Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
288s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe
Resource
win10-20240221-en
General
-
Target
5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe
-
Size
283KB
-
MD5
7a12d2cc6e522d19acf2468d61e7bdbc
-
SHA1
388cc288b891fcab9834841d1333677052254c7d
-
SHA256
5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6
-
SHA512
9ffc7e7d726debb8957168405691c6181e3831aae3544065178696e01b3e334f52c7816390f69ac541f021dbe773e4a4799e2c06a7da32e11de1c7ca0d715f1a
-
SSDEEP
3072:U+ukMbpNjH0ppQuCBo21fQiu9k1q+wsQEu8hVIJFVHJk0+0Fuf9cVXgNUkIIA:UjjjUpzgoNXpDVEzY5i0LAQkf
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
lumma
https://colorfulequalugliess.shop/api
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 2 IoCs
resource yara_rule behavioral2/memory/4676-619-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2732-1212-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Pitou 2 IoCs
Pitou.
resource yara_rule behavioral2/memory/5000-199-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral2/memory/5000-211-0x0000000000400000-0x0000000001A77000-memory.dmp pitou -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ B9AB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FA9C.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 9 3432 rundll32.exe 30 2080 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 420 netsh.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FA9C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FA9C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B9AB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B9AB.exe -
Deletes itself 1 IoCs
pid Process 3396 Process not Found -
Executes dropped EXE 22 IoCs
pid Process 2656 B9AB.exe 1744 explorgu.exe 3124 144.exe 2352 6C73.exe 5000 78F7.exe 3592 C7C4.exe 4912 InstallSetup_four.exe 4676 288c47bbc1871b439df19ff4df68f076.exe 364 april.exe 4712 april.tmp 3700 u3sg.0.exe 2332 u3sg.1.exe 2732 288c47bbc1871b439df19ff4df68f076.exe 3912 FA9C.exe 4440 5A9.exe 4476 EB3.exe 2716 EB3.tmp 1376 csrss.exe 2608 CAKKJKKECF.exe 4704 injector.exe 3088 windefender.exe 4084 windefender.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine B9AB.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine FA9C.exe -
Loads dropped DLL 9 IoCs
pid Process 4476 rundll32.exe 3432 rundll32.exe 2080 rundll32.exe 3124 144.exe 4712 april.tmp 2716 EB3.tmp 3700 u3sg.0.exe 3700 u3sg.0.exe 4984 regsvr32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001ac2b-579.dat upx behavioral2/files/0x000700000001ac59-2085.dat upx behavioral2/files/0x000700000001ac59-2089.dat upx behavioral2/files/0x000700000001ac59-2087.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CAKKJKKECF.exe" CAKKJKKECF.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 78F7.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2656 B9AB.exe 1744 explorgu.exe 3912 FA9C.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3124 set thread context of 5084 3124 144.exe 90 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job B9AB.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2352 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4200 2352 WerFault.exe 84 4320 2352 WerFault.exe 84 4500 5084 WerFault.exe 90 4940 5084 WerFault.exe 90 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5A9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5A9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5A9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3sg.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3sg.