Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp.exe
-
Size
1.8MB
-
MD5
6ca0c1cf2afc7153337499fbc434df39
-
SHA1
4c2f093a92aef65477dae6ad6722197c54e4f971
-
SHA256
98572cef96ffed5e1d1c4a472b3570acb08e17cd2c7d2fbc3063203e23cade36
-
SHA512
4e82311a0fd3c00fc1c9b87ffb88bcc0ba4a65dddd3794dd29036091c022ee7db66b458b138d5d9765a7ca1824725eafc3a09647112ee66adc23cfc9813a2df6
-
SSDEEP
49152:qhzWW3Fl8/dWKd8UkK1JYBKfQotFjorCY1NK:OWW38nFYUhFjo
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
risepro
193.233.132.62:50500
193.233.132.62
Extracted
redline
LiveTraffic
20.218.68.91:7690
Extracted
redline
@oleh_psp
185.172.128.33:8970
Extracted
lumma
https://triangleseasonbenchwj.shop/api
https://secretionsuitcasenioise.shop/api
https://mealroomrallpassiveer.shop/api
https://modestessayevenmilwek.shop/api
https://culturesketchfinanciall.shop/api
https://sofahuntingslidedine.shop/api
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/1368-473-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba behavioral2/memory/1368-573-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba behavioral2/memory/5648-766-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba behavioral2/memory/5648-848-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba behavioral2/memory/5648-881-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba behavioral2/memory/5648-931-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba behavioral2/memory/5420-1020-0x0000000000400000-0x00000000026BC000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/files/0x0007000000023227-288.dat family_redline behavioral2/memory/5876-565-0x0000000000400000-0x0000000000450000-memory.dmp family_redline behavioral2/files/0x000a000000023252-666.dat family_redline behavioral2/files/0x000a000000023252-676.dat family_redline behavioral2/files/0x000a000000023252-677.dat family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ladas.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 54 5496 rundll32.exe 96 1372 rundll32.exe -
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral2/files/0x000700000002322e-467.dat dave behavioral2/files/0x000700000002322e-488.dat dave -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1640 netsh.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ladas.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation newsun.exe -
Executes dropped EXE 30 IoCs
pid Process 4988 explorgu.exe 4436 dotu.exe 3224 ladas.exe 5440 newsun.exe 3284 lumma123142124.exe 1368 4767d2e713f2021e8fe856e3ea638b58.exe 4956 InstallSetup8.exe 1708 daisy123.exe 4016 lolololoMRK123.exe 716 FATTHER.exe 4636 DigitalCloud.exe 3120 Sibuia.exe 1656 nsk5189.tmp 3340 qemu-ga.exe 224 win.exe 436 jokerpos.exe 4060 goldpromedffdg.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 6104 alexlll.exe 5540 STAR.exe 2392 olehpsp.exe 4516 InstallSetup3.exe 640 nsuB4E7.tmp 1256 juditttt.exe 4496 stub.exe 3632 newsun.exe 5420 csrss.exe 5564 injector.exe 3036 windefender.exe 836 windefender.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Wine tmp.exe Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Wine ladas.exe -
Loads dropped DLL 48 IoCs
pid Process 4384 rundll32.exe 5496 rundll32.exe 4956 InstallSetup8.exe 4636 DigitalCloud.exe 4956 InstallSetup8.exe 3120 Sibuia.exe 3120 Sibuia.exe 1372 rundll32.exe 4956 InstallSetup8.exe 1656 nsk5189.tmp 1656 nsk5189.tmp 4956 InstallSetup8.exe 4956 InstallSetup8.exe 4516 InstallSetup3.exe 4516 InstallSetup3.exe 4516 InstallSetup3.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe 4496 stub.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dotu.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000674001\\dotu.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ladas.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000688001\\ladas.