Resubmissions
25/04/2024, 18:41
240425-xbtfwade97 1023/02/2024, 00:25
240223-aqsrkahd35 1022/02/2024, 20:52
240222-znqxmafa7x 1022/02/2024, 17:28
240222-v17zfsdd86 1022/02/2024, 17:13
240222-vrss6sdc92 1022/02/2024, 17:01
240222-vjm8qadc33 1022/02/2024, 15:57
240222-ted9ksce55 10Analysis
-
max time kernel
246s -
max time network
232s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/02/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
6958ACC382E71103A0B83D20BBBB37D2.exe
Resource
win11-20240221-en
General
-
Target
6958ACC382E71103A0B83D20BBBB37D2.exe
-
Size
232KB
-
MD5
6958acc382e71103a0b83d20bbbb37d2
-
SHA1
65bf64dfcabf7bc83e47ffc4360cda022d4dab34
-
SHA256
078f586ebb8a22305540fb5982b2521f1b82e4317f286e13bab680fff0a9d164
-
SHA512
ebfa8b6986630b3502409d38cdff54881e4bce48511c7ba4f027345296c29708112c19ec6c9181c4b0188fa1f5cbe17b3c5d44dc07f33858323c677ef9caaeae
-
SSDEEP
3072:FdfbYSFlTBL/A9OYh6++4hY7gfv9yPQxAVUmZAzsqvj1letKv/jbNRKCnrQbW:PbYSFH/AYYh9vERVUmSAQj1la9
Malware Config
Extracted
smokeloader
tfd5
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.lkhy
-
offline_id
OxV6DGl22io8sqMOW1zCCOlzPiv4f1Vqzw7Y8zt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-uNdL2KHHdy Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0851ASdw
Extracted
vidar
7.9
7f6c51bbce50f99b5a632c204a5ec558
https://t.me/hypergog
https://steamcommunity.com/profiles/76561199642171824
-
profile_id_v2
7f6c51bbce50f99b5a632c204a5ec558
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\edb669ba-ea5c-4aa4-94ed-7c13816fff31\\A876.exe\" --AutoStart" A876.exe 2436 schtasks.exe 1392 schtasks.exe 2344 schtasks.exe 1224 schtasks.exe -
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/3992-71-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral1/memory/3944-70-0x00000000021B0000-0x00000000021E6000-memory.dmp family_vidar_v7 behavioral1/memory/3992-74-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral1/memory/3992-80-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral1/memory/3992-106-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/files/0x000600000002a801-435.dat family_zgrat_v1 -
Detected Djvu ransomware 16 IoCs
resource yara_rule behavioral1/memory/1700-22-0x0000000002700000-0x000000000281B000-memory.dmp family_djvu behavioral1/memory/2548-25-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2548-23-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2548-26-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2548-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2548-40-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-47-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-48-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-49-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-56-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-57-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-103-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-193-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-195-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-196-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2376-258-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 5 IoCs
resource yara_rule behavioral1/memory/2192-172-0x0000000002F50000-0x000000000383B000-memory.dmp family_glupteba behavioral1/memory/2192-173-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2192-217-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2192-218-0x0000000002F50000-0x000000000383B000-memory.dmp family_glupteba behavioral1/memory/2520-221-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1548 created 2952 1548 MsBuild.exe 36 -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse\Performance Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService\Performance Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF\Performance Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo\Performance Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest\Performance Taskmgr.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BF2B.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1364 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BF2B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BF2B.exe -