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4228 schtasks.exe 4732 schtasks.exe 4012 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1468 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe 2332 5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found 3396 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2332 5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe 4440 5A9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeDebugPrivilege 428 powershell.exe Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeDebugPrivilege 1200 powershell.exe Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeDebugPrivilege 4676 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 4676 288c47bbc1871b439df19ff4df68f076.exe Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeDebugPrivilege 212 powershell.exe Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeDebugPrivilege 3328 powershell.exe Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found Token: SeShutdownPrivilege 3396 Process not Found Token: SeCreatePagefilePrivilege 3396 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 u3sg.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2656 3396 Process not Found 74 PID 3396 wrote to memory of 2656 3396 Process not Found 74 PID 3396 wrote to memory of 2656 3396 Process not Found 74 PID 3396 wrote to memory of 3124 3396 Process not Found 76 PID 3396 wrote to memory of 3124 3396 Process not Found 76 PID 3396 wrote to memory of 3124 3396 Process not Found 76 PID 1744 wrote to memory of 4476 1744 explorgu.exe 120 PID 1744 wrote to memory of 4476 1744 explorgu.exe 120 PID 1744 wrote to memory of 4476 1744 explorgu.exe 120 PID 4476 wrote to memory of 3432 4476 rundll32.exe 78 PID 4476 wrote to memory of 3432 4476 rundll32.exe 78 PID 3432 wrote to memory of 660 3432 rundll32.exe 79 PID 3432 wrote to memory of 660 3432 rundll32.exe 79 PID 3432 wrote to memory of 428 3432 rundll32.exe 81 PID 3432 wrote to memory of 428 3432 rundll32.exe 81 PID 1744 wrote to memory of 2080 1744 explorgu.exe 83 PID 1744 wrote to memory of 2080 1744 explorgu.exe 83 PID 1744 wrote to memory of 2080 1744 explorgu.exe 83 PID 3396 wrote to memory of 2352 3396 Process not Found 152 PID 3396 wrote to memory of 2352 3396 Process not Found 152 PID 3396 wrote to memory of 2352 3396 Process not Found 152 PID 3396 wrote to memory of 5000 3396 Process not Found 88 PID 3396 wrote to memory of 5000 3396 Process not Found 88 PID 3396 wrote to memory of 5000 3396 Process not Found 88 PID 3124 wrote to memory of 1568 3124 144.exe 89 PID 3124 wrote to memory of 1568 3124 144.exe 89 PID 3124 wrote to memory of 1568 3124 144.exe 89 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3124 wrote to memory of 5084 3124 144.exe 90 PID 3396 wrote to memory of 3592 3396 Process not Found 93 PID 3396 wrote to memory of 3592 3396 Process not Found 93 PID 3396 wrote to memory of 3592 3396 Process not Found 93 PID 3592 wrote to memory of 4912 3592 C7C4.exe 94 PID 3592 wrote to memory of 4912 3592 C7C4.exe 94 PID 3592 wrote to memory of 4912 3592 C7C4.exe 94 PID 3592 wrote to memory of 4676 3592 C7C4.exe 146 PID 3592 wrote to memory of 4676 3592 C7C4.exe 146 PID 3592 wrote to memory of 4676 3592 C7C4.exe 146 PID 3592 wrote to memory of 364 3592 C7C4.exe 96 PID 3592 wrote to memory of 364 3592 C7C4.exe 96 PID 3592 wrote to memory of 364 3592 C7C4.exe 96 PID 364 wrote to memory of 4712 364 april.exe 97 PID 364 wrote to memory of 4712 364 april.exe 97 PID 364 wrote to memory of 4712 364 april.exe 97 PID 4676 wrote to memory of 1200 4676 288c47bbc1871b439df19ff4df68f076.exe 99 PID 4676 wrote to memory of 1200 4676 288c47bbc1871b439df19ff4df68f076.exe 99 PID 4676 wrote to memory of 1200 4676 288c47bbc1871b439df19ff4df68f076.exe 99 PID 4912 wrote to memory of 3700 4912 InstallSetup_four.exe 101 PID 4912 wrote to memory of 3700 4912 InstallSetup_four.exe 101 PID 4912 wrote to memory of 3700 4912 InstallSetup_four.exe 101 PID 4912 wrote to memory of 2332 4912 InstallSetup_four.exe 103 PID 4912 wrote to memory of 2332 4912 InstallSetup_four.exe 103 PID 4912 wrote to memory of 2332 4912 InstallSetup_four.exe 103 PID 2332 wrote to memory of 4400 2332 u3sg.1.exe 104 PID 2332 wrote to memory of 4400 2332 u3sg.1.exe 104 PID 2332 wrote to memory of 4400 2332 u3sg.1.exe 104 PID 4400 wrote to memory of 4440 4400 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe"C:\Users\Admin\AppData\Local\Temp\5a6fa11b465317c253d25419ecac2c822656b904b4714baaa009c626978048a6.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2332
