Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
13/03/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe
Resource
win7-20240221-en
General
-
Target
333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe
-
Size
1.8MB
-
MD5
cfcbb4018389095db69c51e845896db0
-
SHA1
1d97084a177a55094cb0350c8feffc69abf3a388
-
SHA256
333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd
-
SHA512
50ecacc4fb32fa42b79306b970b3eb061fd630e74c5de1025b17441b974de361a932c45b0305e49b1af94741977f7c6906745df31557993fc24d50f7274f42ec
-
SSDEEP
24576:bdXdaxjLQx7cxYGjZH5Ks/mywACjJDzjAUc+C5rtFCjjqOn3hz4yOzRd8xJOGtEi:bB8IH8ZKvywh1zErtaDn6dsbXFJ
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
risepro
193.233.132.62
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/4896-232-0x0000000002ED0000-0x00000000037BB000-memory.dmp family_glupteba behavioral2/memory/4896-233-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4896-550-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4008-1345-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4232-1860-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4232-1934-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4767d2e713f2021e8fe856e3ea638b58.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lenin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral2/memory/4952-2123-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4952-2124-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4952-2126-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4952-2127-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
flow pid Process 10 4212 rundll32.exe 22 4472 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1876 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lenin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lenin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Executes dropped EXE 25 IoCs
pid Process 212 explorha.exe 4672 lenin.exe 2892 InstallSetup8.exe 1596 InstallSetup8.exe 3500 syncUpd.exe 2576 BroomSetup.exe 4896 4767d2e713f2021e8fe856e3ea638b58.exe 5020 FirstZ.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 3252 explorha.exe 4632 InstallSetup8.exe 4232 csrss.exe 5012 injector.exe 4084 reakuqnanrkn.exe 1860 windefender.exe 396 windefender.exe 4928 CAFHIJDHDG.exe 2504 explorha.exe 656 InstallSetup8.exe 4076 explorha.exe 2328 InstallSetup8.exe 4312 explorha.exe 684 InstallSetup8.exe 4852 explorha.exe 2848 InstallSetup8.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine lenin.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe -
Loads dropped DLL 8 IoCs
pid Process 660 rundll32.exe 4212 rundll32.exe 1596 InstallSetup8.exe 1596 InstallSetup8.exe 4472 rundll32.exe 1596 InstallSetup8.exe 3500 syncUpd.exe 3500 syncUpd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001ac1d-208.dat upx behavioral2/memory/2576-210-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/files/0x000600000001ac3e-1953.dat upx behavioral2/files/0x000600000001ac3e-1962.dat upx behavioral2/files/0x000600000001ac3e-1968.dat upx behavioral2/memory/1860-1970-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4952-2119-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2118-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2121-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2122-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2120-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2123-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2124-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2126-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4952-2127-0x0000000140000000-0x0000000140848000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4767d2e713f2021e8fe856e3ea638b58.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallSetup8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000018001\\InstallSetup8.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CAFHIJDHDG.exe" CAFHIJDHDG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\lenin.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000010001\\lenin.exe" explorha.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 49 pastebin.com 50 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe reakuqnanrkn.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\MRT.exe FirstZ.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3856 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe 212 explorha.exe 3252 explorha.exe 2504 explorha.exe 4076 explorha.exe 4312 explorha.exe 4852 explorha.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4084 set thread context of 1560 4084 reakuqnanrkn.exe 187 PID 4084 set thread context of 4952 4084 reakuqnanrkn.exe 191 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Tasks\explorha.job 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3120 sc.exe 4304 sc.exe 2376 sc.exe 3476 sc.exe 2520 sc.exe 2124 sc.exe 4112 sc.exe 4280 sc.exe 4508 sc.exe 4632 sc.exe 2172 sc.exe 1692 sc.exe 3972 sc.exe 2828 sc.exe 4352 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000600000001ac08-146.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 syncUpd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString syncUpd.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4648 schtasks.exe 1048 schtasks.exe 2912 schtasks.exe 2184 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3856 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe 3856 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe 212 explorha.exe 212 explorha.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 2296 powershell.exe 2296 powershell.exe 2296 powershell.exe 3500 syncUpd.exe 3500 syncUpd.exe 1076 powershell.exe 1076 powershell.exe 1076 powershell.exe 4896 4767d2e713f2021e8fe856e3ea638b58.exe 4896 4767d2e713f2021e8fe856e3ea638b58.exe 3252 explorha.exe 3252 explorha.exe 4080 powershell.exe 4080 powershell.exe 4080 powershell.exe 4080 powershell.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 4008 4767d2e713f2021e8fe856e3ea638b58.exe 1320 powershell.exe 1320 powershell.exe 1320 powershell.exe 1320 powershell.exe 316 powershell.exe 316 powershell.exe 316 powershell.exe 316 powershell.exe 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 4248 powershell.exe 4248 powershell.exe 4248 powershell.exe 4248 powershell.exe 5012 injector.exe 5012 injector.exe 5012 injector.exe 5012 injector.exe 5012 injector.exe 5012 injector.exe 4232 csrss.exe 4232 csrss.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2296 powershell.exe Token: SeDebugPrivilege 1076 powershell.exe Token: SeDebugPrivilege 4896 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeImpersonatePrivilege 4896 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeDebugPrivilege 4080 powershell.exe Token: SeDebugPrivilege 1320 powershell.exe Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 4248 powershell.exe Token: SeSystemEnvironmentPrivilege 4232 csrss.exe Token: SeDebugPrivilege 3284 powershell.exe Token: SeIncreaseQuotaPrivilege 3284 powershell.exe Token: SeSecurityPrivilege 3284 powershell.exe Token: SeTakeOwnershipPrivilege 3284 powershell.exe Token: SeLoadDriverPrivilege 3284 powershell.exe Token: SeSystemProfilePrivilege 3284 powershell.exe Token: SeSystemtimePrivilege 3284 powershell.exe Token: SeProfSingleProcessPrivilege 3284 powershell.exe Token: SeIncBasePriorityPrivilege 3284 powershell.exe Token: SeCreatePagefilePrivilege 3284 powershell.exe Token: SeBackupPrivilege 3284 powershell.exe Token: SeRestorePrivilege 3284 powershell.exe Token: SeShutdownPrivilege 3284 powershell.exe Token: SeDebugPrivilege 3284 powershell.exe Token: SeSystemEnvironmentPrivilege 3284 powershell.exe Token: SeRemoteShutdownPrivilege 3284 powershell.exe Token: SeUndockPrivilege 3284 powershell.exe Token: SeManageVolumePrivilege 3284 powershell.exe Token: 33 3284 powershell.exe Token: 34 3284 powershell.exe Token: 35 3284 powershell.exe Token: 36 3284 powershell.exe Token: SeShutdownPrivilege 4768 powercfg.exe Token: SeCreatePagefilePrivilege 4768 powercfg.exe Token: SeShutdownPrivilege 5116 powercfg.exe Token: SeCreatePagefilePrivilege 5116 powercfg.exe Token: SeShutdownPrivilege 1320 powercfg.exe Token: SeCreatePagefilePrivilege 1320 powercfg.exe Token: SeShutdownPrivilege 3100 powercfg.exe Token: SeCreatePagefilePrivilege 3100 powercfg.exe Token: SeDebugPrivilege 1048 powershell.exe Token: SeSecurityPrivilege 4508 sc.exe Token: SeSecurityPrivilege 4508 sc.exe Token: SeAssignPrimaryTokenPrivilege 1048 powershell.exe Token: SeIncreaseQuotaPrivilege 1048 powershell.exe Token: SeSecurityPrivilege 1048 powershell.exe Token: SeTakeOwnershipPrivilege 1048 powershell.exe Token: SeLoadDriverPrivilege 1048 powershell.exe Token: SeSystemtimePrivilege 1048 powershell.exe Token: SeBackupPrivilege 1048 powershell.exe Token: SeRestorePrivilege 1048 powershell.exe Token: SeShutdownPrivilege 1048 powershell.exe Token: SeSystemEnvironmentPrivilege 1048 powershell.exe Token: SeUndockPrivilege 1048 powershell.exe Token: SeManageVolumePrivilege 1048 powershell.exe Token: SeShutdownPrivilege 2336 powercfg.exe Token: SeCreatePagefilePrivilege 2336 powercfg.exe Token: SeShutdownPrivilege 4112 powercfg.exe Token: SeCreatePagefilePrivilege 4112 powercfg.exe Token: SeShutdownPrivilege 656 powercfg.exe Token: SeCreatePagefilePrivilege 656 powercfg.exe Token: SeShutdownPrivilege 5064 powercfg.exe Token: SeCreatePagefilePrivilege 5064 powercfg.exe Token: SeLockMemoryPrivilege 4952 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2576 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 212 3856 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe 74 PID 3856 wrote to memory of 212 3856 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe 74 PID 3856 wrote to memory of 212 3856 333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe 74 PID 212 wrote to memory of 4672 212 explorha.exe 75 PID 212 wrote to memory of 4672 212 explorha.exe 75 PID 212 wrote to memory of 4672 212 explorha.exe 75 PID 212 wrote to memory of 2892 212 explorha.exe 76 PID 212 wrote to memory of 2892 212 explorha.exe 76 PID 212 wrote to memory of 2892 212 explorha.exe 76 PID 2892 wrote to memory of 4648 2892 InstallSetup8.exe 77 PID 2892 wrote to memory of 4648 2892 InstallSetup8.exe 77 PID 2892 wrote to memory of 4648 2892 InstallSetup8.exe 77 PID 212 wrote to memory of 660 212 explorha.exe 79 PID 212 wrote to memory of 660 212 explorha.exe 79 PID 212 wrote to memory of 660 212 explorha.exe 79 PID 660 wrote to memory of 4212 660 rundll32.exe 80 PID 660 wrote to memory of 4212 660 rundll32.exe 80 PID 4212 wrote to memory of 376 4212 rundll32.exe 81 PID 4212 wrote to memory of 376 4212 rundll32.exe 81 PID 4212 wrote to memory of 2296 4212 rundll32.exe 83 PID 4212 wrote to memory of 2296 4212 rundll32.exe 83 PID 2892 wrote to memory of 1596 2892 InstallSetup8.exe 85 PID 2892 wrote to memory of 1596 2892 InstallSetup8.exe 85 PID 2892 wrote to memory of 1596 2892 InstallSetup8.exe 85 PID 1596 wrote to memory of 3500 1596 InstallSetup8.exe 86 PID 1596 wrote to memory of 3500 1596 InstallSetup8.exe 86 PID 1596 wrote to memory of 3500 1596 InstallSetup8.exe 86 PID 212 wrote to memory of 4472 212 explorha.exe 87 PID 212 wrote to memory of 4472 212 explorha.exe 87 PID 212 wrote to memory of 4472 212 explorha.exe 87 PID 1596 wrote to memory of 2576 1596 InstallSetup8.exe 88 PID 1596 wrote to memory of 2576 1596 InstallSetup8.exe 88 PID 1596 wrote to memory of 2576 1596 InstallSetup8.exe 88 PID 2576 wrote to memory of 4360 2576 BroomSetup.exe 89 PID 2576 wrote to memory of 4360 2576 BroomSetup.exe 89 PID 2576 wrote to memory of 4360 2576 BroomSetup.exe 89 PID 4360 wrote to memory of 2492 4360 cmd.exe 91 PID 4360 wrote to memory of 2492 4360 cmd.exe 91 PID 4360 wrote to memory of 2492 4360 cmd.exe 91 PID 4360 wrote to memory of 1048 4360 cmd.exe 92 PID 4360 wrote to memory of 1048 4360 cmd.exe 92 PID 4360 wrote to memory of 1048 4360 cmd.exe 92 PID 2892 wrote to memory of 4896 2892 InstallSetup8.exe 93 PID 2892 wrote to memory of 4896 2892 InstallSetup8.exe 93 PID 2892 wrote to memory of 4896 2892 InstallSetup8.exe 93 PID 4896 wrote to memory of 1076 4896 4767d2e713f2021e8fe856e3ea638b58.exe 95 PID 4896 wrote to memory of 1076 4896 4767d2e713f2021e8fe856e3ea638b58.exe 95 PID 4896 wrote to memory of 1076 4896 4767d2e713f2021e8fe856e3ea638b58.exe 95 PID 2892 wrote to memory of 5020 2892 InstallSetup8.exe 97 PID 2892 wrote to memory of 5020 2892 InstallSetup8.exe 97 PID 4008 wrote to memory of 4080 4008 4767d2e713f2021e8fe856e3ea638b58.exe 102 PID 4008 wrote to memory of 4080 4008 4767d2e713f2021e8fe856e3ea638b58.exe 102 PID 4008 wrote to memory of 4080 4008 4767d2e713f2021e8fe856e3ea638b58.exe 102 PID 4008 wrote to memory of 4540 4008 4767d2e713f2021e8fe856e3ea638b58.exe 105 PID 4008 wrote to memory of 4540 4008 4767d2e713f2021e8fe856e3ea638b58.exe 105 PID 4540 wrote to memory of 1876 4540 cmd.exe 107 PID 4540 wrote to memory of 1876 4540 cmd.exe 107 PID 4008 wrote to memory of 1320 4008 4767d2e713f2021e8fe856e3ea638b58.exe 108 PID 4008 wrote to memory of 1320 4008 4767d2e713f2021e8fe856e3ea638b58.exe 108 PID 4008 wrote to memory of 1320 4008 4767d2e713f2021e8fe856e3ea638b58.exe 108 PID 4008 wrote to memory of 316 4008 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 4008 wrote to memory of 316 4008 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 4008 wrote to memory of 316 4008 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 4008 wrote to memory of 4232 4008 4767d2e713f2021e8fe856e3ea638b58.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe"C:\Users\Admin\AppData\Local\Temp\333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\1000010001\lenin.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\lenin.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN InstallSetup8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe" /F4⤵
- Creates scheduled task(s)
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\1000151001\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000151001\InstallSetup8.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\syncUpd.exeC:\Users\Admin\AppData\Local\Temp\syncUpd.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CAFHIJDHDG.exe"6⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\CAFHIJDHDG.exe"C:\Users\Admin\AppData\Local\Temp\CAFHIJDHDG.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\CAFHIJDHDG.exe8⤵PID:4168
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30009⤵
- Runs ping.exe
PID:4964
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:2492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:1048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\4767d2e713f2021e8fe856e3ea638b58.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:1876
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Modifies data under HKEY_USERS
PID:2464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:2912
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:2308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:2184
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:3284
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000153001\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\1000153001\FirstZ.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5020 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4892
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:4352
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:2124
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:3120
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"5⤵
- Launches sc.exe
PID:2376
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"5⤵
- Launches sc.exe
PID:4112
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:4280
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"5⤵
- Launches sc.exe
PID:3476
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\104443672357_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exeC:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe1⤵
- Executes dropped EXE
PID:4632
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:4084 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1300
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4872
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4352
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3972
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4632
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1560
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:396
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2504
-
C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exeC:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe1⤵
- Executes dropped EXE
PID:656
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4076
-
C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exeC:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe1⤵
- Executes dropped EXE
PID:2328
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4312
-
C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exeC:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe1⤵
- Executes dropped EXE
PID:684
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4852
-
C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exeC:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe1⤵
- Executes dropped EXE
PID:2848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
1.0MB
MD5832bfec21b8f3a5ad5bc1a97b8725368
SHA1328ea519dd4c5aba4cfcc29f970c3984738e285c
SHA256062aca9198b5737aa4678c5093cea6de98d5fe3992946ecbeb41461cb10ac464
SHA512079fafc7431ed6a96514d3c0f88afe432c456750af3dcd1a43804a30c81aae5756f4b18c5318dc0e8880241ff9094d208fd925e1479fb7bda25a8e7d3da3389f
-
Filesize
989KB
MD5553b862ad072abd944ac1f8a083e16c2
SHA1a8ee85efa812ac7069ed4119359df38403748e03
SHA256d26754d25af8449e30f561b9ba4fa7a7a7fefcf0d0946ba5ad0ac8e687f911e7
SHA512ecb8aedbdca32c68667dc30ca72bbb39e4e933335fcdf874d101079ba8a39c299a87d0a5e522240d2d9450f3f0662e61be13d0d8b86f90d0b059508bbbd3a003
-
Filesize
3KB
MD57ce47df53c8f0ba7ccf885c309afc484
SHA1b25ad9723b06d3861498caa32ffb1b7b38701a95
SHA2567031b6b7bc43cf4ee90d4ec4860b78a442352243ea28f5d959b56222b13de2e4
SHA51278585fbfcfe2e7a27f0ee168075958923184e67da1668850d0e66e31f0fd0a5516c04a17693ad197da7ffffb179265cd54fe0629fa30e00a6f269c6d68277efd
-
Filesize
1KB
MD559178dc1c897fe387eb743a42edbe440
SHA1fb2fd6dc1b5de306e79e15eb83bbbc7854fb9f11
SHA256b1831615adc9632912312b3c23136ea1520250556538ed2c5d2808b72a382ade
SHA5128fdec4a1d4699c274660817c0c8384f42470e6f532c473869ccdef62418612bd9e602a5c3a2c58878fa5b7f31c6906ed6f391876b9797c6ef26eb7d7017b86fc
-
Filesize
1.8MB
MD5cfcbb4018389095db69c51e845896db0
SHA11d97084a177a55094cb0350c8feffc69abf3a388
SHA256333a556b9edba0a849275d9f35e85c00e40b258d29036d0d7394f44d7eb569fd
SHA51250ecacc4fb32fa42b79306b970b3eb061fd630e74c5de1025b17441b974de361a932c45b0305e49b1af94741977f7c6906745df31557993fc24d50f7274f42ec
-
Filesize
448KB
MD51820bd5b68ef9db380aee233734c3372
SHA1b21c55e93a0be08c32ab8947f1c97f22398b685b
SHA25662e119004ffb048008fd49cc32e886faf1b69b6ecd268889fdf5db042f631746
SHA512939ee4d8211eb2a6c32bda42bd16d8afdc3e2aa64acf5d0c98b1b31dececacf9e7c2a2cba8e6bee67bd12c71d57406d1ff779a894adf4ca0437ac00b3762ea83
-
Filesize
3.0MB
MD51a02813cf7cb1c939af82ee6a7670575
SHA12845e7214874b6dce95e9edb30ddfba426d26533
SHA25678fad881cf61ed2d13bb532c13e4e4bb761acdcbac4ddc7ccdf65dc7b5b87c37
SHA5125f69cd15549cc6b7942273c20d3bcf95ff4121174da5df4ae1ca5c4d34afcf009e2328f074b37aee710e56cc429cd522547702ad2d17e9d3e4165e2a942e79fc
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
2.1MB
MD507771f905f956e2e9311f88d2fb61a41
SHA143714c72081b102de5def978db8b0eb1d3f1a85f
SHA256869173bf6d4a8ad18a72e2b61a2c68d87a09450e42076e6336b1f46a033df12a
SHA512ff049073fe00dc6b18b0ddf455bed814ac6b6bc3b52c23fe027bb5bee70a7e212a091d460a7c948019ddd02f52358092429e98988c885ecdbf46b341fd6ba05d
-
Filesize
4.1MB
MD567d436770679af41b4a59a1c76f55b3b
SHA121ea415c326d5a5857ebb90e577a8f8782528a01
SHA2560c8d359c46b7cc7224245f59c5213e53da9f4098cb166fa0b78b9ba17be2c070
SHA512060a13ed802a74cb22c43a22cd3ab13db46857b2919552d6afdd7e4954fd66e18262abec59b1e514e6016d8f62f16191d34a4b3ac663276fa5c6493f596de2d6
-
Filesize
2.5MB
MD5ffada57f998ed6a72b6ba2f072d2690a
SHA16857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA5121de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
24KB
MD582ba0fa29450a66b0626bc81db9665d7
SHA10f6db9b832d1353172838c2644623abce7018de0
SHA256eeb68876ca89772506c0d46e8ecf556fb98ae7026668456b498310c9c34b4efe
SHA512b14886ddb057c11a10a8499987d77918d82ea7238e28c1e9cd04876774f3adc01408015408d73d643add8146f04f6b1628d985b8e4fd73d42a45cc2e72d2ecbd
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
253KB
MD55033fc63b03bed10b7d5a9dca0592e93
SHA14b5be6516e45d75d4662332134e72320d1bb962e
SHA2564411c6a053b00fbcf08b03a67added99061b7d7ba0070b6e5e1d24586d856c5c
SHA512be0f1805855a42bc37d79d30ebc40cf1ef73dd5233a06fb3c6f74ae5ce52c75ec499a32b4d6ff82524d99f9bc9ef7a96bec43cbe1499427d3002ada58bbaf5cd
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ce1717b4eeddda44a76ded02674c8c8d
SHA1cb5169aa19bb6a885257e634a62185bf9c1ee235
SHA2567c915a47a6053544fe37130d9e2b777f616349a74ca19d04cde3240230b8b65d
SHA5125bec8671355e2fc771ec0a8599169c7bdce821f91c19c13dc1d45d14da2dc487710e2bf69ff08036c6839796a60979d6a549d370915127c65ad21297120d1336
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ec14c91a96c40bd809501ee0d154ea4e
SHA18f18ab0423022fee8f17ec6a4654d86a7601349e
SHA256cdda1b082a16e4b0949224ba7e133ceb4b56b457ebc118f27979e5d667c9c3e2
SHA51258115540b7c99287f23181aabac750577580c73d9d42ff2b3a4c5747bc814d2e5b0b50f329cea112107e3ec84565868551b45a6c8d40988c9479bad0a34b172c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55fe72e092f9b2d13e0ac47bbd285a03d
SHA199e03bfbdd9097d386ab955885a162e65758151e
SHA256aea4350de5053a275e610e0e210b8ec2c5ebf9bda90a5318e37e76d83708dc7b
SHA5128eeffbea02d0487c725398b421e75828268dbaa9823ed81a27ac46b35c1a416ffa6370d0a2e22fb92f831f4ce1d9313337e206f4c4764aed7935f1ba4197439c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD58c5d91d6db8307d4c0d3eef0f6b13c2c
SHA167efda145d084b61725393131a66023c503b1505
SHA256fcf9198a1155c1eed341a8df683c47a268455bd89a7f168bb2158a16140c0e75
SHA5124b3d55d7f330994c7593665890b7bbc8dde78cb8a8d01ffa955a73b3daa6bd4810c643d2b960bb5d45b23daa68bc5a4658ad25b70d42a1e3146c9b45218752c6
-
Filesize
382KB
MD5ea5795a574c0bf894211641643488f26
SHA153c78daab38eed420df3f94b304557bc41a31540
SHA25689bcdc0c5572c067502ca64c4359f7330238e7711a2691f866f15f6aceb9cbf4
SHA5120ccc797eaf7af35186bd3020b5bcb88ac2d4e401a7cf80d341b7e1b1a616b4748051e41adab85b187886d905fcb3a285240a0da879ae3974a4715dcceca5258e
-
Filesize
312KB
MD598e49a59dd055b25bf7fa53bee69cfd9
SHA1c18f47e1e32ffc7d2b1a845ea6e7379077324478
SHA256fb08c24c46488ca098ea093cc0fd5ae22ecad5bdbe378c7dba88a7547ade9588
SHA5127ec4c4bcd59acd83d411f97e4bec79a76ef547ad5da16d704f6ea0db9c3f58dd44401d8f5e81135481e7e73708213c5f6db8f9c6637cfce6ffce422c6697ef37
-
Filesize
555KB
MD58bbe4ab9a5d3ba140c56ae674d14ef1a
SHA11377ee5c18387bd04ef76ebee6f65efbc021c81c
SHA2566309fbc605857fb32bdca2f50e43c4beea4ec7e95dcb8496c4c355e8ddaa79ad
SHA51273df9bc131c04e1c3b676f6f5d4b5c9c0ec9e06ba56d9adca8fb7255c945bfa924026ba225f912fd73fc7915b2b49697546b50fe725310d38966b665dd24591b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47