Deletes itself 1 IoCs
pid Process 3300 Process not Found -
Executes dropped EXE 24 IoCs
pid Process 1700 A876.exe 2548 A876.exe 1776 A876.exe 2376 A876.exe 3944 build2.exe 3992 build2.exe 2008 BF2B.exe 4640 build3.exe 3916 build3.exe 1812 E16A.exe 4796 DB.exe 2192 810.exe 2520 810.exe 1964 csrss.exe 4200 5314.exe 4408 injector.exe 3832 mstsca.exe 1692 mstsca.exe 4004 windefender.exe 1008 windefender.exe 3468 mstsca.exe 2092 mstsca.exe 3824 mstsca.exe 1992 mstsca.exe -
Loads dropped DLL 2 IoCs
pid Process 4200 5314.exe 992 Taskmgr.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1292 icacls.exe -
resource yara_rule behavioral1/files/0x000300000002a7e3-77.dat themida behavioral1/memory/2008-79-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-82-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-83-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-84-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-86-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-85-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-87-0x0000000000530000-0x0000000000B42000-memory.dmp themida behavioral1/memory/2008-90-0x0000000000530000-0x0000000000B42000-memory.dmp themida -
resource yara_rule behavioral1/files/0x000500000002a6e4-512.dat upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\edb669ba-ea5c-4aa4-94ed-7c13816fff31\\A876.exe\" --AutoStart" A876.exe Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 810.exe Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BF2B.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.2ip.ua 44 api.2ip.ua 54 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2008 BF2B.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1700 set thread context of 2548 1700 A876.exe 86 PID 1776 set thread context of 2376 1776 A876.exe 91 PID 3944 set thread context of 3992 3944 build2.exe 93 PID 4640 set thread context of 3916 4640 build3.exe 100 PID 3832 set thread context of 1692 3832 mstsca.exe 154 PID 4200 set thread context of 1548 4200 5314.exe 163 PID 3468 set thread context of 2092 3468 mstsca.exe 170 PID 3824 set thread context of 1992 3824 mstsca.exe 178 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 810.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification \??\c:\windows\windefender.exe Taskmgr.exe File opened for modification C:\Windows\rss 810.exe File created C:\Windows\rss\csrss.exe 810.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1360 3992 WerFault.exe 93 2008 1904 WerFault.exe 109 4500 1548 WerFault.exe 163 1624 1548 WerFault.exe 163 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Taskmgr.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2436 schtasks.exe 1392 schtasks.exe 2344 schtasks.exe 1224 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\TypedURLs Taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 810.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 810.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = ffffffff Process not Found Key created \Registry\User\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\NotificationData Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\NodeSlot = "4" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 560031000000000057586803100057696e646f777300400009000400efbec5522d60575868032e000000a6050000000001000000000000000000000000000000d93f9c00570069006e0064006f0077007300000016000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "4" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\NodeSlot = "5" Process not Found Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3300 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3916 6958ACC382E71103A0B83D20BBBB37D2.exe 3916 6958ACC382E71103A0B83D20BBBB37D2.exe 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3300 Process not Found 2600 mmc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3916 6958ACC382E71103A0B83D20BBBB37D2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 1904 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 2192 810.exe Token: SeImpersonatePrivilege 2192 810.