Resubmissions
22/08/2024, 15:33
240822-sy6bqsvbng 710/03/2024, 16:21
240310-ttpc4aga89 1010/03/2024, 12:34
240310-prvpwacf93 10Analysis
-
max time kernel
123s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240226-en
General
-
Target
file.exe
-
Size
2.4MB
-
MD5
b11c3fad2e48022f58635df7368d6441
-
SHA1
63883fee892ac1e0d44f568913931c0d59b343d1
-
SHA256
2a362d6d3bceaf1159bc245499a778f1ab9c229c3cbd4be4c63a582a716a4c80
-
SHA512
6c68523b259c307e1c4ff4c6809fb20e5d9d9998a32d03ca06eaf29ec8f27bcaca2cafd9b57420b307160b3ebfeac16d234b99f6119f8f3038f4b5bf4b169023
-
SSDEEP
49152:jCqqfqaaK++EFUw2PsQMIZnLzn8FGaqxMBeVBBzKl:jONGXqGY1y
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
socks5systemz
http://bbkgiwq.com/search/?q=67e28dd86b5ea42a430af91a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a771ea771795af8e05c644db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608fff11c7eb949933
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/4488-126-0x0000000002D50000-0x000000000363B000-memory.dmp family_glupteba behavioral2/memory/4488-127-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4488-197-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4488-254-0x0000000002D50000-0x000000000363B000-memory.dmp family_glupteba behavioral2/memory/4708-256-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4488-257-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4708-315-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4708-404-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1364-434-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1364-481-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts 7M1vzKcmqz14mInY2i7DMkSN.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4516 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation D1D3.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PhLNEiMMkHhTuEAWa0tSdnqU.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tKC48c8ac1EBKI3opJ5mVqn8.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6rOswOLbM3ka3GTmOhcT01vT.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSVYxUE6I4G8At3DTo4PgsYG.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WTYgYgUjQAF6geJ0zGfUzKm8.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2HahSoNu44K8VcptuIjYkrA7.bat jsc.exe -
Executes dropped EXE 25 IoCs
pid Process 1752 gpWNVqLsEDtZirSl0AU2v7YV.exe 2864 Z1JYCcVn4hUQyrOX4S18vo6O.exe 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 5040 babyclock.exe 4488 vDTUm7FUB8B0uP3CNWmcvidM.exe 544 babyclock.exe 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 5008 syncUpd.exe 2220 BroomSetup.exe 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 1364 csrss.exe 2028 injector.exe 1940 windefender.exe 4876 windefender.exe 4840 7M1vzKcmqz14mInY2i7DMkSN.exe 3672 updater.exe 736 updater.exe 1132 D1D3.exe 2156 updater.exe 2060 D1D3.exe 2140 D1D3.exe 2376 updater.exe 404 D1D3.exe 4252 updater.exe 3348 updater.exe -
Loads dropped DLL 5 IoCs
pid Process 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 5008 syncUpd.exe 5008 syncUpd.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4528 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2220-151-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/files/0x0007000000023259-146.dat upx behavioral2/memory/2220-252-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/files/0x000b00000002328a-484.dat upx behavioral2/files/0x000b00000002328a-486.dat upx behavioral2/files/0x000b00000002328a-487.dat upx behavioral2/memory/1940-489-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" vDTUm7FUB8B0uP3CNWmcvidM.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\77ebaece-228d-4626-873d-85c1fcd89c02\\D1D3.exe\" --AutoStart" D1D3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 148 api.2ip.ua 149 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\MRT.exe 7M1vzKcmqz14mInY2i7DMkSN.