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 5312 tmp.exe 4988 explorgu.exe 4436 dotu.exe 3224 ladas.exe 4436 dotu.exe 4436 dotu.exe 4436 dotu.exe 4436 dotu.exe 4436 dotu.exe 4436 dotu.exe 4436 dotu.exe 4436 dotu.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3284 set thread context of 4856 3284 lumma123142124.exe 114 PID 4016 set thread context of 1228 4016 lolololoMRK123.exe 117 PID 1708 set thread context of 5004 1708 daisy123.exe 119 PID 436 set thread context of 764 436 jokerpos.exe 133 PID 4060 set thread context of 5876 4060 goldpromedffdg.exe 139 PID 6104 set thread context of 2612 6104 alexlll.exe 146 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job tmp.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5140 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4768 4856 WerFault.exe 114 1864 1368 WerFault.exe 109 5172 1656 WerFault.exe 126 5140 1228 WerFault.exe 117 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsk5189.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsk5189.tmp -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2224 schtasks.exe 5740 schtasks.exe 4764 schtasks.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4196 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3124 tasklist.exe 4308 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 4767d2e713f2021e8fe856e3ea638b58.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5312 tmp.exe 5312 tmp.exe 4988 explorgu.exe 4988 explorgu.exe 5496 rundll32.exe 5496 rundll32.exe 5496 rundll32.exe 5496 rundll32.exe 5496 rundll32.exe 5496 rundll32.exe 3224 ladas.exe 3224 ladas.exe 5496 rundll32.exe 5496 rundll32.exe 5496 rundll32.exe 5496 rundll32.exe 3156 powershell.exe 3156 powershell.exe 5004 RegAsm.exe 5004 RegAsm.exe 5800 powershell.exe 5800 powershell.exe 5800 powershell.exe 1368 4767d2e713f2021e8fe856e3ea638b58.exe 1368 4767d2e713f2021e8fe856e3ea638b58.exe 1656 nsk5189.tmp 1656 nsk5189.tmp 5540 STAR.exe 5540 STAR.exe 716 cmd.exe 716 cmd.exe 5876 RegAsm.exe 5876 RegAsm.exe 4612 powershell.exe 4612 powershell.exe 4612 powershell.exe 716 cmd.exe 716 cmd.exe 716 cmd.exe 716 cmd.exe 1656 nsk5189.tmp 1656 nsk5189.tmp 5876 RegAsm.exe 5876 RegAsm.exe 5876 RegAsm.exe 5876 RegAsm.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 5648 4767d2e713f2021e8fe856e3ea638b58.exe 4576 powershell.exe 4576 powershell.exe 4576 powershell.exe 2392 olehpsp.exe 2392 olehpsp.exe 2392 olehpsp.exe 2392 olehpsp.exe 2392 olehpsp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3156 powershell.exe Token: SeDebugPrivilege 5004 RegAsm.exe Token: SeDebugPrivilege 5800 powershell.exe Token: SeDebugPrivilege 1368 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeImpersonatePrivilege 1368 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeDebugPrivilege 5540 STAR.exe Token: SeDebugPrivilege 716 cmd.exe Token: SeDebugPrivilege 5876 RegAsm.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeDebugPrivilege 4576 powershell.exe Token: SeDebugPrivilege 2392 olehpsp.exe Token: SeDebugPrivilege 4808 powershell.exe Token: SeDebugPrivilege 2612 RegAsm.exe Token: SeIncreaseQuotaPrivilege 4196 WMIC.exe Token: SeSecurityPrivilege 4196 WMIC.exe Token: SeTakeOwnershipPrivilege 4196 WMIC.exe Token: SeLoadDriverPrivilege 4196 WMIC.exe Token: SeSystemProfilePrivilege 4196 WMIC.exe Token: SeSystemtimePrivilege 4196 WMIC.exe Token: SeProfSingleProcessPrivilege 4196 WMIC.exe Token: SeIncBasePriorityPrivilege 4196 WMIC.exe Token: SeCreatePagefilePrivilege 4196 WMIC.exe Token: SeBackupPrivilege 4196 WMIC.exe Token: SeRestorePrivilege 4196 WMIC.exe Token: SeShutdownPrivilege 4196 WMIC.exe Token: SeDebugPrivilege 4196 WMIC.exe Token: SeSystemEnvironmentPrivilege 4196 WMIC.exe Token: SeRemoteShutdownPrivilege 4196 WMIC.exe Token: SeUndockPrivilege 4196 WMIC.exe Token: SeManageVolumePrivilege 4196 WMIC.exe Token: 33 4196 WMIC.exe Token: 34 4196 WMIC.exe Token: 35 4196 WMIC.exe Token: 36 4196 WMIC.exe Token: SeIncreaseQuotaPrivilege 1608 WMIC.exe Token: SeSecurityPrivilege 1608 WMIC.exe Token: SeTakeOwnershipPrivilege 1608 WMIC.exe Token: SeLoadDriverPrivilege 1608 WMIC.exe Token: SeSystemProfilePrivilege 1608 WMIC.exe Token: SeSystemtimePrivilege 1608 WMIC.exe Token: SeProfSingleProcessPrivilege 1608 WMIC.exe Token: SeIncBasePriorityPrivilege 1608 WMIC.exe Token: SeCreatePagefilePrivilege 1608 WMIC.exe Token: SeBackupPrivilege 1608 WMIC.exe Token: SeRestorePrivilege 1608 WMIC.exe Token: SeShutdownPrivilege 1608 WMIC.exe Token: SeDebugPrivilege 1608 WMIC.exe Token: SeSystemEnvironmentPrivilege 1608 WMIC.exe Token: SeRemoteShutdownPrivilege 1608 WMIC.exe Token: SeUndockPrivilege 1608 WMIC.exe Token: SeManageVolumePrivilege 1608 WMIC.exe Token: 33 1608 WMIC.exe Token: 34 1608 WMIC.exe Token: 35 1608 WMIC.exe Token: 36 1608 WMIC.exe Token: SeDebugPrivilege 3124 tasklist.exe Token: SeIncreaseQuotaPrivilege 1608 WMIC.exe Token: SeSecurityPrivilege 1608 WMIC.exe Token: SeTakeOwnershipPrivilege 1608 WMIC.exe Token: SeLoadDriverPrivilege 1608 WMIC.exe Token: SeSystemProfilePrivilege 1608 WMIC.exe Token: SeSystemtimePrivilege 1608 WMIC.exe Token: SeProfSingleProcessPrivilege 1608 WMIC.exe Token: SeIncBasePriorityPrivilege 1608 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 dotu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4436 4988 explorgu.exe 96 PID 4988 wrote to memory of 4436 4988 explorgu.exe 96 PID 4988 wrote to memory of 4436 4988 explorgu.exe 96 PID 4988 wrote to memory of 4384 4988 explorgu.exe 97 PID 4988 wrote to memory of 4384 4988 explorgu.exe 97 PID 4988 wrote to memory of 4384 4988 explorgu.exe 97 PID 4384 wrote to memory of 5496 4384 rundll32.exe 98 PID 4384 wrote to memory of 5496 4384 rundll32.exe 98 PID 5496 wrote to memory of 6036 5496 rundll32.exe 99 PID 5496 wrote to memory of 6036 5496 rundll32.exe 99 PID 4988 wrote to memory of 3224 4988 explorgu.exe 101 PID 4988 wrote to memory of 3224 4988 explorgu.exe 101 PID 4988 wrote to memory of 3224 4988 explorgu.exe 101 PID 5496 wrote to memory of 3156 5496 rundll32.exe 102 PID 5496 wrote to memory of 3156 5496 rundll32.exe 102 PID 4988 wrote to memory of 5440 4988 explorgu.exe 104 PID 4988 wrote to memory of 5440 4988 explorgu.exe 104 PID 4988 wrote to memory of 5440 4988 explorgu.exe 104 PID 5440 wrote to memory of 2224 5440 newsun.exe 105 PID 5440 wrote to memory of 2224 5440 newsun.exe 105 PID 5440 wrote to memory of 2224 5440 newsun.exe 105 PID 4988 wrote to memory of 3284 4988 explorgu.exe 108 PID 4988 wrote to memory of 3284 4988 explorgu.exe 108 PID 4988 wrote to memory of 3284 4988 explorgu.exe 108 PID 5440 wrote to memory of 1368 5440 newsun.exe 109 PID 5440 wrote to memory of 1368 5440 newsun.exe 109 PID 5440 wrote to memory of 1368 5440 newsun.exe 109 PID 5440 wrote to memory of 4956 5440 newsun.exe 110 PID 5440 wrote to memory of 4956 5440 newsun.exe 110 PID 5440 wrote to memory of 4956 5440 newsun.exe 110 PID 3284 wrote to memory of 4992 3284 lumma123142124.exe 111 PID 3284 wrote to memory of 4992 3284 lumma123142124.exe 111 PID 3284 wrote to memory of 4992 3284 lumma123142124.exe 111 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 4988 wrote to memory of 1708 4988 explorgu.exe 112 PID 4988 wrote to memory of 1708 4988 explorgu.exe 112 PID 4988 wrote to memory of 1708 4988 explorgu.exe 112 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 3284 wrote to memory of 4856 3284 lumma123142124.exe 114 PID 4988 wrote to memory of 4016 4988 explorgu.exe 115 PID 4988 wrote to memory of 4016 4988 explorgu.exe 115 PID 4988 wrote to memory of 4016 4988 explorgu.exe 115 PID 4016 wrote to memory of 868 4016 lolololoMRK123.exe 116 PID 4016 wrote to memory of 868 4016 lolololoMRK123.exe 116 PID 4016 wrote to memory of 868 4016 lolololoMRK123.exe 116 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4016 wrote to memory of 1228 4016 lolololoMRK123.exe 117 PID 4988 wrote to memory of 716 4988 explorgu.exe 118 PID 4988 wrote to memory of 716 4988 explorgu.exe 118 PID 4988 wrote to memory of 716 4988 explorgu.exe 118 PID 1708 wrote to memory of 5004 1708 daisy123.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5312