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 4212 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 3988 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 900 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 4584 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 5108 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeDebugPrivilege 1008 powershell.exe Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeShutdownPrivilege 3300 Process not Found Token: SeCreatePagefilePrivilege 3300 Process not Found Token: SeSystemEnvironmentPrivilege 1964 csrss.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3300 Process not Found 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 3300 Process not Found 3300 Process not Found 3300 Process not Found 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe 992 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found 3300 Process not Found -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3300 Process not Found 3300 Process not Found 2600 mmc.exe 2600 mmc.exe 2600 mmc.exe 2600 mmc.exe 2600 mmc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3300 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 2740 3300 Process not Found 81 PID 3300 wrote to memory of 2740 3300 Process not Found 81 PID 2740 wrote to memory of 1740 2740 cmd.exe 83 PID 2740 wrote to memory of 1740 2740 cmd.exe 83 PID 3300 wrote to memory of 1700 3300 Process not Found 85 PID 3300 wrote to memory of 1700 3300 Process not Found 85 PID 3300 wrote to memory of 1700 3300 Process not Found 85 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 1700 wrote to memory of 2548 1700 A876.exe 86 PID 2548 wrote to memory of 1292 2548 A876.exe 87 PID 2548 wrote to memory of 1292 2548 A876.exe 87 PID 2548 wrote to memory of 1292 2548 A876.exe 87 PID 2548 wrote to memory of 1776 2548 A876.exe 88 PID 2548 wrote to memory of 1776 2548 A876.exe 88 PID 2548 wrote to memory of 1776 2548 A876.exe 88 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 1776 wrote to memory of 2376 1776 A876.exe 91 PID 2376 wrote to memory of 3944 2376 A876.exe 92 PID 2376 wrote to memory of 3944 2376 A876.exe 92 PID 2376 wrote to memory of 3944 2376 A876.exe 92 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3944 wrote to memory of 3992 3944 build2.exe 93 PID 3300 wrote to memory of 2008 3300 Process not Found 94 PID 3300 wrote to memory of 2008 3300 Process not Found 94 PID 3300 wrote to memory of 2008 3300 Process not Found 94 PID 2376 wrote to memory of 4640 2376 A876.exe 95 PID 2376 wrote to memory of 4640 2376 A876.exe 95 PID 2376 wrote to memory of 4640 2376 A876.exe 95 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 4640 wrote to memory of 3916 4640 build3.exe 100 PID 3916 wrote to memory of 2436 3916 build3.exe 101 PID 3916 wrote to memory of 2436 3916 build3.exe 101 PID 3916 wrote to memory of 2436 3916 build3.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2952
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe"C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9172.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\A876.exeC:\Users\Admin\AppData\Local\Temp\A876.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\A876.exeC:\Users\Admin\AppData\Local\Temp\A876.exe2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\edb669ba-ea5c-4aa4-94ed-7c13816fff31" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\A876.exe"C:\Users\Admin\AppData\Local\Temp\A876.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\A876.exe"C:\Users\Admin\AppData\Local\Temp\A876.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe"C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe"C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe"6⤵
