94e3abed8c38f6047b
SHA25681507221c5ef691b99670145539dbabbb1b417d2df7ee2b2f24ec4906df06a03
SHA5123142cdefaf7d4ae40031a9b65f71e4d38a9d324ee017c6c9e22a2bcec3d60341173223c3ab1bfc909c89aa3c1b8df18972335d20f10f322cb18ed60015cdf74a
-
Filesize
149KB
MD5d656fa1d05b4337012224ee16e0a954a
SHA16636c7f5b1f1cdbe0e2c330cd041facaa33b8271
SHA2569fa72ec696a994c587e71cc08169ce5094eecae84e55224f625fc26c6b8aa7bd
SHA51297b44bb32a24db53aaafa0c997fbee48c355a86aead4aebf5c4a76f0269b86328b29ae8e3372fc534e034473216e69243c297f87e801898aa43eaa1ea24aeace
-
Filesize
157KB
MD50b0e10972facdf2af37445c05df1a293
SHA186eb08d21d1c2773c3866d26a68991b6a0f0ad04
SHA2567185843d707fe1dd246570406e432e4c6f14fbb8d8090931b6dd5fcba05a646d
SHA5124c822f95d4b914816dfb3fa43422d465f84dbaecf7722d08a3c5df416bcd064b73f6d6856406826f73bc8a19f0bc81a8ed937d2f4cb7009d7298b07d66260817
-
Filesize
92KB
MD54b3fc3105731c7ff3a7e3966416912a2
SHA10e792bf25e8795158074fa6bd2ee87ad16675124
SHA256c0f698bcc4324958848de5d8e1b1bdaed5e01632d8c827a5a95356eb04a2c443
SHA5126ed5ee0139d9d9a676232a6c5d6e9a8528f880025a11fccf8a1a32a999ae5fac41f993c384fabec788e4e47da714d67f1def0348da6b0f4392e7fc7ff1098c28
-
Filesize
46KB
MD508ca6114f25a8b3e09cf22e14e6bd22c
SHA122f13c813ed7facda83c0cb6d498af4bb57da91d
SHA256da63e3819a0efcd506cb4344bbb3c51151cbe4a5593671c90cc69cc8530f749b
SHA51201558be58279055ed678ed5d4e771fee7c2725afb6521137c1c191dca219d86193b13138bd894301c9fd34ce46bcd17bbd5bbcc38c4d759cec99db5a9ba3c9f8
-
Filesize
230KB
MD51ce4e672424e02884fed566ba10dc549
SHA1e41a4f2ae0c48ecbc94ae8b256cd085078522165
SHA2563c3cca111040ff68f91e6d53bd2ecdaa1c23eea2bf52e855b0621e8ca2afa44b
SHA512409fbb7b5a92add657860b81dbaf6f9b828215104d921cb61e2ee9130d28f61b3adede7249fe394c8376b465653fffc9eb944849156943bb405f3baaf85495e5
-
Filesize
204KB
MD55da2b56ebbb8c5c0d1b1274a0673756a
SHA1d3cc44c5bc4a8622b65cfd1f597ff7f65744d3de
SHA256b7a38b61d3d8fe542dad2739149117f94305356eb6845a756ba35fe320ba57ab
SHA512635957bcad9b9c95236770f17628fb150c57032353184b1751c95456703e831516886447086699a8a0c6f11b9a04a99a67b8b7069afab2f495b8ccbd6f98706e
-
Filesize
288KB
MD531b5d76d4d6392b66b3aedafb338909e
SHA1a3e1f5fe5cc45ed7d64e3ff769ed245967cae401
SHA256155571d521f0d945d9d0a101a3afad112a1048bdcf31778fe043f67d57cc8b7e
SHA512a3d6c499fb44f31fc687f525747f45eaa1755351b3b924bfee9db54de5d362c28c9871e698e6e7be2c95145bc353dd4b263ff6beef0f7ca838900b51e2f9a74c
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
141KB
MD5a731445759748e338915dd21c0246b24
SHA1c05069dd0e64020e4085af630c0d9f8a4a04fe2f
SHA2565bc1a69ef9b208dbfaf20876453e3fbe2e6f7bf9486e5342d2942fb091140491
SHA51239a31fe118663c650114ef51e26f50f77c387dadb4f5f6276d56f077db5d482f612aee00ceb56b345a729dc5720e1312a219528779c0f3c42fa697c373acf9b2
-
Filesize
23KB
MD51bda99899df0b885fa3a1ee622aa8545
SHA17151b87c67b6ceafb2c91c2c3e48433b23b9eab6
SHA256340b5b724720d936000629f26b6a84e91894fe09d2128261e9a665fa9c3a73e4
SHA5121e164f474c74c7b92837990a3695b45e6d217bc2d6d06bfe122f89769e81d5f082dd3273bf5d542f91e46e007b7b3194308e5a438dfe3110dddd4982368f824a
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
134KB
MD5d1c848319b425006d81c3f850c35386d
SHA16681df431d400405b8c2b0f58bca8fbbec3754fc
SHA256b27f01b3e99bc6325d08f3cf142adad8db38d757ff8a7689f7e4bab089365e35
SHA512b589965317c5266e7dd686da6c2b36b078e119b2fe7c0927b9c34c3095bc60dc503dec9c20c50173a2fa3197433ed18c08556d478bf68cd08d040090ba97bb7c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53873e53aebe8ef0ccf19ec90da19a747
SHA1e90daac179da76b4bf63a4764d173de7de054eb0
SHA2568e16a8f10f748751fb4fd629a5d38f40573af0941e5ebe63dd340c9c0a4ebbc1
SHA51267b579f693bbf5afcf88ef958a10d17e469475ad0bf114847a618ba86ab1e5363cc2b2c471b49e7c0534ef6dba6cc394d03b5043f30b5b62af23dc03c3508f3a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5bd062319c832d57f17f11e7843fb3ff7
SHA1a806e10264e22d4d199f09ef70182f119a52903f
SHA25617f15915d66747c4811722ef6662c531ba89f189cd6269b1d192cd2bf4b7da7a
SHA5123e69a91d58c0505a1d4f4ed83fcc146a16f2ee8d38e1dd21d34b16bb251139f89d3ceb94047be5d969e98a0f6f53bb12a89824ffe0c81791ef31eb9058e45b64
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50508ec64ffef72e09e2655aa7a528804
SHA16dee166422c71538f9caba75f41167ae98a8e8fe
SHA256d7c9ab0ccd348c0698c3c1d358468d9eb49abab8066e1bd2d930947d94eb5592
SHA51238904b52130bcb3d8f511078534656c098f38f465fe299a6cd2c8912f09af5c4171c494641f921859fff595aa2f83ed726007b7cc363b5ef90177f51d0e27699
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5931ab118d49dc41d65ada9ab2234a810
SHA17243c9048d94cc0762f93866990d52d531ba0cdf
SHA2569568f23190cc189fd5b1cd8a3a5ff1f9736a1315e27b95125c52f85ab5e0c17c
SHA5125d02ac229424c2d5a94ed52bd8cb87229d62bec20fb3c865ebb2c3ac6463aa633ebfab729b04c06b64a350f9aab54eac567fac67572787ecc320b4d418798d2e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5252633d08eb980667bbdd91901973e88
SHA1f4707f155134c8715579e189610d6cfdcee2f336
SHA256e78f52577e8ea41c539fbf6917536c02558e752166ee2a4c5e65fde0ee945ee6
SHA512c4864cbc97e637e92857b9f3335ca524199a44b90065b6944faebf440cebdb85cf479b4f0b0aed9ef3e14714ca05ce395cd352e16c2479bdf04c695e25586557
-
Filesize
338KB
MD5bf5869e63d217baec3fef95a44d180fa
SHA1bc13d73b45035749403c31a6a9020abdc7bd9421
SHA25613dbe096c2dd64834d9f3e825e4cf62f5577b863f6569fbe6cf8ec6cd9dcc956
SHA51258ebf96b03db7174e42dcda5401f96a361121354097772cf7b1f3b34a1f3fb79eb56a66a13a941a2cee6fbf3afb07560420615997b2cc3b1024023d08ed6911a
-
Filesize
349KB
MD531a89868a352ede382c2b3f94ff431b6
SHA1161631a85e642be318990340c01e39f85d1619dc
SHA256aeb266fd746d93f9395bfbeb0f362cd0d703fe320b6650349908cda6f08c47a7
SHA512316ad9ead40b1b805aadec19f6bfe0facbb2f4cf1f2015ce4e8292f95ce5191edb3952331ac016081ca0746a07b94660eb21cddd29847c8df93f8ce4bb1c54f3
-
Filesize
57KB
MD5dd370fda334d182b97aa6012453c8d97
SHA176f353516472459703c186471706973d0a73983b
SHA256b7d33bffec01c8b89699528bfa995fcb882a8a46afb7c5985f2d3d7c5e4ffe23
SHA5127f3d832a44c19e053f6b8bef6b474df25ab7c8c042888d247412683bde016193da554ed878ce7321d1df53cad6ef5757bde8848308e6b239a6bb886e57df3adb
-
Filesize
166KB
MD59bb77f002d368ddaba3445a98dbc14a2
SHA1ce43f02f4189c96e92334cab25b78c67417a0401
SHA256c53fbf07a70005cf30bbd8d3a7a6615734ac731fb93baf13fa58a81bd831ed44
SHA5126a2239bd53d0d6ca97fcdd0c2a2fe9e18981c91fde6f72dc38634147f6f9954667e5ababf89d5738bf7779b01d04dabbf456559c1557413e2cea860ddaf47dc3
-
Filesize
1KB
MD5cd70b385f225e2c03875fe06c156cf69
SHA13105a89756c346a5b359f1f84598433b654b3f3b
SHA25683b35f1e9dad2a88fbe230d94f0449dc4dcd27292e9ffe2f1558d62fe8b29a63
SHA51283e077eaa597c80709bedfda1aacb611b59f3fd7f8fcc357c38d14d3caf14d4a4c9f05099c7fbac428e6c7154500055050a6bb129b799218bbe6d3c93d00d550
-
Filesize
15KB
MD56e3fc84e261d587f720284b513b64a79
SHA136b0a89759a11836fe4b314a1114a705b6c3216a
SHA25620362244811690e11369d6c9b723aeacb12ca791721dc7910b7531f687f9e690
SHA512c6c2c80d094c1c4ce7ee733db4e399de0eafe05cf7d315b95da128435d8c2813a7c808e789ded6509e7f693c4a4fe1d17fd5ae0a477ac61a39441f5f23319a58
-
Filesize
204KB
MD51c79757ec87a84f637c7bf1d88b7ddd1
SHA1059e9d76eb344a76ab261f2da40c9413c872e605
SHA256466e875a75e49c23358a4cdefbc5578f8dab8e6ceb91e7e7b9d49ed2e0e99a79
SHA51282bc5fcab8cac746f1cb1a640492dae5cfd23a0491d04321cddb075dfe12486f43142df23b07fbc718ff20583ef67bb5cc66c1cf78a9ad886cef661ec573a0e2
-
Filesize
309KB
MD514cdbef3126ac3b3fd8a8e44018bfac7
SHA18928be86dfb0ae6de88ed9d88071eb5230c91dd6
SHA25685e278e428c2d760959814b215e1f3582466504d8dbf83c5d3586cd7f1508969
SHA5124ca1049327da2bc00aac41fa9c1e35806066a3c6581325e338d4adbabc996137de09a056b21d665a2ee9d8999e9492cf5f1a172c172f240fb8dcb9f94424bd50
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719