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\1000674001\dotu.exe"C:\Users\Admin\AppData\Local\Temp\1000674001\dotu.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5496 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:6036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\999976163400_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000688001\ladas.exe"C:\Users\Admin\AppData\Local\Temp\1000688001\ladas.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\1000752001\newsun.exe"C:\Users\Admin\AppData\Local\Temp\1000752001\newsun.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN newsun.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000752001\newsun.exe" /F3⤵
- Creates scheduled task(s)
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\1000137001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000137001\4767d2e713f2021e8fe856e3ea638b58.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\1000137001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000137001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4680
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1640
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:5420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2516
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5740
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:5564
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4764
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2928
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:5140
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 9004⤵
- Program crash
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000144001\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000144001\InstallSetup8.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\nsk5189.tmpC:\Users\Admin\AppData\Local\Temp\nsk5189.tmp4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 23325⤵
- Program crash
PID:5172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000146001\DigitalCloud.exe"C:\Users\Admin\AppData\Local\Temp\1000146001\DigitalCloud.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\DigitalCloud\Sibuia.exeC:\Users\Admin\AppData\Local\Temp\DigitalCloud\Sibuia.exe TRUE 1 04⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000753001\lumma123142124.exe"C:\Users\Admin\AppData\Local\Temp\1000753001\lumma123142124.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 8364⤵
- Program crash
PID:4768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000754001\daisy123.exe"C:\Users\Admin\AppData\Local\Temp\1000754001\daisy123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\1000752001\qemu-ga.exe"C:\Users\Admin\AppData\Local\Temp\1000752001\qemu-ga.exe"4⤵
- Executes dropped EXE
PID:3340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000755001\lolololoMRK123.exe"C:\Users\Admin\AppData\Local\Temp\1000755001\lolololoMRK123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 12804⤵
- Program crash
PID:5140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000756001\FATTHER.exe"C:\Users\Admin\AppData\Local\Temp\1000756001\FATTHER.exe"2⤵
- Executes dropped EXE
PID:716