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 21527⤵
- Program crash
PID:1360
-
-
-
-
C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe"C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe"C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
PID:2436
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BF2B.exeC:\Users\Admin\AppData\Local\Temp\BF2B.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3992 -ip 39921⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\E16A.exeC:\Users\Admin\AppData\Local\Temp\E16A.exe1⤵
- Executes dropped EXE
PID:1812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EB3F.bat" "1⤵PID:2328
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\DB.exeC:\Users\Admin\AppData\Local\Temp\DB.exe1⤵
- Executes dropped EXE
PID:4796
-
C:\Users\Admin\AppData\Local\Temp\810.exeC:\Users\Admin\AppData\Local\Temp\810.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 24043⤵
- Program crash
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\810.exe"C:\Users\Admin\AppData\Local\Temp\810.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3012
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1364
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:1392
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
PID:4408
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:2344
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3144
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3368
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1904 -ip 19041⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\5314.exeC:\Users\Admin\AppData\Local\Temp\5314.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:1548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 4603⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 4443⤵
- Program crash
PID:1624
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffee0999758,0x7ffee0999768,0x7ffee09997782⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:22⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:82⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5068 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5060 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4736
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3832 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:1224
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1548 -ip 15481⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1548 -ip 15481⤵PID:1800
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3468 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4444
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Enumerates VirtualBox registry keys
- Loads dropped DLL
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:992 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3824 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c1a837e7fe0cd4bf1d70c7b4d8844d55
SHA1b9b2d408095400ff0be067d8c6eed6ba0312ef3c
SHA2560e3dcc979a1e43003bdc7253cb4094c0385d2099c14dc12a4e85fded6f76dc97
SHA512720c2aded6054feee530553c84ce238ef4952ce2b622917c840ffa2a937f77cfe2ba55a6212af0a650f7f8286d30088ec385de584e3fe1f4b2ca7901136d16a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b75792b3a5c6302d72594ee6a5c75468
SHA184af5f4b1d1e6ea20b23b5ccf59ebc2575e20c6a
SHA256a82d0a3c5e228a0c4ec7d7139c2109dd7aae07ef5f6bb1800551c84019010b9c
SHA51245535ea57d9e91041eba1ce1f2eea62215ed89b6bc6843e3566e62d98d2ad020a1bf57f3e831ac3abf422e1b76ac53836189828e05b2f24df5a77e38b9dc99df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD56eaa95b86ed3bd15ad61992ed7a34aad
SHA1745a405bfb11012b160a3c7b77302427ed06eff6
SHA256567b3dc1d429c602a332e8efb8fa616a051ef52b3d7980ea00b23afb21a75f54
SHA51209ff3c7f584fe517cc65a94116420f909e40be189c18a6a7d0f79e59ea10baeef28a61cede9e47d131755470a9db0c610cb486d3061e249479868f1fc9148b2d
-
Filesize
1KB