-
C:\Users\Admin\AppData\Local\Temp\B9AB.exeC:\Users\Admin\AppData\Local\Temp\B9AB.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:2656
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\281913400149_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\144.exeC:\Users\Admin\AppData\Local\Temp\144.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:1568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 9483⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 9763⤵
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\6C73.exeC:\Users\Admin\AppData\Local\Temp\6C73.exe1⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 9522⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 5722⤵
- Program crash
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\78F7.exeC:\Users\Admin\AppData\Local\Temp\78F7.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:5000
-
C:\Users\Admin\AppData\Local\Temp\C7C4.exeC:\Users\Admin\AppData\Local\Temp\C7C4.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\u3sg.0.exe"C:\Users\Admin\AppData\Local\Temp\u3sg.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CAKKJKKECF.exe"4⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\CAKKJKKECF.exe"C:\Users\Admin\AppData\Local\Temp\CAKKJKKECF.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\CAKKJKKECF.exe6⤵PID:4792
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:1468
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3sg.1.exe"C:\Users\Admin\AppData\Local\Temp\u3sg.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:4440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:4228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2608
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:420
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4908
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:1376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2088 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:212
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4732
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:508
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:4704
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4012
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1228
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:2352
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\is-G9GPK.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-G9GPK.tmp\april.tmp" /SL5="$C0194,1478464,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\FA9C.exeC:\Users\Admin\AppData\Local\Temp\FA9C.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3912
-
C:\Users\Admin\AppData\Local\Temp\5A9.exeC:\Users\Admin\AppData\Local\Temp\5A9.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4440
-
C:\Users\Admin\AppData\Local\Temp\EB3.exeC:\Users\Admin\AppData\Local\Temp\EB3.exe1⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\is-EQKSF.tmp\EB3.tmp"C:\Users\Admin\AppData\Local\Temp\is-EQKSF.tmp\EB3.tmp" /SL5="$601F0,1528077,54272,C:\Users\Admin\AppData\Local\Temp\EB3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\33B1.dll1⤵PID:4636
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\33B1.dll2⤵
- Loads dropped DLL