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3104 set thread context of 1332 3104 file.exe 89 PID 3672 set thread context of 1352 3672 updater.exe 209 PID 3672 set thread context of 2296 3672 updater.exe 214 PID 736 set thread context of 3896 736 updater.exe 241 PID 1132 set thread context of 2060 1132 D1D3.exe 255 PID 2156 set thread context of 4692 2156 updater.exe 271 PID 2140 set thread context of 404 2140 D1D3.exe 280 PID 2376 set thread context of 3348 2376 updater.exe 339 PID 4252 set thread context of 4156 4252 updater.exe 332 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN vDTUm7FUB8B0uP3CNWmcvidM.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss vDTUm7FUB8B0uP3CNWmcvidM.exe File created C:\Windows\rss\csrss.exe vDTUm7FUB8B0uP3CNWmcvidM.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 45 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 712 sc.exe 1716 sc.exe 3868 sc.exe 3316 sc.exe 1944 sc.exe 608 sc.exe 4976 sc.exe 2376 sc.exe 1800 sc.exe 3680 sc.exe 4144 sc.exe 4408 sc.exe 4544 sc.exe 1084 sc.exe 2212 sc.exe 4428 sc.exe 3572 sc.exe 4048 sc.exe 4712 sc.exe 1996 sc.exe 884 sc.exe 2416 sc.exe 2280 sc.exe 3632 sc.exe 5044 sc.exe 2120 sc.exe 1252 sc.exe 1064 sc.exe 3436 sc.exe 1644 sc.exe 2400 sc.exe 2140 sc.exe 3364 sc.exe 1800 sc.exe 2280 sc.exe 736 sc.exe 1660 sc.exe 3604 sc.exe 2416 sc.exe 4512 sc.exe 3148 sc.exe 1736 sc.exe 2728 sc.exe 3348 sc.exe 956 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3576 404 WerFault.exe 280 432 5008 WerFault.exe 104 -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023251-104.dat nsis_installer_2 behavioral2/files/0x0007000000023251-107.dat nsis_installer_2 behavioral2/files/0x0007000000023251-108.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Z1JYCcVn4hUQyrOX4S18vo6O.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Z1JYCcVn4hUQyrOX4S18vo6O.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Z1JYCcVn4hUQyrOX4S18vo6O.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 syncUpd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString syncUpd.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3960 schtasks.exe 4180 schtasks.exe 3716 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" vDTUm7FUB8B0uP3CNWmcvidM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 2864 Z1JYCcVn4hUQyrOX4S18vo6O.exe 2864 Z1JYCcVn4hUQyrOX4S18vo6O.exe 3420 powershell.exe 3420 powershell.exe 3420 powershell.exe 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 5008 syncUpd.exe 5008 syncUpd.exe 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2864 Z1JYCcVn4hUQyrOX4S18vo6O.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1332 jsc.exe Token: SeDebugPrivilege 3420 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeDebugPrivilege 4488 vDTUm7FUB8B0uP3CNWmcvidM.exe Token: SeImpersonatePrivilege 4488 vDTUm7FUB8B0uP3CNWmcvidM.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeDebugPrivilege 4132 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeDebugPrivilege 4496 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeDebugPrivilege 3712 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeDebugPrivilege 2712 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeDebugPrivilege 2864 powershell.exe Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeShutdownPrivilege 3452 Process not Found Token: SeCreatePagefilePrivilege 3452 Process not Found Token: SeSystemEnvironmentPrivilege 1364 csrss.exe Token: SeSecurityPrivilege 1252 sc.exe Token: SeSecurityPrivilege 1252 sc.exe Token: SeDebugPrivilege 4124 powershell.exe Token: SeShutdownPrivilege 4784 powercfg.exe Token: SeCreatePagefilePrivilege 4784 powercfg.exe Token: SeShutdownPrivilege 4168 powercfg.exe Token: SeCreatePagefilePrivilege 4168 powercfg.exe Token: SeShutdownPrivilege 2928 powercfg.exe Token: SeCreatePagefilePrivilege 2928 powercfg.exe Token: SeShutdownPrivilege 4240 powercfg.exe Token: SeCreatePagefilePrivilege 4240 powercfg.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeShutdownPrivilege 5040 powercfg.exe Token: SeCreatePagefilePrivilege 5040 powercfg.exe Token: SeShutdownPrivilege 3632 powercfg.exe Token: SeCreatePagefilePrivilege 3632 powercfg.exe Token: SeShutdownPrivilege 3040 powercfg.exe Token: SeCreatePagefilePrivilege 3040 powercfg.exe Token: SeShutdownPrivilege 1108 powercfg.exe Token: SeCreatePagefilePrivilege 1108 powercfg.exe Token: SeLockMemoryPrivilege 2296 explorer.exe Token: SeDebugPrivilege 3676 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeShutdownPrivilege 4844 powercfg.exe Token: SeCreatePagefilePrivilege 4844 powercfg.exe Token: SeShutdownPrivilege 2388 powercfg.exe Token: SeCreatePagefilePrivilege 2388 powercfg.exe Token: SeShutdownPrivilege 5048 powercfg.exe Token: SeCreatePagefilePrivilege 5048 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 BroomSetup.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3452 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 1332 3104 file.exe 89 PID 3104 wrote to memory of 2464 3104 file.exe 90 PID 3104 wrote to memory of 2464 3104 file.exe 90 PID 3104 wrote to memory of 2464 3104 file.exe 90 PID 1332 wrote to memory of 1752 1332 jsc.exe 97 PID 1332 wrote to memory of 1752 1332 jsc.exe 97 PID 1332 wrote to memory of 1752 1332 jsc.exe 97 PID 1332 wrote to memory of 2864 1332 jsc.exe 141 PID 1332 wrote to memory of 2864 1332 jsc.exe 141 PID 1332 wrote to memory of 2864 1332 jsc.exe 141 PID 1752 wrote to memory of 5064 1752 gpWNVqLsEDtZirSl0AU2v7YV.exe 99 PID 1752 wrote to memory of 5064 1752 gpWNVqLsEDtZirSl0AU2v7YV.exe 99 PID 1752 wrote to memory of 5064 1752 gpWNVqLsEDtZirSl0AU2v7YV.exe 99 PID 5064 wrote to memory of 5040 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 100 PID 5064 wrote to memory of 5040 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 100 PID 5064 wrote to memory of 5040 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 100 PID 1332 wrote to memory of 4488 1332 jsc.exe 101 PID 1332 wrote to memory of 4488 1332 jsc.exe 101 PID 1332 wrote to memory of 4488 1332 jsc.exe 101 PID 5064 wrote to memory of 544 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 102 PID 5064 wrote to memory of 544 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 102 PID 5064 wrote to memory of 544 5064 gpWNVqLsEDtZirSl0AU2v7YV.tmp 102 PID 1332 wrote to memory of 1376 1332 jsc.exe 103 PID 1332 wrote to memory of 1376 1332 jsc.exe 103 PID 1332 wrote to memory of 1376 1332 jsc.exe 103 PID 1376 wrote to memory of 5008 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 104 PID 1376 wrote to memory of 5008 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 104 PID 1376 wrote to memory of 5008 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 104 PID 4488 wrote to memory of 3420 4488 vDTUm7FUB8B0uP3CNWmcvidM.exe 106 PID 4488 wrote to memory of 3420 4488 vDTUm7FUB8B0uP3CNWmcvidM.exe 106 PID 4488 wrote to memory of 3420 4488 vDTUm7FUB8B0uP3CNWmcvidM.exe 106 PID 1376 wrote to memory of 2220 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 108 PID 1376 wrote to memory of 2220 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 108 PID 1376 wrote to memory of 2220 1376 Opm5lGu8UrvwdUGjPjpOVyNv.exe 108 PID 2220 wrote to memory of 4804 2220 BroomSetup.exe 109 PID 2220 wrote to memory of 4804 2220 BroomSetup.exe 109 PID 2220 wrote to memory of 4804 2220 BroomSetup.exe 109 PID 4804 wrote to memory of 2604 4804 cmd.exe 111 PID 4804 wrote to memory of 2604 4804 cmd.exe 111 PID 4804 wrote to memory of 2604 4804 cmd.exe 111 PID 4804 wrote to memory of 3960 4804 cmd.exe 112 PID 4804 wrote to memory of 3960 4804 cmd.exe 112 PID 4804 wrote to memory of 3960 4804 cmd.exe 112 PID 4708 wrote to memory of 2156 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 120 PID 4708 wrote to memory of 2156 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 120 PID 4708 wrote to memory of 2156 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 120 PID 4708 wrote to memory of 316 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 144 PID 4708 wrote to memory of 316 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 144 PID 316 wrote to memory of 4516 316 cmd.exe 125 PID 316 wrote to memory of 4516 316 cmd.exe 125 PID 4708 wrote to memory of 4132 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 126 PID 4708 wrote to memory of 4132 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 126 PID 4708 wrote to memory of 4132 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 126 PID 4708 wrote to memory of 4496 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 129 PID 4708 wrote to memory of 4496 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 129 PID 4708 wrote to memory of 4496 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 129 PID 4708 wrote to memory of 1364 4708 vDTUm7FUB8B0uP3CNWmcvidM.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\Pictures\gpWNVqLsEDtZirSl0AU2v7YV.exe"C:\Users\Admin\Pictures\gpWNVqLsEDtZirSl0AU2v7YV.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\is-H67FP.tmp\gpWNVqLsEDtZirSl0AU2v7YV.tmp"C:\Users\Admin\AppData\Local\Temp\is-H67FP.tmp\gpWNVqLsEDtZirSl0AU2v7YV.tmp" /SL5="$80224,1697450,56832,C:\Users\Admin\Pictures\gpWNVqLsEDtZirSl0AU2v7YV.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\BABY-Clock\babyclock.exe"C:\Users\Admin\AppData\Local\BABY-Clock\babyclock.exe" -i5⤵
- Executes dropped EXE
PID:5040
-
-
C:\Users\Admin\AppData\Local\BABY-Clock\babyclock.exe"C:\Users\Admin\AppData\Local\BABY-Clock\babyclock.exe" -s5⤵
- Executes dropped EXE
PID:544
-
-
-
-
C:\Users\Admin\Pictures\Z1JYCcVn4hUQyrOX4S18vo6O.exe"C:\Users\Admin\Pictures\Z1JYCcVn4hUQyrOX4S18vo6O.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2864
-
-
C:\Users\Admin\Pictures\vDTUm7FUB8B0uP3CNWmcvidM.exe"C:\Users\Admin\Pictures\vDTUm7FUB8B0uP3CNWmcvidM.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Users\Admin\Pictures\vDTUm7FUB8B0uP3CNWmcvidM.exe"C:\Users\Admin\Pictures\vDTUm7FUB8B0uP3CNWmcvidM.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4516
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4180
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3716
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1296
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Opm5lGu8UrvwdUGjPjpOVyNv.exe"C:\Users\Admin\Pictures\Opm5lGu8UrvwdUGjPjpOVyNv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\syncUpd.exeC:\Users\Admin\AppData\Local\Temp\syncUpd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 19805⤵
- Program crash
PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:2604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:3960
-
-
-
-
-
C:\Users\Admin\Pictures\7M1vzKcmqz14mInY2i7DMkSN.exe"C:\Users\Admin\Pictures\7M1vzKcmqz14mInY2i7DMkSN.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
PID:4840 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2872
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:1036
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:884
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:1084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:2416
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:736
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:2212
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:1064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:2280
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:2464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F4C0.bat" "1⤵PID:2972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:316
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:2016
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4876
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3672 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:860
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:2520
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3148
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3436
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:712
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4428
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:736 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:5024
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2860
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:3632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:3364
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3572
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:4048
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:3248
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:3896
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Drops file in System32 directory
PID:1812
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:2156 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1504
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2604
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:5044
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4976
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:2376
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3604
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:1800
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:404
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:736
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:4840
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:1300
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:4692
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3240
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:2376 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4368
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:1532
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4144
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:3868
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:3316
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:876
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:2400
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:4844
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:2244
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:3348
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2624
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:4252 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2244
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3288
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:4408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:2728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:3348
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:956
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:2416
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:4784
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:2580
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:2036
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:468
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:4156
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4528
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵
- Executes dropped EXE
PID:3348 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Modifies data under HKEY_USERS
PID:1200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2300
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4132
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:4512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4544
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:1996
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3680
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:2400
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:3752
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:1464
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:2376
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:3524
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:4844
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵PID:2036
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵PID:4952
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵PID:3676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3524
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:1300
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1800
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:4712
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:2120
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:2352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:1404
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:3644
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:3236
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:432
-
-
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\D1D3.exeC:\Users\Admin\AppData\Local\Temp\D1D3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\D1D3.exeC:\Users\Admin\AppData\Local\Temp\D1D3.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2060 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\77ebaece-228d-4626-873d-85c1fcd89c02" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\D1D3.exe"C:\Users\Admin\AppData\Local\Temp\D1D3.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\D1D3.exe"C:\Users\Admin\AppData\Local\Temp\D1D3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 5685⤵
- Program crash
PID:3576
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 404 -ip 4041⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5008 -ip 50081⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
896KB
MD5d5fe9a3553446840b13d62e1daa88397
SHA1bc929fe74d513b2bae876d9e79d3a75109fee4b7
SHA25638a02cebf7de08c4b7b48787946c9f5472de414e448dc327cb5cde8e53089ce6
SHA51274557bda011325381cbcecbcfab3729136a4c4c7bc422166b98d2fb335cefc5e20e8abeb9ca08ffb6af04490fc61e227b293e069633846c900aa3106629e46ba
-
Filesize
1021KB
MD561965919ccccd2706dc53e9bc21a5cf0
SHA1467d626545775d322bc4ee08d3ab364852d861c0
SHA2560a25850954c3705de8881a435197e3131383fcfb6700c763a19f4a570e1c8689
SHA5124ebe48a5e866810610197e6b5c48394d070baf2d6744c16a265982827bf53567e44a1c2647412f8c307725ac15186573adbec266b04a8e1508fd7eeed6a7f006
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
756KB
MD54894248be8f817fdde511ed48af36cd6
SHA11f55e4f0d21ad8eb6b7112cf4ca39793e176bfa7
SHA256155c2571b6bfbaea62e8bff20c2fac49e9fa26fda397c9281fc3beacc1e7b4c8
SHA51202ebd8a1525a8e24068fbd55df42b3bd7aa7b82a40d9979921ba3eb8001602d83fa1155a3b79cc312a43bb884a780fb4f3dedf0db081a23a6234446033b94738
-
Filesize
425KB
MD51018d04aa5b9ab28c6b566a3911d03c3
SHA16dd5e523fe3c585c1f08c460264c5b984d70c526
SHA2567dd4c33ad831738f46808d093b04ddb4c86fe046132836d7fa0e56b768ffb24e
SHA512d73d3de7c4ef5228de0daf8496f61995d1b2530da0a275e4fcab4b8d5a8dbf714b51fada6bca3a5fd1d3a943ea1713ea3788cfde916156d224b47af59697f53e
-
Filesize
562KB
MD534d74c1b1ff2e73909b909cc2e0fc56a
SHA14fdf85cc9c312b9c360d6b8a313df933d63b3bff
SHA256f8f41920075ffce905661570dbdfacf950222b1ef42b23507d5b918392c7f1ae
SHA5122a5c5d98530fb2ae650b67b86b79b9d9ba11d2b5cf46befdb3da47b15eb05244e36c918daecef66962ec247de7a7afbcba51734ff11ae73900851e6bde8b089d
-
Filesize
49KB
MD5f7a43771d35245528ace167ead58694c
SHA19191995d6dc652f8819414ed5de897ccb2ff8639
SHA256a2966eb3ed293bbd18badfba9efa88b89dd94fedcc3c12c2aa290eb6fe9bdac7
SHA5129e86b5b101a94bc6c5a0fac57056f65faed63bef2a9f0784191fa3450278c56d18cf58fce5a9892a259ebb4ebff13c896091a4cf7c5c87b379efec6b6afed8cf
-
Filesize
700KB
MD5b5012ad3f7b79ece2bf795a53b69fd9e
SHA140cffd108e02bc172f9c632e6da0d6abe468846f
SHA2561e85da371e7d28623567725f04af71d792c7e3323f42fddd53500e691249002a
SHA512b7bfe32b5dae377b773d67e9cb7fde7e4052514cfd928252963babafa0234429a5a2c28dfd7ff38c3fcb9a728e742506f7b3c095a04cd950f1296a0e664878b5
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
690KB
MD5085aca27fe0b6d4c479500fb4a586129
SHA188e775fab99e3bc02e2bc44b0171b8a70cc5f9a3
SHA2566cdeb9602e2346ea8c4b86eaf32bf07dea3350a9fa4ae99f5c15fcde96055cb7
SHA512a7d37e57f1421a8b407204aad3089995dd2eb6fc03a37dbb0f2b8a3c387143f55e1e41c04059db265f330e96fd17d8d7c56bfc4398810b90b69cbe59e156339b
-
Filesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
Filesize
45KB
MD5053b8f0bb53fe770a35b5599c550c4de
SHA124b176a449404ed47bfc246098155cf32dc83200
SHA256986fd9c4d914de8a1cbcb065a40b5bf19d716c85c988ea7843bb47d0ee32e72e
SHA5126ec2e3ab8217c5af5e9710a66d6018dcc73f08a02e6346487214fdba6d0845568334167a8c30d1c2dfd1879fda9aad7496a4f8c8ad41fcdb1d29f7d0faae3432
-
Filesize
89KB
MD55816b3f4957405fc297a0e3414d77359
SHA1e7cca30aa003bec4423365450f40c0e0d3616d6e
SHA256d9ca43d97a2f641025212d66ea4a6c992827302068db4d01458a72343565cdad
SHA5122cfe0c9eef32641f7b2a7ee6769da3dafbc30a6aec03d56f3e12de86a3f224766cc515e9a811e3afc3b733bfe6bea9e14c2c67ea803e07e6297e15ee18adb75b
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
2.6MB
MD53d233051324a244029b80824692b2ad4
SHA1a053ebdacbd5db447c35df6c4c1686920593ef96
SHA256fbd467ce72bca00eea3aaa6f32abc8aca1a734030d082458e21e1fe91e6a8d84
SHA5127f19c6400ac46556a9441844242b1acb0b2f11a47f5d51f6d092406a8c759a6d78c578bb5b15035e7cd1cdb3035acf0db884708b0da1a83eb652a50a68e3a949
-
Filesize
353KB
MD5ec0cbe96f43217e5c9cb297c10b17c68
SHA1657aeba828a9750a959e74c937b16578dbfbb208
SHA256d016334e05c9b88a6a3194e62e73eabab20353a82620d62f88f49e42c2bee1de
SHA5120f97533aaf41065c28da3548079d58c0e8a7024869aa3e2f927fcddc66f86f8266eee9def7b31482deb0d0e62e679b072459beb64706831a97e555278a05f0d1
-
Filesize
200KB
MD5a81875729c0d6f002e9972f3f28c71df
SHA19c3f0f4f67b41d81eca7e4f5de411dbe261fe9fb
SHA256db76ac41869d36e69b6cdbfa707016282e7bc827dc39023908f650afef7addf8
SHA512f734e6ae033dfda2e6183a79e21d44f859f31d6537fbe9b540cf15574d70da645e122298d12261ff53ec175e0cfe45c40b75ce8aadc3615ee5adcd3db7f25b02
-
Filesize
195KB
MD57148e6802b488ceff9a2e77e43fe51db
SHA1c6c208409783d2d94b281000e79187485ff4e639
SHA25614cadf0083e5e4cb6125f6db36e98f503401f0d34ec9669ab2dbd3cbf31f87a2
SHA51221eb0723fe48de9dd3bb89743c2988bdf1df81613c2a4efeba88d14a47f218b8cab58dbdf8aaa6f63045b4e532e2c6e0b3f385f7d995f53b159e0a885a518099
-
Filesize
172KB
MD538783b735530ec3595f8cfc57704e0a4
SHA1297d2424423506702a6f42fff06b37a89a9fc8e6
SHA25695d772adaee04f58f13c59ab65bcbefe9d6d6b2fc9b0f5fb6b4304902c5b2a8d
SHA512980ff17ecdd36f1efbaced0b9599d4032eb4b27d5836c7d9d26828e478a75c73f4604bb568052aacc7519a54feb517efbf475e4d2610d8af6dbd4d6afb45fb4f
-
Filesize
426KB
MD5d380db973871790683175a1e6631e2e9
SHA1b404301220b56555d6df35ca8472d3bbf6fae4a4
SHA256c51621be70f2fb932e61e1df6af1b05def59f35a05bce5d0073222cbad34e8c8
SHA5125fa3179fd77c5185e5945fbf795fce17465701ee144c2f133bb146708c00adf1563e8e0a1fd3f2b52e56543cb33a4142c06b8f1abe91124da83cb1fb6337fc65
-
Filesize
289KB
MD52d3c0f35efc1db140065e395ac8aef89
SHA186539952efb43d7a45b4adcc20194d00a0b2c2f0
SHA256ba8bbe35eec02eeb3daa5ca14b1ac2a50fe1e3186b155ee3924a05137e757afb
SHA5129f33023c5260557123908758dafd8a4b5d21f8ddabe5aa15a5c5517cb0230fd19621a831fab8a3523b37ebc3c726cfc31bd478d9147eed082adb8ff081994571
-
Filesize
414KB
MD537c2355cc92d0d8bed94c3f39d77e244
SHA11652ce456b4e7f089974ca39e716d5df9fd471fd
SHA256dbd5dda8f9409207be28bc0c3630905096139d76b3cd177dd62755e88581944e
SHA5121fda8eeb7653b85e4573068299e2e0891a4bacc804538e1483c185d111ff8a7f53f10b9d8d1aae9b2db74e52c399891d4379607bc9b4ab5bb40843a5dce26370
-
Filesize
526KB
MD5cc690c89f39aaaa3cccc4e698e87c7c0
SHA1bb6783a6a1140857f4ae8ff4c6e25ff1f5a8b2c5
SHA256c00922278ce7ec8fb5e6171b7eb8f16d6354246378399bab36cf01266b4c8827
SHA512a485cdb437e0cfc6ece119fed7c33a573fde7385c47509d54d7129943c69f482ad4476765472e6a33fa980c7b374c3ffdd8c01f9ba32637978c2c52a3271864d
-
Filesize
1003KB
MD5b4ec113256124a9061bf5a326901121a
SHA17590f4c199f895a1a19f2d6fc203e097fd0e177c
SHA256aaedf501933e623d50f4cd8fc3acce9f3d4c1963f1d947204bdf393540d58c2e
SHA512767a5b48cc385ff74914e32dabe9fc2a836044086c434bf0d76e514aa5148acb6c7766dd3519e092d7b190ec359079080e83998d6dc508cc575d91a34b4fbfba
-
Filesize
774KB
MD55e2550bc088fe181f0044721ae31d86a
SHA1806c2e2ff27e54404445e6c794c85451bfcc163f
SHA2568502b15d5a0f13b1c9e048375a42a14f39f2d6d1bd63bf0b708014d6dc14ef13
SHA51235cd8ed3918682caabf566ab37d03281415276280a31cf1436429ae70c505fd1217ff8a77846698b128e7fb4459264c5166c429519a9f5f5aae8fb7c6afb3a70
-
Filesize
682KB
MD5336df7fa6c31d6e2e9b4aae957a01f9f
SHA1549fcd9c669dc6072aa564615653b811b2f01d12
SHA25654608acb78120fc1daaf1b0615a14d7c003d3f1316c243cb94fd32396f8c509c
SHA5129d421be1c70b97ecc6f5072f1bf3c1e7c2b1951375de789fe03293e729bd6409cb14b382f2832e6b2dd5be99892480a957587a2c1ea5a639b3d02877e2620c31
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f75ac8772fd8fd81292e7ae24f9898f5
SHA19a61c6e95f3837895a63cee65aefd607549f1563
SHA2569bfcd551690a3ab582c2d1c38911ce6d9a53fc844a09b28056738e8bf1222588
SHA5120a77d2ec62381214ab9271d482878160d62bb1d67f0f12b422ff14948b813c20ac944ed44597188ed74bb3e26634f29e6a26375a9fb401803b30283fdbe32944
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5498663c7fd57752b0be34706d9940df9
SHA180a5788f2a3c6d86d165f3cff38a958f20242048
SHA25676ef8b3491c17273d32a4a0d4760cf1253e90ceb02adabb7e3d07cb0f69a998f
SHA512daa13edba40f3b31f1912c25d69bdecf61644f2563ea4de4c4a540eeb46ebc94821188482ba059fea9f3b4e113305f4f84936e9c90c234d6904d5f4cb559a729
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58bb69ecb034e2a7c14ec8f3f6e87c848
SHA18de2302b39a6088f7981f9782dfae153cc828b25
SHA2567c113558f3280a8ac735afb8b047111d59e4b75de708635634267a524771f62b
SHA512abf28575c2a64a19dc2b63ab462dc9eeda2d38fc82d78c22500a09b8424565706586d63c7f9f24235574cdf42c706dbf32f79d7e962c1f7e82cf61120c650526
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59cf32c6f403ced59549e39ef01e41d9e
SHA1baab935a3f1e6c63f1ce06bad9a2c5e12253d687
SHA256d61240062d522bbf72ea78c110d27e8ee2af5496196819b5ba5e183ef9aa7660
SHA512e17cb7ae06f79cdc9e03399a936353048bb68bbaba734711f7ce33b72546efb9a99fd639ee2c40de8d6655bcb17d019d0ad619c0c33207b36b506e18a4e2008f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54af20a98e7d04c73c564ab699e085358
SHA142c40422ae506df3955d46862b5666a8fef2205e
SHA256ac40100d37b8a20ef93c33d0cd5b51b4fa6312dbdf1cfee9a3fda6199e52d35c
SHA5120027a7cb552c4529efa8db7cdd1499ce6f240b29d7171ad004af0abed0f52e25fa06120d58b25792a61d050ac93c6321ce0e9911f83e49f18397b4f98cc63c5d
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
618KB
MD55b37ae61b6abcde2ab2a2e94eb89e680
SHA17a1a1d26c58fbb5829c72bc1fa64e09559535bb5
SHA25640a76dd8f99c2178f26e72fd39b46dcc5a40e67dfc5c3fe7fe5b3b7dd077fd32
SHA512da6bdae95d8065991f9400620b752a0f1678e4631365a10913c14d583340481c3e1a408f127d833fe204ba040cdedc80cdea2d850db8d6fedefceb19cee5897b
-
Filesize
310KB
MD5b9d947db4feb7043a7516deedb91ebe8
SHA1a20a7098daa020ad14080eac4c35984c2ba7de16
SHA2566c294e2b59ab5cf788e5dfd79b17aeceee4124305522671455de47ae29ec80bc
SHA512f881599cc2102ba14684f94293fe0e0200e57fc0e19f3c066a47dc12d3817028dceaeeb099d64d328f35f528338b12ed62b749f99b9be27f98ccef54fc5e0a3f
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD56dda114e7f90a57183feef155472e5f3
SHA19474d1f00ed252c87566e72c4574295002dd22cd
SHA2563828ef562c37cf33396518db08f520d4c7f365a6c9a4d6b2f51c39b8cc30f78f
SHA512521bd5bab941f395d59e2f58bd804ed64a3ca998580ffa4b16803242eba90ae4a01106e234679b174001b3315c0c483d78a62f78c74874e84438b5d6f5f73716
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5c3adfd049611b786a8f29d9655ef372a
SHA1f2c472958646fd76e669e4016092fb229dc4eb79
SHA256698a66694d9a1adc77f59df79d91add31ea6385d2fcace1908706120f26d07b4
SHA5125f2648c2c8e373bd8f047f956fccc18e6ba18557a0a9d057f04d35473ccf2603bd743bd01cbd6942eb9e283bf7693d5ac99d3947694783a40217b123ba092e7d
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD51d2e41dbc5dbe2e25a60be7377543f1e
SHA1815f349a2bcab2bdbfe614984e779d4ff631b3de
SHA256c18055c5764adc2c708e04720e7c86b100aae4a487555d8b0c224f1bd5675803
SHA51287f2e425a95179633a85420078c3e2c42bd5e64cd041ff68347474351b1332bcb082d3b8bd7027ec18aa59c1a926424b6733bd5008bee7a6e098c45f6c554c87
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f3a232383bbde278077b9467fabfa053
SHA1727b8375245ddf9e4bf28205f7575d04c3aca48b
SHA256db0fc157acf4cf3a13fe509ef29b72ff8d1e1d95e58a6278e89009f9624b5811
SHA5125d2265fb35e64ee79f60d61fba9b8e417b6966ca04290119294a9d32d224aa15404e6b7ed49edfb570b562a044ec38087cd8a6a255fa4728538bf624f87814e5
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD58778b6e0b46e6887da6ffbc4f2cb2f50
SHA131d21e18ac644426c1aadd3df5dbaa8021773624
SHA25670210c5a353af4b4e6b12b648a69a692066ab048985adda82a2bfbf1e214f766
SHA5122b09f008b107994692c4428b1b1b8f92d6f53e517a3df5fb3810a403b6e73776c6d618085b71d566989cba42bbf81c1df1ff411babba5c997104f723ba4da6c0
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
1.8MB
MD5d3843367fb8b7364f687d2d58461368f
SHA1913aefc2b6894b848c9127164716194cd2b515c7
SHA2567b53ada73f916e072de1897228e27e9b285295787399d66790741fe59434a29b
SHA512891e2ca05cc23d8e87ad7dc4581573305946f0774995c8533fd5bc223f1821d25f6c725f3c67831b84d29f4c9531740fd3ab82ed514a9a7bb0b2b2e003832f2e
-
Filesize
1.0MB
MD509dfd1620b7db8077fbb7853889d4ddf
SHA1e3d5c78a469bdaca082e718cf76a28e701987830
SHA256e0495018a847f6ef5ed1b8f945f99c2c8cc10c0e371183af7b64904fdbc7756e
SHA5128c5fb3915678a79a14a70ca2f8af6053b181bcf683870aef2741177a504500117c79c5368a2f8322baf2f31b7ea6e8ff3d008d87ed3e1591b89dfe54e765f42c