MD5b64872ff1ba649140b283dc160c44872
SHA1e93e07c7b1edfa0d41e5a705b2046b2d441a182b
SHA256cb5aa3a31d471e84f2c735f39611a2f675df0d160abb77871cb85d56bbeedb2b
SHA5125930dbbb3593d8b766b349681c32f90ecd9f6f38a891c165d3f54d8cc08eed05939d14d831abf00dbf3b3c31f0f83d6561297c1ffade7bbb8c7c82488ebe910a
-
Filesize
371B
MD5f1119eb49b33e652a308c4b57c489ee7
SHA12a57c7c8e542f83abc667678f68ec28837ae56a8
SHA2566fbd82c709fe5ae0e21d9b7f15dba74120c0aab21b0e6a4e93864d3f92d0705c
SHA51243a878de8ef967aabb540adf82d3251597839e03f31a0130bb8576e80b5a8bc73e4bcb69c2b6adcd9c4fe322a9c2a2f495adcbe97d1d5662780c8f4d4f2b741b
-
Filesize
6KB
MD50688f4686c2ed5c415a8b86578320369
SHA149092a4cb6817198b8cdc8b33c95b368f551a8c9
SHA2563959aae474b3b4b473be429926a614cbf02c7691365d985d2870b511d97fac37
SHA5128915f4aaa2728b29803ae04688436f1cdf8b4a6af91ba8a6bd4a4be22061e50bc38a7a6d23ca4ff4f245580d9d6716918e1df75553c0fbb39000cbd5d6ac541c
-
Filesize
6KB
MD5ddcb1bd3840e86d4c5742b8f9de98fce
SHA1f1dd106c5be8f2af64ef17a2ad4713d75f30093a
SHA256cbf83c152733412fc732b3a8f5dffbbfc1b81795b96dd884d74a5ef2c4874380
SHA51295bee71df5da6d74181e2bf6bcfdab5d7723246976a186d6bf0941ba34965e89dbb3de1ac962da455e00f4296ebf2abb14799a62add13ce8c915ce4918748369
-
Filesize
6KB
MD5ad823f7381d01042a41f82280fd65070
SHA14fc07a7029391e30cdb68b42d00019a106c182af
SHA2562addcbd59738dfed136b2c5154bef7afcba06403209d343514759adbabd7fe97
SHA512b417d3b41a240f593d622f70a307845e6293d75ca793f1ed97e7d90e9228831b6e2324648396d2e08977342cbec54e9027abdeaed1684eed2d3f3a7a2d57e141
-
Filesize
15KB
MD5f42c50b075f6a2af322b418970be62b8
SHA16bb8d36610f0df7dc1f81537531cfcddbaa3919d
SHA2561d43bc2671ca326d31fc11328556c247e78187c906109fc3e145293ba555a7ff
SHA512551cb00163f141b5265fa50993488be84ed7935af15409735ed358d588f82a997a4521d1521ef0ed321d240839b4fc326606d420d8d09fa1b613078d58d04093
-
Filesize
257KB
MD519cb64e03cab13bf5506d8f1ccab4c7f
SHA16ed493b19131034a44b5a54742e2b78c33ffa82b
SHA2562a5d5fb11ea7418510e9b6b06c343491df94af42169ce31e383f58927ed10735
SHA512d79149007c657e2694b67c5994ff5c6c8eedfce4820432a357e7a5fb9144bfeaef8034d8063ca732afa9a5f8dd5e723fa14fabaf220ac47e8897f05375bcd48f
-
Filesize
257KB
MD51cce8ad93f59a666f8d99b3c5bd2b3b5
SHA1d6f0edc5843cba307b60495dbeee9cb90be59427
SHA2561619a04f7af3dde500751199df599a5b780615d477067b97ffbbb6647afec15f
SHA512037cf3cd0ae9fa8fe12535e275a03ac4f9824c68eacab932c84449a0866f136e66e374ab39ea37b4c737340890d4bac015f46b7b71e7cd4b8ad76b112a99cd23
-
Filesize
264KB
MD54ac937c900ccdf562faa5a124dc6a126
SHA10ecada53d97c9ad092087dc659014b223598a712
SHA256fbbafc7e31a22f773beed60862c089223c09fb49dd6deef94c46692e94cd7723
SHA512e0708e5702aca2bb63742d45ac0fa56fd56e590b1b51a05bc93cae048055365c15e2120cfd1c2a82efdc1e527be04fe4d32dec28a2e778d7958f4adb4d62adc6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
14KB
MD544591be64cb5c6b634232eac089f1576
SHA12b7a9d605edbfcfe758b814ab78f0967e94a6166
SHA25608d77ab354e683ef0303871415038d700e54449977681b86717c9bd639ac39fe
SHA51270e2b75bc1e8340a4aa9e0c0affc5efd8e6141873d769b33cb13c042b0e6e53e5a829704f9f19a17f9343c688f3e68e11c5145cd0e9fb762b17a9e489f5072df
-
Filesize
14KB
MD50e7d6c11877ab4cd61082f246aa40094
SHA1ce0778834733041d3a96540b565cb95d4509c826
SHA256c87d8d066f50c7a67f1abd7ad6e3e8d26b65e651d3865b925722b4ca21fbea6b
SHA51204283061e0af6aaa54eb4b67c81e48d833d671fee98ece4c1a25bbedd639ac419793582e1eb6c866528c7e23d17a1746cb860722324e467b8b90793dd9db5ea9
-
Filesize
14KB
MD56a261569e6cd5cd1e2e427ba894c40f7
SHA16d9a1482896207be7c0f6d22121601fed9c9eac2
SHA2563351a8cbcc7abf5ea61501bc71defb3a95a9294b2345b33987c093a80f618bbb
SHA512893782bac736294e9135891ef9c0f6450a386af6c575f7158ce85a35daece4ac4a235039f4c2c143c9b276b4b8f121007629f69b311192c42d08468c681d7841
-
Filesize
6.5MB
MD5eda36c51a126d6f6989443acfe507e2c
SHA1b87c4c8dec5f3259ec3cb629876ce48da221b1a1
SHA25691d1a1d9d3610c197e3fdbde79040cebf01eddfef34f8e7b77a4b81cbcecd461
SHA51279f7e89c7f6d8b3d6225ac2fb9931c42bd4a7e81dd88f8a6017369007c848ab87843a84f9973653fefa31960a354102684279573587061cb7bfb1f9775fc5dc0