PID:4984
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}1⤵PID:4676
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
92KB
MD563fa12f8daffaf8b53ee632f8d6bef74
SHA14187522d7467b0e797bbc4756519a4c654e7bdc7
SHA256724428a77c7807f84d22809f5bf112cfecc3ce3a1b03113bcd5a59b84499ac47
SHA51282341cfc8caf7ce65417398db249ccedf2097a4fce74bc28c0a0a94afe4b1650ff66a82146c73b3c3fd2a58ea305a31f6b30742b3258ba605b5a334372795011
-
Filesize
122KB
MD56231b452e676ade27ca0ceb3a3cf874a
SHA1f8236dbf9fa3b2835bbb5a8d08dab3a155f310d1
SHA2569941eee1cafffad854ab2dfd49bf6e57b181efeb4e2d731ba7a28f5ab27e91cf
SHA512f5882a3cded0a4e498519de5679ea12a0ea275c220e318af1762855a94bdac8dc5413d1c5d1a55a7cc31cfebcf4647dcf1f653195536ce1826a3002cf01aa12c
-
Filesize
401KB
MD5ec0a852ed6d01de6915f854ab6173dc9
SHA143ec524fea19d81db78569f27db7d5259413dab1
SHA256ba57e1e553804307c8b560bff289abdeec622625e06175cb45af33e3c2db2315
SHA512468be20073a72f77da5a35c6d35af0eeb34d953ab1213f777985dee3947f40291eabeb78501626a8bb185678dabc45a5421a6a2469de964a9d8bd8b4785e1813
-
Filesize
441KB
MD520aeea2abd4031c4af4833cdc2eaca98
SHA15e29c9897696d39c5ae6d2b6d94c1e2c5394da6e
SHA256776473f8364238f69d7881bf9873c1207f4b7b2403c3ee582fe9649c08354b5b
SHA512cfe81294d9b203d6c08ae08a9f1f2b3209e06672598940361ec76fb87b8c5391852502ff74f6e2b4221cc96e69d09e042c1261f24b666d41a8ade5114506c0df
-
Filesize
490KB
MD5051b0f11c0f45e2c08c3f985b2285c6c
SHA1b1188ed932d80a6fccab7e0bdb380a4a7c4ec076
SHA256f9b8ddd30848b7079fa0bef54e897fb1becffd3ea3d05c7afc43bfe6dc24c9fc
SHA5126c4ee56e194c168a7d0d99f73bf9e99e786ff4d27e6fe6a636ce5da6d7b8c09c5cc1ea49457000c34e0bce5e25abbff4c44085aef95a605ca3af6b5ef58bb0d5
-
Filesize
57KB
MD5520a903b1de3b282f6bc38c150ed6058
SHA19c7df8382a937eac47b810d3681dfb42175b3f57
SHA256d9566c9a3b1151d62cde8b2fc7c09e4d4c4b7d812ddab98e1a3a7d0a6aaddb96
SHA51271b73989dccca46e6bef23d51cb4aae84d98712fef930e11bcf548b9be17ccf6ad4720b8748bfd411a38140dc82e927af4c32ebb2b57a26a47ea05f78411289d
-
Filesize
121KB
MD5adbb2bee3a029b5f4429f704ae17a90c
SHA14f34a1bebfe184241c216e78ee2bc004a6e325f0
SHA256c2f94ca1d137da8bbce850d6a0b3d0594ea8afbf26f01808cc7b25bb0b6a75e0
SHA51298401395a8d551de5f49b92ea0c862b2d9796e4a857a2ec55bfd17df8c3bff41f42248fc1714b0cd8d02c774b59bfc9003ca71fc6c051e5798303cf9c91f3952
-
Filesize
130KB
MD5249ba7417efc68a4f5f999ae0e278a34
SHA192eed4d87b48f90f41091b3cb4dc7be194581602
SHA256492a8f59fb47ca3b878bd560a39e1a2a50e4ebf7235fe4a193cd1fc7fb37cba3
SHA512962b9920323f5ee3b714079530daf20b697b113108856bee0e6317a0da5ac7bb937833e016791a1fbcfa69728c23828b58daf5059276c42c8e54c83401a92e88
-
Filesize
139KB
MD519c85b2eff577b9c6f6b0041b64c5a72
SHA1cea29b51c0efbb38e2c918a14548eae470d06500
SHA25605c99e7e084d2c141a730b87ac0c12da1d5e6cb72e568a90651f1f38302a3457
SHA5120422c3e8070ed6adf11b46f924ff06d01de00f4a7cc0700d635105bde1f6cb4e87aa7439d0863e2b34f400091ea6d3a61dbbd953043d41557c8e07e7233f1b16
-
Filesize
315KB
MD574ebb105a9e63c4547dc44c02f3ec905
SHA1760ade33ec3694a055330245896ac18c452d3e59
SHA2568833cd8007f8cf91237976756feb4f983b7bd16704ebae0defa56e66ab68b96c
SHA51281498bc476205b22e09e1b8b4a524dc888f10b8cbd6a3cdc1e9b9bca92663f4ff672a9480b4d776189f50749d6065427d99b062607799bac0ff7c8e1341fd2e0
-
Filesize
332KB
MD58986326ba502f5b7a647de10754a9693
SHA16be60789e243e9cbdccad65940399125dbb15ccd
SHA2562ba78c72c6d588aad418eca50b4641f14677892a6614dce56827df2b70c32bd8
SHA512471881acb3d1c29a1d450d7dcaca7fdea777d4fff8e42807c744602926f169da194f952d876738dc3393306e6dbb4b1bba5f84d622025ab84635d4bd96281e76
-
Filesize
57KB
MD5a41ecc4f5e7778f485d1652137541de8
SHA1d9d587cd272d8ed048835f706110d7416cbdb9d2
SHA2565e82011903d1453ac3ca7f31464073a53539e3081899e5cad532ba8691973fb1
SHA512c0e7676fd69a083fb0479352cd41d1a8557c493946e7fbbc48ad09dc174496dfabbc16f9a2df65784aee9bab47a963275ee662de8eeba3b1caf0553a0496bc4a
-
Filesize
105KB
MD513bb1f5f41fe13a36e65f28bfc2f86ad
SHA12e0730c90e58ea4be8859c420da0a4b254933016
SHA25608660b4b140a743b0a8f2f75a828b5370b93868269a13388a8986bceaddae4f5
SHA5123fff8af67b2c098433571f3a98a463672993b5d48c01b3c90f903636b15b171831766768a173e01c432118845433944dfc54a0ca66dafa8584a59c73ace6fcc3
-
Filesize
332KB
MD5f315698de31669b8760b2b35b8111a16
SHA1e4f26e55c2d4e006feca390e1151946da4be7157
SHA2569b8843da7b8275688a6f9e5247d58bfcf5e45877bfd9a89f56d408d8521bb688
SHA51255b130bc916139980c9337c895c01f2506d47be03e7c528778b66a25d6ed1a2f3badb95620baeca03f4e0841dbab36edc6e735ad7243f7945f70345a5f5d0b2b
-
Filesize
337KB
MD5f46f67a1a4c67f2cfcd3bc0ae6b362b5
SHA1a5ae42fe227fdab94007454f7fa591210eb01498
SHA256f2744a3db0b4dbf8f3605d6518b58772864e6dd4328e97e5a1221f2c740c7c94
SHA5128fa0486bf5a894c64a4da7aa73f1fc65eeec26a48356eb78e426c63c2fd2abac40e83c43646495db3c1faf2d5cdbf20ca29b7fc160c5d254b81fca37552ff279
-
Filesize
61KB
MD557d49b2f25cc126d3251c9f13a68455e
SHA168c573c5d6d0457b8d1f398e9a498898b901008a
SHA256dad2b93eab15cf17693bb47c8ec1b52f79f21a0cd52d75b83a3a478d537cdc20
SHA5129c9114c028a5e407e07a7b25c35e8050920ee9218bac4f9bf18a2c1e2e29a4585ac9cc911742b1aa38498b5e8dd9c98c5c361037afc27e23cdb49dec5d1f2263
-
Filesize
142KB
MD59e09a8e85b9b7ddc4119a910da6d1751
SHA12b5622ff53ac0a65a1b7aa9156f1c14cf0407e6b
SHA256257100850d12728edc31205b2aaced6ea74b0c7d0856757dd9fbeb3a17a4b278
SHA51233fc3905631cacf268df02505083b322b5f8ce9383663965a3e17c298398408a9f509fde03abf345d40ea7e2bfd12c28369b10335ab06d1ee307f57fb6afb4f1
-
Filesize
268KB
MD5ec294a6477697c87b7ddcfc6e1cbb056
SHA15dd0ebe80e2a768bd78414fa8b762705523406dd
SHA256e9a81c0640535681196420c0e37dd55919cd74b09ca18d981ebcd80c3ebdebbb
SHA512f5826160ede7869ed952215d988256805d3d63e16eb71aafb516f74a4ff4c28058edb360e4e425aec01f7cd308de4ddca74580b90b1c07d8101f80d17b866682
-
Filesize
482KB
MD563806b124fd4e8f54c5de11cc3594cef
SHA10017268455d8d9c7c80f7531dc6fed2c4e796699
SHA2562725695480e970f25217aa8c80665da1317bf258d2b9023b142f8b3cfc64b16e
SHA512a9cce68123824138190bef571a6f4d868962ea7493a47254e297fad1462960f2aed17f96ac53ceb3d62966d42be6d3727d7f3ca86b2d9fa27dba28ef8669cd2d
-
Filesize
102KB
MD56f675dd4a07473e18b5659c36465b358
SHA1e796cbeb620f54d5555a0a228a43ccdc69d0258f
SHA2564a5f72bed5cfa72f4ecbcfd00723cbd39069822e7451bc7c06ce7c6f56385715
SHA5129d88b24c3d33208acc7b3788ba33e7e1d2bd226f3fa86ac1bc00874e4ecaaaceadfde6b55cb057080938ea53c94f3122778b2cacc4b616b6233fe305a8a4dcf2
-
Filesize
137KB
MD5911f941e62222b2e775a2736b8f9a901
SHA1226c08933cdf58c9fceaab97cccb317bb68d581c
SHA256435ce02d4e9aacc43a78bc2f94d1b872bcfdc02e83e650d43e4b3b65703c8845
SHA512aabd7d6e4407a812a436a7f7e27d9be141486600b0e8b0dde99d5b6280b74a9ef86334adcdcee8338291ccfcb1ef1bc50742bed4367d210ede0ccc07c65cb8ef
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
81KB
MD5576f5c2cd72343c8077e0ab9bf57fcc6
SHA14143a18081eacaabe8bdd8e4194f78caaba91627
SHA25635d010cbb0e28dd87593d197aebc9e7d0aedf16611594740f6f876bd23a1cef7
SHA5120e2e2dc284359e6035c086135fc17118a564a0bca19d084fa4254c42bd8b5810e01a312a891f042129c6cd3345efb21ab5a165b2879f1aef93897c81b149a9ca
-
Filesize
63KB
MD55d5174640c0ae5c94a81fb61bac1e5e8
SHA181e38d207de850e9c13dcee7e4b8e1ed88ef3608
SHA256538779cfa459f3d767bac305e9f48bd795cede1eecafa22b95aabac325ca6262
SHA512c0c928ff82bb62c9ec497f115f993b27a882ceb41298b24cba0fff872b84b252f6e5a5e98b2555f4e888d04819324905381e7b6db21b0c4e1146e80e1a7ab84e
-
Filesize
128KB
MD5ee2c8fc1dabd32118cfaa9ac409e2371
SHA11afddc4b683caffce5e94a1017cd290880b1013e
SHA25633b257b1c6d98be59f133ec59e97f20f7f363b8de1a8db4d2dbf4a6fabe628c0
SHA5129d6a0ee713dfe30ed680e0c57e8057080f091cfac0fa6f2de586be4ba36405d4c5c16c5b3e584fcd8637064d304417cae5641a1107e898fbafda0d25f62c22f6
-
Filesize
92KB
MD5cc029fda8c0538394a57293be9777c16
SHA1358ec5f6c957a20eb5f869a02059d517c3d9c0af
SHA2565293f563974358898e36eec06e81d5d77ee5345f6a94b1377f4cf9d9cbc89951
SHA512c09b75a51eb871c1a8d2e083d853a584f14013502c8696bce40ea97f67034f9aede48ec8fa3ce7d86c48f0bfb6e667724412b8862dfa439feef1fcad14df6500
-
Filesize
117KB
MD5a5972ae63fabb2716b8cc161c4a47f68
SHA180097837df5e85d47ea803a6862b23070dca7796
SHA25635d56005fe7c26772d3d8a56e0d47666431c54a021dfac154c3bfe1a1bd502e0
SHA5127b02963475c229e0d3e66505faef907f57d0a22d4d38a60ae2f5e4a287d90b2e1d770b53785a1961d35af0fb6a150df0b5c602004586a75eb128af3d151e7d33
-
Filesize
84KB
MD578fd9f436838eb89ed1a1c1aab0d51eb
SHA1afc38f4f8459f22fe8c38a60246ef90c4ed1257a
SHA256a44183f5c50b1f81b3556f8efdffc3f521cff02dbd04525bdcc9081c4133b76f
SHA512bfa3721d03e3b0f53fb8f9113aa69d28a5749756a28aede2eac12954abbd475e3f96dc991939b458607eee5b54b4e7996be9519d49a476e1a2ab58e69cc1d653
-
Filesize
78KB
MD53016fceba1e469ff714d388a431b3c9c
SHA128982de245bf35284a0d002e32b9ba1a4402701b
SHA256e15ec37b14a72ebe5639499c50069bce9b6c1ab168aa3a707022028c561f55c5
SHA512d43f5b3def012d77a9dac45e5b9fe9488d0108597d3c0e183c13f1db153c94409e42317f7742386e48c100a6531176401b4c18911dc4441591c9fd8c5c6b4ac0
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
159KB
MD5928dedd3151d75360f46fd230bd300ec
SHA1cb48eaf156832baafc2ef6fa1bdf066904bd6f89
SHA256ce06a8dd0785a72e3878a84cd888a14986249db565a49b1a91791b4fc7ba47ba
SHA51265c4a6d6005c142dbfacf75f6701298b1ad9c156873e14885342fa3755107b88852d66ce4f4263e207cafaee163e87719274fc027004884b27d98ace8c872279
-
Filesize
70KB
MD5ec845a5ed8e0140f857185649fdd7f47
SHA1d6a3a7cd1e92e2148cf1a5f99db849b3718158bb
SHA256c3c47d03708d94328ce1b49fe8b0484f0de4ee51d63873ef1cf15e791b3b012c
SHA512ff8ed8a4705ba2bc920b3b0f20df214a7e79c3177197be54dbacdc32b0b725c2f19a4d16574f6b5f26b58e18395913c6a9ab94b0b293742fbd6c55e8f50bda0f
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
501KB
MD5b56e79c9ccd9b7e5a815f6e7472ad1a4
SHA1154d702f3cc4a29237646b1e4eba07b5425958b1
SHA256a7a575ff395c47d9e96f16b02de97f570ae9dd4c6e094a61a064cb66f710ed32
SHA5127e708ef188449b4b598b7ffd9c7a269a5d9f15075e4265eaf1c9124b50ae38d137bb549398c59433ee02061123e35bea3d9f3696ab7a25d2eb6dc6cc57e1e89a
-
Filesize
297KB
MD501141c0a58ab0e5816a46becaf5d0725
SHA1c508f909b60836262527fa909c445b0fd48ce82c
SHA2567d46da8bf667f0c0c8dc16c6e6be93064ca52dc6220cd614703f05e8e2772c6f
SHA51208d6934b80041948ab62bc1dcb1078350ec9e6590a0214e46c2ac69dc3675cc19e261b284dfe2dab7a7616105eb44ca9e02152dff2f131919301f760b51ba38a
-
Filesize
23KB
MD5c91b33ddb61942c8a72634b270045e7d
SHA15c8fb205c4c0ed8b369bc47bf0b439425a6ff434
SHA2560a7ad88773664e7fbabb15bbe9296004868e4e5d8b47b4cfaa386944be7bdae4
SHA512eab2c5ec1b614a4b1afeea51a6ca7f1d1d252a1773f6f9c51c7db0599c421f61b8133fc3b94d0915504c4a2f6293b7b1509a0edd06a54b430efac0b4da054824
-
Filesize
38KB
MD5a6cb75f1a4b318b6aa7aad99b1231ddf
SHA1bca4dfa5d450048e6d2a224f27fa4d6fc1b8c5b3
SHA2565cdc186dcc79b3818fd20bf7bc12e60ef097b4ecf8d3df202b79fa1858896cc2
SHA51266a5a72e39f9a9a146a09fba98a8dd74f2d9cda1d69dbc54b6829527ddb25fe00a6b6c060e31aad418b8232bc4b9718b3ebb06087e465b0a81b305a6f1abf8d5
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
260KB
MD5988297d102d94bc03f585b3988f4a972
SHA1b188b3791296875b60821b941f8ecfc12e2d8608
SHA256786f96e1531e5d864de1fb662cbd58b46232da1bf869c67a0753afa87c1b9552
SHA512fdb75740e941ace2cca459d445141391ca5212a53d1299532a0a1e9dda82665e87fddedbc2ca3141d5a382908e587925a022ab9a51970de3714620c8a1fc1845
-
Filesize
194KB
MD5762f98a3b9a7c86ff5a5c8b16da5dbb4
SHA1a00772840373535b9a69db065fa8d34f02a5dfa1
SHA256264e8c2244c1b969cc24b6fc449ad808a23a355584bcb7ef3cb8fe263e24b3c3
SHA5124cef6b6931b003aa10eac1c1023ed462b462b7d1eea84d524a90efa8b7aff610aaca620a716039410c76e6127c46b2b532a59e5bfca082df6b4e2c88e8185fc1
-
Filesize
136KB
MD52505e52585b402b5ccfc0e71bf30c3d9
SHA164e62749144c560e7ae5583c765f1ce8823581c1
SHA2562f0d3bfcf40b59fcfeb11cead195948f3b7b2de6b986c94f5d4b276891e84cbb
SHA512abec7fc20b4e9d58608a5e49cb431ad791875be2994b118ed7a1b0ea283ce4bca8665905b1eb972112109f7088a399a5031c150bc6695667c6ac0d1ccbb13370
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
88KB
MD5f66df4ea5e49a317cfc24765f66972fd
SHA1ae29b6e0577e754b2e6f8854615ce0507187c44a
SHA2565f6843201fa2b4acab34763d9d6172962353fc136a3ecaf839e474dad5eddaf8
SHA512fe26ee2f09f9a1f04bce0898498e988f3ada0d1b0adbc3262a7d64bdb73a0eed11ce49838b22dea01e2cdc9e87a8d757bfe5633833bbf6a2277c92944cdbfa1e
-
Filesize
238KB
MD5453cfe30a257daa42ec3552f86772e2b
SHA17ee9458317579f271f01bc2da26f0130bd1a9184
SHA25636976cfff7253a31170058a28c8631f41042131c7e935a8358a7015861ab2e06
SHA5129ec001eb85906155353df17350c490697fe5a11215250a85166915bce5044de8e8c077ee36df13ae1d81c6c955eb2cda686e6994a23b07db98e9c10e19f45061
-
Filesize
231KB
MD56c656bf485d34f93f4ea2e5da2407d95
SHA146c2bb2eb3c97d989847498718fd0f14bf0412b4
SHA256828cada063b78ee2981ca1170d056bae197de40ee5720a5d455729c277e9bb17
SHA51226a6a708a667ffe0b8f006d072aa6b8410a08567eccb7d1985ca5c91772c5d0f0aa2fcaaa2bad83226a9e3b0bdeb2d14f8afceeb5c6fc6a9a13ba12000f7afbb
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
231KB
MD533e291746ffb898efc8aa17d1773ce55
SHA1d8b7e9845e0b9b49c84741c75870242a5e1b0613
SHA25622c6fdb094ba390209a23d251ba9401bc95856ab3daa93862ee9d8943bd918e8
SHA5122d2a84089712532ccfa7efe8de2e6ee2de37d6e2dd9da85eb982e35cfd8a14a84f3dd88b1b2bd87c98764ac97d2a1e76cae514ff00ad7ac383946151b9087f3e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize41KB
MD50f38a17bbaa7b6f75f51c671be981097
SHA1ee95e5225cfb623b6ddd58902bf72504993e2030
SHA25603f4d293b34e18f429d34282179a04a705d448f3b88b88982486997f6cd51f39
SHA512429100ae213ea857fa3fefea7b512bb616219f76cf2a55a4735776650806d42582ff886cd4779a1406d2bc9d0f514c93e40c3d12d9e764ffa8b880067bd704a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f536b16fff66d4b427ad23c33ae0d388
SHA1cadf8ce0937ead22a47a80eb8a5eabf75485113b
SHA2566c2161b1350737f6645f96c1fff656b3d68ca2d06984f604dfc50c472a1d9b40
SHA512bf13cda6613239e21726ce7cbb8019637e837076e5eb5618ff66e9c83cf6f38f2cce961dd699f4714d8d0b11a66778d1024c6827610d0d85c82680477b612877
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD58371341af0e034ffd29e117d636a398b
SHA1ec8b031c137ad7fed3bd459a09af0f68459bf39f
SHA2565a9432031d0fe95a03f28ef9401111fee4c6ec62f73515e60a59150749a0abd5
SHA512f383d25b963af7d8e179457a0813d56de0e5921707e2f6fd0964063cd9825d6a8e0446a4d5133b02df572a91fef3b77fdb3ae1bfb5bf519e66bf0b7f44e96304
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD555b7579abfbabdf94e72cde995e00794
SHA1a54af9573a55b1e497720365e3764f5d3254f844
SHA25679a88371bebaf582009536775556fc70f68e2785f222d66f98f2b55ad1a58eca
SHA5128abefafef6c2b5ccc4e23f76b667dc011dcadff91ead8c978bc765b17a10f318e9ae2766fb6d36c1c647c3ede88fcd4ebe30c5b865305ce0e35ea3a2b34aa087
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD541a1a2e0dff2f464cccc72de4813b0fb
SHA11ac745e26d7c37f7c27b01a13c6d324e60c4e477
SHA2566591167150d70ab65af9e24665cec0aadefe5efbd607ad5e3dfdd21ef54be463
SHA512a8d3d0ae7a527ee5544d7f72b3db5536943f25b743ce9de5cef245c4e8ae42eb79ad250378340f5657ece1b129b9502d6f508c7997819d0f9d669b70c69c8f44
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5d704b4f5abd125ccb9e794af88bede55
SHA139380b07ab2c889f2c86c30d2647c8ddedd19aaa
SHA256a96f53ed1897236eaee61409d6efcd60e5315ac69d39365a44b81a2c2c0fa459
SHA512aa86c15fd6c845eb9bd3c43235e51c1aa0296d1de3bfcf3982518e3bd433efbf045ce544509ba76df5958dc9229bf1757a05fe43a01e57e3ee8e4639f3322685
-
Filesize
289KB
MD523931abcca1d5fbc6faa5713759d9d20
SHA1237507705f97c8db484d345e1e697f8f79862d43
SHA25638816cde7ce3fd062d66380fbbf4ec8c8703267501421d79d5ef0f433a199afd
SHA51211e4967febfbf099f2296ffdd49c7194877efd9c61128f819d344bc070bca537e54b26284dd2aeeff43c7f6f8bbd78a63fc235250fd51684d24b0ad356ff06f7
-
Filesize
255KB
MD58a65e894dcc0f49d12bd53a3aa8341d5
SHA1a10eecbd41df5f236de7ff77d7fc5572bb74d964
SHA256c07903b597bbc3be784daeffec9bfa47abb0b9825cf44b4b3381b48f47eb1aeb
SHA512c909094bf47206a9195589dd5964842c8507ecfbc2a5fe44ce558c8d884de09e2d96a6a0706a86c091da2c64dbcf1b1e1711639b7e40e20995cebd95e45fe598
-
Filesize
291KB
MD55261befd17bc82c62ee868612717202e
SHA1026d9d527bd6586b97a17b63e2aa4ee4a20acbc2
SHA25684e5df9be404092002a44ed6f2e606159c988bf2cd7b4ba882f1d759c4fcfafb
SHA5123fe591445b1b1ac1a30060b90ef835968a1db24104bb24aadbd99d2f36709403e6732c252b8319ea74730b3b638b012ab94c62f506fc3e27f538ea2af49f079a
-
Filesize
282KB
MD54bf9fa9bb2b53563dd96fadc1e192b60
SHA17a6a89ebf18f4aca9f48f14f08780549b74e514e
SHA2566ebe34f1ebee8a49745ff9ec879fc1f74d2b427d56ac69bdee6b734175ae2f84
SHA51236508a331733f975fbca95d17a685d63729463d49bf786ceaee4e087363b80ed6fe5f98ae6fa3710dd1aa0881d34739e3654eac602f32975c5dd594aae3c6903
-
Filesize
297KB
MD56d418b12b65eb668d0bbb5e5fce8c88d
SHA1b7fe3a7db42077b18881cda8432b129acccce306
SHA25621502a61642d53a4e6f6b540dfa58e58f5989272c979d011bfbb9782fab4cfe0
SHA5122974115f7a2d5878babfb84423f1c447fd124711e46d6cc8dee4d8644eeae88cb3301c99331e3f29359d9e17ef52e9f8175e6a8a41401d00282641ca112101c9
-
Filesize
198KB
MD539601c8384371ee01df3d05a0687f88b
SHA1bbd43f4225639d67dd36e540f1035561bad5108c
SHA256473f7fa067225112fcbdd3629058081a83cf4e20296f61cebe5bd6e19fa36ef5
SHA5128940ee28486e3baa74af8bcb447f7a55ac6ea7c887526813bb11c2793869214309ee70be486d078b57c68c19915e55323c4cd331b76fcaaa33767a07559e8e31
-
Filesize
100KB
MD58ddf1d9370f7f32d45a80f20d793eef5
SHA18890fb90a0f5755af41802653b2b461cddf52afc
SHA2562a99dac0457fc878ad7665416eba85bd4af9e55aad5072191db2d43ab67e0a99
SHA512acda3062a55768339564487603bf9fedd40c1fd06bccd2727fedb05d663a96985b45ce9b487dc4abec50f170d1561b834818226161f762c6e68d098e5f8c3faf
-
Filesize
79KB
MD5a117671c827925076f63a24f92b392d8
SHA1115c79682844e8983da3e688ee664dbb311903a3
SHA256467d2f4e816adc9dbcffc4efd97a02e53260917cab6e66d368e50e2c3cdd4347
SHA5120db9b2c9bf62c589774524ee42389333aef0568a15b475c56db121be6b48c9510246ff35abc96f43a3bc0ab80031bcf2e5d677dacaeca30143325cd4d1e2f27c
-
Filesize
245KB
MD5dfee935f13535f95ddd9d60a82f9132a
SHA14ad6b04532bac594f61caa581d661ae848ab860f
SHA256dc90ce5f58bea60aaae5d8212ac8b98b29adb160aa94aaf4dc7d6f9d87906a6c
SHA5120c1b4d3bbc828a0f61087a54775f89c18e21843bf1ee787f6711775228f9895d66f4948f82cada63a1d8ea280c274cb3974b7beb343a8b14f41136deee8aba98
-
Filesize
49KB
MD5b62f12b184e04383ec7d8ae76eb693e5
SHA16ee9acfb1efac2714f31d19688c4010061eb9dfc
SHA2569c8bade5e488cbc706bcf296a09b70aa080376384ccfae161c72c88fb2193289
SHA5125d384648dcae2371fe128f795d90f484c6d362276f7614370abfc24730a89ef21b208c524da0a283631a0f7cdc6c311bb3b189187853c1e8774c51510e47c773
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
91KB
MD58fa44702b51594dbf193599e7bbdcc16
SHA1c9ad80b78aa2a4b255d12a0d86dd4969b014d5aa
SHA256d6a73e07d2a7d517d2376bcb68a51d55cd82ea22c4eb020ea78d498d692fea8c
SHA5127ecbcda42fe8a67099fbf82ac19247d51807c463581b570e689ede6c7a28f506ba60054628be4447d54590f3acc9e35f8a695834a6d6dc34bcfee7b360f2e62b
-
Filesize
274KB
MD5ade01593cad435436a82af38341de022
SHA1c7ea5a1c5f75a4e9be3df137b2d227f9d548861c
SHA256b172c08ec627a23dd246a08b8ccf7c1d6c8b104b974d6b3389a0c64fa8420d10
SHA512f4f06fd2453c447db545141379190a9bae24488019140ae768d79a4b825b8534a10b40bf9cc9309d4d9cd63fdc2a60e076267b7b751738cefd0d68558e093e61
-
Filesize
149KB
MD54fa67e8696d8515f814915a3c5052772
SHA15a7a0c970b6721f74adec875646bcf34d96005ff
SHA2561ed341257d92e683b74cce3f94e2aa97e9172b11034a9e9de8d5b65f4224eca8
SHA5126d9dedfea4fe4362416e962250de94e5f371d4a8ab711e42d97ec111421101d180d769c1d4aa4d90dc5a9178b7fdf2ca393073293bf11a12d616b52303e1aa38