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\1000757001\win.exe"C:\Users\Admin\AppData\Local\Temp\1000757001\win.exe"2⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\1000758001\jokerpos.exe"C:\Users\Admin\AppData\Local\Temp\1000758001\jokerpos.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000759001\goldpromedffdg.exe"C:\Users\Admin\AppData\Local\Temp\1000759001\goldpromedffdg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5876
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000760001\alexlll.exe"C:\Users\Admin\AppData\Local\Temp\1000760001\alexlll.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe"C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5900
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000763001\InstallSetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000763001\InstallSetup3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\nsuB4E7.tmpC:\Users\Admin\AppData\Local\Temp\nsuB4E7.tmp3⤵
- Executes dropped EXE
PID:640
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000761001\juditttt.exe"C:\Users\Admin\AppData\Local\Temp\1000761001\juditttt.exe"2⤵
- Executes dropped EXE
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\onefile_1256_133535920207847820\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000761001\juditttt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4496 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:5012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:4640
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"4⤵PID:4492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:716 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:2788
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"4⤵PID:2504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1640
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer5⤵PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:5724
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:4308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:1080
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:2916
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4856 -ip 48561⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1368 -ip 13681⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1656 -ip 16561⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1228 -ip 12281⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\1000752001\newsun.exeC:\Users\Admin\AppData\Local\Temp\1000752001\newsun.exe1⤵
- Executes dropped EXE
PID:3632
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
192KB
MD53034aefffccf930e8cb12578cbd21d63
SHA159005a981ad09abf45a6b0445d1cf6bd3d68b07d
SHA256e479913f262e8f78c3cc2d681fc5572ec618e864c1c12859c5b481dd4c8600c9
SHA51297dbac6b284851241e0b12f502b4c7b164b91cc2485cb51549d2d7022cc4c9079bcac6452568d5c70e1bfe5ac650558c49231308e74209b443673778d756458d
-
Filesize
128KB
MD5a47c9a22d04f7a89ffb338ec0d9163f2
SHA1c779b4e0bd380889d053a5a2e64fac7e5c9f0d85
SHA256c67b8f01d1b007cf0abea4f89d1272a146116b398d97c0873889e4f3bc1aa2a5
SHA51264ebbee2f2f0884096e5b0996b30adae289549ba24f19fb3858f638148f358cd9a6f2fb370c0b2a44e821cb00b5a49468f849c97e9aa8ee413bbae11b57d72f4
-
Filesize
384KB
MD5eb335c567613806902e65e3d6934d6b9
SHA16c11ba841c86b3002b4b3c2a31ebab74649ed56e
SHA2564c57c52bb021ddbf70d5b7c71dc734f10120682cb77fe2bae0062ceba16a95a5
SHA512fd6cb2b418ee03fe4735b636a71aaa91ff975011920ac9106784b791a576a2629da4981ebe77d1c20e9f6b4f767be9605c0ebced70ddb5647d2c1af405f006dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5eaaca525ae92e3c833dcc8b6ef4cccc9
SHA1e6fae036ecb8e932bfb5ecf0cb931f602066ad9c
SHA2563ce5e1ef4c868acde6cb8ea1fca7a34b94e20b196d2c28cf9e042afc3371af25
SHA51240c138e997886f2ff6fc0ee1adb70016567d332305ee677b94a51f20e547c72722e1293a8ad5e5335a5c021294ee90bbe0e8964dc71cbba7c028e3a2f5454a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5fbed27ce5ece1b7819af0fcc9eea9426
SHA1a041ab7c297ac306a4a71fe1d8d6b1de63db9e1c
SHA2565f477f1e3d97f832d4a1632c5bef907084f28ecddb9a357df9ccde3e1650f7b6
SHA512dd5e97678302c770ad97ac3475ec8ee24d71b0073044c81d0c52d6b11ef2be5575201232a689601093adcf897d8426983eb7488864ad2ffdb5c9cb26f409407b
-
Filesize
2KB
MD51dfbfa155719f83b510b162d53402188
SHA15b77bb156fff78643da4c559ca920f760075906c
SHA256b6b12acf9eb1f290b6572cead9166cca3e2714e78058bef0b8b27c93e11f6831
SHA512be0c4d568988494bdc5b94b455215ec0b6f5c00327c481d25bc8aeef683ca150f011c76f8978b4869608387a0a8b3b803f471511897443e574a8e3bd5f9b38ad
-
Filesize
1.8MB
MD56ca0c1cf2afc7153337499fbc434df39
SHA14c2f093a92aef65477dae6ad6722197c54e4f971
SHA25698572cef96ffed5e1d1c4a472b3570acb08e17cd2c7d2fbc3063203e23cade36
SHA5124e82311a0fd3c00fc1c9b87ffb88bcc0ba4a65dddd3794dd29036091c022ee7db66b458b138d5d9765a7ca1824725eafc3a09647112ee66adc23cfc9813a2df6
-
Filesize
4.1MB
MD53fc896849fadaca0b4bffbd8895cba00
SHA128dac2845fbc7f3e2cc72b9218c4060e90bb32f7
SHA2569d7ac8ba87ad0cfafdaa97466dd15cf9bcc11d2f1f4379c519da84cab3b0a30a
SHA512d8937cb1f47c852a88c5da48434b892f68aa2ce9d0c1012fd73296c714fcb9419b0dcd76dc88acafceed1f1968528a84bca835ee9c38456e2a71169cc82903c1
-
Filesize
1.2MB
MD5d5810526f6dc9bfb7bf2d0ff3d2bb66b
SHA123dc1bc374c06b6360d72df2db79035b79f3e7af
SHA256657c612f14b5217b7ff7f907d731a69f96ed9da931417c20c403f43872ce899b
SHA512a578c02dbc4e7d542cc9c6811ea7725dac7c8f4ea03f5adc42aabddd317d11d90caa3fced78363c7a6dddc21ad45d3096ec353fe054c63deb63682c4f7175574
-
Filesize
1.9MB
MD50dc27cfc0b3eae2d0df9e5d6edb047ab
SHA17657c221418d68e512351a308f3a501ceae5489b
SHA256b0e7a83f5b8b265f6db5dedd0d8d9f758851a6e40978b3c52cceed502d78ded3
SHA512162e4c04805b22a9d138938ca1539217dbddafd064752a2cca1fcaa76050845b7109197cc6ad4e895622835f679ed7c733f10f5df34f5191262c28b26162bde1
-
Filesize
2.8MB
MD533ea730852b312a9ebc8231da0c00bc4
SHA10cfae2c0ddbe32555460c069802d0728e8d86f05
SHA256473b1735545d4edcc6345601983ad2f44b2a3457aeacafbac2bf1c1c236020a0
SHA5124fe3929abbe4b99cb569d35b2b7b4cb0375705696ff8930e10a19e5499f07d27b6c92627b123813b471f76c64733fe228d52cfea5fa32bcb7dbc7c73bab6ca86
-
Filesize
336KB
MD5b224fa7fcc29513183f3ac51a576b09e
SHA14f849d86854ab0c19a4e9900f98f3287d4ff8525
SHA256e5be6b01b31232f0ec0059be780fd0c20cea2d8e0450c9ed30dbe8e5b789d21a
SHA512f7949cf3235adc7b74a8c36493b7dd4f542faaf552d190a2f2c42364f136f9e0f674ca924afe5249f68165e2bd0cd9ad2b540ced7258e6a533cb5005a733b4b6
-
Filesize
1.9MB
MD58b88b93648f03416481ba81733ee85f9
SHA19b6717066ff1e1b1e4121f119f829e042a607269
SHA25691c0f259a4608dacfddfc63fe3bcac10a05ad6cfd1e4a10798c9269159c69e05
SHA512188e644f8cbead48e5adfb55f17bea869d2300006f835cc5e877d6f21eb984009eaca94100cc130962ff8ebbadf1f057b6c9a48c19df1ae862a20eaa0bdce22c
-
Filesize
2.0MB
MD5fdb6bbbbf224280c16a529d87a7026bc
SHA1e7562e45c90a55371d3de957d4ce90b08bcbd92d
SHA2565f89e56165622bf3a130eac3b24cccfa0a9296844033dbf04e1238cccbfe6895
SHA512c1b26cf5e5091b8f900cb9c896a0d172a5ab6c31d2e1df4d3c1bd7f8a3868db24e45dbd886684054cd3b7960a43333e9fae44f7596e05fcc4f7d1c5f122b16bb
-
Filesize
1.4MB
MD5129af4c56d99a2051dd233a2a38d3bc5
SHA1fca719772098fa61bba6cfee32eb2e0150c57caa
SHA2563a752dbcd07b7f79823ef4a2b3f7e1671b9017b501aaf2218e9f30f9ac10f56f
SHA5128597a31b54171d43a6890496c735ea61587a832f277d4f73d30a5b7b6a15e625d0e3302fe6a196ccdd51633f86031ab4bf414d05d899662f147180d729c18e95
-
Filesize
2.9MB
MD56dc4557d7f14a761f530da8d78683743
SHA101bd258fa5fdce59139f4e019ad8f2609fc30583
SHA256694e20ae0b66d27a7cf49c6130414588e12d8c58762db3327ae57d4560206c7f
SHA512b7632013a8c0accec504c791b9929226e063b0d347603043564b2793ef7f1a171bc0f89a3967d5707182562611d0f555278df130f3942096f35f794fb15642a3
-
Filesize
2.2MB
MD5dcd56a3fc551003f2a2ac5a5c30a085c
SHA10614eb0dd09c240856719cf47e2816ffe1f4a027
SHA256652486ee0b98df0e22d02334a8e3a794333b1e5439b172134fe273de501b46a9
SHA512afc7259a99fc06a5fe3e842034d720bff6f3b285d24ba1643d2a30353a2ac97cae756f51344ddf4709810e27f85c0e24dfbd68a1f1c9b1b387ed42503a1cd218
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
600KB
MD5cad41f50c144c92747eee506f5c69a05
SHA1f08fd5ec92fd22ba613776199182b3b1edb4f7b2
SHA2561ac5eed2f7fc98b3d247240faa30f221f5692b15ea5b5c1eba3390709cb025c6
SHA51264b89f3a3b667cd81f33985db9c76ffd0bb716ce8ed93f97c24d3c20e7236d91d02af9371a26d41f55b564702bd1f6fd7489055868fcd1610c04beb79ae8c045
-
Filesize
729KB
MD51338b7ca5a623cd47c66cf7206c03032
SHA19ce813616c42f78a4ab1abd7f9ae80844572c5f7
SHA256b763ff181cebb4524a148d2689b39f4744fbf0237ae7c18cd4085f3fead3bd8e
SHA512990f171c4c31cf1b33304eb08c3fa6ef3827890c71cfc452ec223050d27a0f8a2670fae0cc0f346eb4b3ba603da18d707a5045ccfe15903ba6ced9836a94af73
-
Filesize
698KB
MD5bf2a3e48b0ea897e1cb01f8e2d37a995
SHA14e7cd01f8126099d550e126ff1c44b9f60f79b70
SHA256207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
SHA51278769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
Filesize
297KB
MD5597fc72a02489d489b93530de2c30bb1
SHA16bfe1f53affe68aa157c314cb77e055ffd982e92
SHA2563c2b9fe3c1738e99588a5abf9373ce717aceaa02ef1895d55e998770af8d3e98
SHA51292a209617d8479201869faa2d19dca8253b6d7b3db23fb253c192d8ea05203e97e3449fe452896120a6790c04ee37c3d024a8d6a1ae979f848ff533b293a45b0
-
Filesize
704KB
MD537161002b50b2ee914bac444b7a7a002
SHA150be5a55acd47083e49fc5e0beefac96ac8229d6
SHA256eae92e952947861125b4d11f2b2f64a86fe0b153273211cb8d4153cdaeb04d65
SHA512ccbf3d32354075c9c65d88f793410a310f0b3860a83bda1a9929b9aefe160ba920e93a73bca51186da9bfaf5a45da8ae000f10517f3e82a1d8acb48bb677b105
-
Filesize
4.3MB
MD5a263a25d204194fa5e17f07330b9a411
SHA1a1d4f97dd06f2e3bb343a564601a6055e12ebcec
SHA256faea4ccd802391bf9a6d71bc6052f269b6ca370c124bfe4d2faae55b43a5c0c8
SHA512003d70099729511e04ca0104a5315aba1495112bcdd64e3f07d2286a9f0e61b1fa6a8ca78d296220bd835b9c2a741813fa5a57dc9f86650492dc3b228d6e3ac5
-
Filesize
171KB
MD50b497342a00fced5eb28c7bfc990d02e
SHA14bd969abbb7eab99364a3322ce23da5a5769e28b
SHA2566431a7a099dd778ec7e9c8152db98624b23ed02a237c2fe0920d53424752316a
SHA512eefeec1139d1bfd3c4c5619a38ffa2c73d71c19ac4a1d2553efb272245ca0d764c306a8cb44d16186d69a49fd2bf84b8cc2e32ea1ce738923e4c30230ff96207
-
Filesize
319KB
MD50e0225b03f164fc9cb9689a284a5c785
SHA163fc22c1797f3b7e0f71e411344ce4c878f2a530
SHA25688dc09b808718d7f9f1d32246c5a1db18effa7886f4bf8866ea18dd1cad9835b
SHA5125ba8d2ad81cee6b83a0e0a60a60ada2c9c6d6b678ea64f3fe866b6e72ea2909ea0e6505e0f365aaa70261449ce41cd7a9b555574df1672e58f9184dfc0c9c6e3
-
Filesize
1.7MB
MD5d550f7af8296cf004b87d8ece24c2171
SHA1b258a942b3a42a835e2700ff71a029780925fd9e
SHA256397d0aea963695568907d589778f5bb0a61da217f44763e4bffef61acc9702a2
SHA512eb437adba1bd551ad1a925f345bb3dde451f49c000e910c15ef9e4bd3030407ef94658a6d0afb38d04f9a942710f0f8e2c3fbc8e2e7829de2a8522c35d0b6f3f
-
Filesize
1.1MB
MD5ec6d7502b09e0fc9cdbca664d3b6ec02
SHA16338d1ba7116adbdf7ba40039928ad14d9b7551c
SHA25601145e8a7ce137259c274f13cfc046311b3211c498da3e97bd7c57e3c5092476
SHA5125d44d10a309f94085a0862c855b7f98e749e5012b6b0f1a60afe1d1a0b981804f09e2b69d7805d3afb30014a3fdad41b564c5b55a32402b60b0f046d9098acb3
-
Filesize
1.1MB
MD566fdf13df63d9875b1d598a4246d877e
SHA1c03b5d4b5e96745a00b1ccfe7b504a2df6ddc409
SHA2566c6958982307387d2bee43a5013362c1b6b0b1a7be89624a8f44528b5e2e6e10
SHA512033f246d37391167fdcf4005e5821a49b19af9d9f511d61977fc7affbef80473a1446bcc82b1a0d544b7fc59a4af325fadad3a01476709c64e1a4edbdf670d96
-
Filesize
336KB
MD5b79e1fa6170da5160c226a7aae22f645
SHA159f765fda09564fd05338db5a155e8cabe6c3fc7
SHA256db0ade974e4f59ad52259eae418fb3aac4b37272f6e0a0178723d4ae3196c3a6
SHA51233574cb90dfe80100ed7058f3d6c179b77889d374276f821341034282a85fd7079cabc7430bb7a93406371707fc06fcbf32c70d6a5473dd75cdb8bd8e353c79f
-
Filesize
67KB
MD51bf7c4cb7a0df5689d66f893bb2ad0b3
SHA17e97ddb9a16e8caf76f178e0bbc9844e8bb0aef9
SHA256de2d26c46e15dc74853bdff957b60e3969c7611e3d0984ee9e9e69263a22d1ea
SHA5121702395a2664667684a9d383536baf6ca5f3a56e25a38a0109cf0f5a0e083d698191460a20b64f1c429522526289ac07c3e1980c140ab6204f59dfd627b78471
-
Filesize
1.2MB
MD59a78f01e739b9aec2da80e685798d496
SHA1c683a4f81ee1090ee1962fc22d108d368ae5bb53
SHA25622d8ee608bb727ed25cdf16440a92831d1bc2f732ba4ced9d45af31596f49a7c
SHA5123db5b7461d97d6fc4eccb8522349a4ded01188c3c60f191543b5c6672adf8c36a9acbf19fa14cb5728ea111a7c1caf2011750976eebccefaeacf2d5ff95a0814
-
Filesize
128KB
MD596ca994324c5364e2b23a34eefa203d4
SHA1b9a7126ad814a2e049472946378e824a914d9123
SHA256ccbee67daa6ebbbb8a91efa371834bace519cd5cb239e0b79a32d76187390f1b
SHA5124395068accd4b9f2e5ead16a42e3e5f5cb3e5c0a656766d63bc7509bc3c3a233c0c43a971399e9210988b0ca0bee97cfb0d762c8d6ba24f39de1b7d6f8a0815c
-
Filesize
2KB
MD54905373bd00e02db3a182273bbee0cea
SHA1aca658dddbeabaee909233bb54cbf792a7a6df4a
SHA256024eddc536f9ac44de4a61e1a20de8ef4a128d64cfe970e20da69f16853b1bc8
SHA512ab7746fef7a4b0c9105fa308f0fea0b87906e4a48637da781c6df94339d2d20a65c347ee371ee43b07dce8c11f4dbea9de9323619381a2d7d38550559d284f94
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
191KB
MD56a595f0df4394bb2f9ee382b9565fce3
SHA1fa6c07057d5e15dc8c99ccb09f0cbaf2ae2e10d3
SHA256ee6d73855105c60965b64ea1ea98123ca249462bd858ef9ad942603dc0cfe849
SHA5127c361b7e6630eb33f6ffb1e7592455abab044af8407df911a5bea230ee2aae0abeadc28a436c9cb33fade6f07a2d81ae29af28caf991eaf6f171f697138b7998
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
228KB
MD500bcea5bc71d180324dc63d527553fa6
SHA15d71a430f7f1411a278e47f4bbebe66fa9c6e985
SHA256c71904c21ada8b0d3293070a74103d0cefcebfb2e016569aa13458bbb4113d18
SHA512693f343befa93a2089b3774a300586c97689683f300e7dfaa211163878d2bca5aaeeced694e79b57f465dd924fb15341ee85f2e4fb992a107973fe2a6db8b142
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
320KB
MD5683d88abad61152c90d72efc89dcb975
SHA1bc50e09043590bf3e80efa6c6140ddf994d5a398
SHA25694b9fdeaa935132d505d193cc8018920c4de78deaefb4d48eb090bf199620c27
SHA512132b6641e533f1d92f67c757fd4ee7477a4e87f0e223256369456ffb67a324db0b5e305de2c540067b5f26e604af40b10688b6d6914bb42e0b272b1d53061475
-
Filesize
570KB
MD5ea037914e6f1aa6a8ad565407158d49b
SHA15fbbd923c0bbcf33fafca5a0ed847c19478856e5
SHA2569deee2315490381305b70eeaff5805df00d10feb9d9f78fbce33b3cd5795ed73
SHA512369943b3ac01a8c89c7d163391e60c2a4f9f616ade5161df8a67e75c490ff4a70b37d4b617675518c924d2fbc07605a37d4f76166da9becefcb4bd5052a69e55
-
Filesize
296KB
MD58279f809e29bd79218d79f4b8f02039f
SHA12112625658098e14bacee7a7cc8156350f51a293
SHA2564d4f6211fb491eb9ea6009db1053657d9b4fd7cbae4d8513bb7b9e228683d696
SHA512f359e47827fc741c9f15f5146476f63795370a3458da9be34a874ca8c021bfa4dfdc13786b7f6cc360bbbe82998f7467f1bd38f86bdcf0661233a8821b41f61f
-
Filesize
128KB
MD5aa8ff38a58371da8ad74caba11c6fc4c
SHA17b4c8fad8065906a7cff464a9376476237a9cf00
SHA25644baf7096cb9b0537099eed4709ee756ba1f6d119ebbe4e2a321d3f762139223
SHA5122af9a56a18a8f5bd7c374f585bf73505abe200810ff2f8c7298a34f7869b387302b2190467d8f430f1df1bc53bea70207a6cc87df9bc2fe142eb40c1f8ca83a0
-
Filesize
57KB
MD52e7ba2ea4cb49f63a84a767b8f18bdda
SHA1ffc1c3ebde832a69ca32e0e1787d33ea303e2840
SHA256fe04a8d506c2590209ef0679641b1f8351329c0239d89819b31439e0b38f41e5
SHA5129ee18e927f967be46650b8256f9d0f3f5e1ad7c0351c6e4831c83495e1eca95755ac01db3b95880b299d05c8421746d91ccaa81578151017e791308edc0d2ca1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ec4704a67399e5c0d8fb7cb4a237ec60
SHA1fe6405d54db38e0c64aaee336d5ed757cb8434d4
SHA256ac8258e1261b13a075e4228c3fa92180ee0e7fc7f9c4513d64a3d05915be3c8f
SHA5129b559b1810c1b060aefa17b47bd2729d4afb8006ac9ad30bc4bb5f0359dbd12125aa123a444c20ba791df0bd725fad25cf0ee8e0ab7b74b982294cd77d49b1c0