-
Filesize
4.1MB
MD5ede22b4f418d4f709751af82df78dd26
SHA1eb456429d597f433d08ca7e0b308bad06e5146c2
SHA2567e6d1d4791c9f75281a2ae8fd3ee8a4d0d6521bdd0dd7751b378718e8567f142
SHA512cd33f35bc08061d8c5222973ab7d3f38b87623ec99a927c97d76b4d04e431194803bdac770a91a593cc448f6d2e07018359929dfd505bf5ddc1b4b3952c3c571
-
Filesize
3.9MB
MD551def4926e372019607ea10360fa2d1e
SHA13c2da59b38cc903bbc1b8836f0e4b213901bc23e
SHA2562a8440d60d3c01f95b109b24d4391b130e60c1d62e1c80cd79c0b33e76349ad1
SHA5121ec732861b8ef882174cc0cdf1bd509b2625b3621986a22a3a4654bf40792396a03ad603c6bc9a6ab28ba53b5ab4d51557f9ff0e50a5fcb594daca6205e68362
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
665KB
MD550089d99910b582b7b4f71d7b58935f6
SHA162cc51de0072c86e29d9a7f089cea93fc1b025f8
SHA2565c70bc40d13eb71f83e1f37a09851e624e081df0a837e7d66a3c76111ec893d7
SHA512096773ee3e9e067d4b243ea9b1d8a145401a41b2ac608869539c459b7b1f487e15858b3a15996f22013800218a32ed565a238cee0fe25e74db18cab9a835e887
-
Filesize
2.3MB
MD5768351e7fb4e73a68d6128a4ab7ccc4e
SHA1b2e42ae8d8f154800c6ade37ad6ce4e903da79de
SHA256e1af5fed9e816a4f21c4f25e8d1388d8e8deac07c9cacd2889b749f2ec28a396
SHA51276f96b1e6d962937822c05814c77ac8903ac612db07d8daa7ddb2fb7443e6151afc880daf5a8a3e42b4f3e8dc081f391cab3e8098fb4af8ac31ef81a66d20941
-
Filesize
1.9MB
MD55d5c4c47ccae89a73b6f1f42542c834c
SHA15b59fee042ea4897f88a573dbe38ae4cb71e3f7e
SHA25603cdea5b068f994f8c15ded8e91c32a2638a7f646e68e3988a80e6a377ef6dec
SHA512dc9ab01fb72f331ff0e7e384db5a43ad41215914c5363d8ab90de7a78ad5d3ef02511585a25189699c1b31d300ff42edd98988660b65da91058dc3fa6f5a786b
-
Filesize
5.6MB
MD5479342d62078aaf31881972c7574f6f2
SHA1382fa9a95746ca6199e7dfb9ae2bd035f4000fb4
SHA256a6b59e0a275b5314935a3f812a5ba7dd5d5cc9524d3a6efdeb3a103eea386f6d
SHA5120e74e3e0b993968220e712ffd94a76c00d35f0452494d62b3f6780c80cc0cae2e9982978830c54bed3a57d17a5a84abbdc4c0cbb5961afcae785048ac4ac47da
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
334KB
MD5c6d3d647baad8a5b93b81d2487f4f072
SHA1e9c1105dc41f85d4f7e94d4e004f8427787c8802
SHA2567754125653413cfca3bde887fb2a22f0cd5144ec447bb274c69b005861b70a0a
SHA51255425dc95161e627e19e17f1bb910f958dade0c2b12da5eaad31159f0e2dc5217ff293c52f39d860d399807d5b4a814f1bb24376c58b40cc171d298282052049
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59556408ed74344a332317c7ba1385cdb
SHA1627f50601815ccd89e7a202e18dcb96db4b9b644
SHA256261c439cc690427734bd5ad97bfe93632eb70c5a83911bb9edafff4ee47fe597
SHA51244ad6a5e748e469c59090eae295bd54652fd1d75e1ab2d6a0a7eb6cb079ee7d960dde3c1d36eceebf191bb496123c843d777cf61941203d1511575b8a1704d5c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52fea1e323bf5b221eb9136e6eca024ba
SHA1aa270086c0274e1703fc595bde3acfd257f0bd34
SHA2560e008737c2673f3e693d0519665849ec6267efda0d9cea13d590c4a21e880a12
SHA512162f795450214647005cf92c41329cf0d973ea5c669752cc69f0fbf00307e4814d9ff2ff5ed18bff7e04af688b4f65871d1cfc6f64f227b52e8c53f4818cd8a7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58570cff1c327283ff2faf7ad17ad0aac
SHA14c9e0aba97c4b8835e02fa8029b1af28ce740f1b
SHA256f1ef672a91904f05759f12dddb861d4da909b67321b687509999d06a484d3400
SHA51268668037b66d6c9b34e181626053e703108ef4c0c2aa9e44fb66f16fb62bbffb22121a5e077afdcb3cec5b1a77c6ce0c470b74da3c56e130c0f57c0d1493cc4a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51274d25c93b696f21472eef062497046
SHA1bf427dc3454fd5dc3ad253ae39faecd6de28ca98
SHA2569aab67894f57f1f1470183a77cf4d57ca8b0bd0239b20cbf6ab3eaa61282caf7
SHA512ec42941957b17874010351a38b7f6e7e502e53355ae80908897ed5dea994e67ce5a3789d254b4fcb5337a17fd3bf271d1fdc6e32a6b9a514a200bf39d84c1034
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f4abd1129d302ffa2bab4f2a6e5d0889
SHA156dce1d4c5f9eda22ae1987496ce7de912d9a8a4
SHA25693a8a97294d01ac2063138151af958cbaec88878690a1c0b9c44b64621514ba7
SHA512622572dd0b33468aeaa29256f9c4620ce007b6f31748076ad8813098d8435e1c16d4cfc73b48f4667fdc1f33f4353168c3eb0d2ecb6e4eaa05e622b5050dc229
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec