Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/03/2024, 10:46
240319-mvcmcsah4t 1018/03/2024, 12:09
240318-pbenqagc97 1017/03/2024, 13:27
240317-qqh55afc93 1017/03/2024, 02:17
240317-cqtd7scf2x 10Analysis
-
max time kernel
637s -
max time network
623s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2024, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe
Resource
win10v2004-20240226-en
General
-
Target
d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe
-
Size
209KB
-
MD5
2cb4d9235c8edfaeeedf9258177cec57
-
SHA1
401520c963a302e4df292c032416febec06e5666
-
SHA256
d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278
-
SHA512
5d1059c1618e8cf1645a7775da743b02ef387d249c6b263e20ade68362ee06e43548293c1bb224719014618458b6bb6b00c7664fbea97b2414976ce980a8d950
-
SSDEEP
3072:M4GZjvkqp4C/Khv97mrvw1F0Dz1yL9w1RBeg8+/yGYV:nGlvkqp4RSTwQwkRBeA
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Extracted
vidar
8.3
aadba0e623c9f7875c6a7402447d5a33
https://steamcommunity.com/profiles/76561199651834633
https://t.me/raf6ik
-
profile_id_v2
aadba0e623c9f7875c6a7402447d5a33
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Extracted
lumma
https://herdbescuitinjurywu.shop/api
https://colorfulequalugliess.shop/api
https://resergvearyinitiani.shop/api
https://deadpanstupiddyjjuwk.shop/api
Extracted
socks5systemz
http://cszqkvf.net/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f571ea771795af8e05c647db22f31df92d8838ed12a666d307eca743ec4c2b07b52966923a6788f713c4e790
http://cszqkvf.net/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12eab517aa5c96bd86ef9c8244825a8bbc896c58e713bc90c91836b5281fc235a925ed3e56d6bd974a95129070b614e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff810c0e99d983fc56a
http://bozbmfe.com/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f571ea771795af8e05c646db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608fff17c8ed91923d
http://bozbmfe.com/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12eab517aa5c96bd86e894854a825a8bbc896c58e713bc90c91836b5281fc235a925ed3e56d6bd974a95129070b615e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee959c33cf6b9e10
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation taskmgr.exe 660 schtasks.exe 1992 schtasks.exe 3944 schtasks.exe -
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/4584-273-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/4584-279-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/388-171-0x0000000140000000-0x0000000141123000-memory.dmp xmrig behavioral1/memory/4932-231-0x0000000140000000-0x0000000141123000-memory.dmp xmrig behavioral1/memory/388-272-0x0000000140000000-0x0000000141123000-memory.dmp xmrig behavioral1/memory/4932-280-0x0000000140000000-0x0000000141123000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2876 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B99.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation 8684.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation InstallSetup_four.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation u12g.0.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation JJDBGDHIID.exe -
Deletes itself 1 IoCs
pid Process 3256 Process not Found -
Executes dropped EXE 29 IoCs
pid Process 1332 5743.exe 4556 D270.exe 4944 digvhbv 4792 CBC5.exe 2792 B99.exe 4388 csrss.exe 2716 csrss.exe 4768 6DFE.exe 4584 㝺㍢㕄砸䑇扸c 2684 3064.exe 1544 8684.exe 1384 InstallSetup_four.exe 3508 288c47bbc1871b439df19ff4df68f076.exe 1744 91FF.exe 3320 april.exe 4500 91FF.tmp 4516 april.tmp 2696 textultraedit.exe 692 textultraedit.exe 3624 stormphp32.exe 4752 stormphp32.exe 960 u12g.0.exe 4624 u12g.1.exe 3128 288c47bbc1871b439df19ff4df68f076.exe 5044 csrss.exe 3656 JJDBGDHIID.exe 2976 injector.exe 1792 windefender.exe 3104 windefender.exe -
Loads dropped DLL 7 IoCs
pid Process 944 regsvr32.exe 1332 5743.exe 4500 91FF.tmp 4516 april.tmp 960 u12g.0.exe 960 u12g.0.exe 3856 taskmgr.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000900000002321a-518.dat upx -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 Destination IP 45.155.250.90 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JJDBGDHIID.exe" JJDBGDHIID.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 D270.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1332 set thread context of 2016 1332 5743.exe 112 PID 4388 set thread context of 216 4388 csrss.exe 134 PID 4388 set thread context of 388 4388 csrss.exe 135 PID 2716 set thread context of 4932 2716 csrss.exe 137 PID 4768 set thread context of 4584 4768 6DFE.exe 140 PID 2684 set thread context of 4364 2684 3064.exe 145 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2284 sc.exe 4832 sc.exe 264 sc.exe 3160 sc.exe 2960 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2392 2016 WerFault.exe 112 1404 2016 WerFault.exe 112 2620 4792 WerFault.exe 118 972 4584 WerFault.exe 140 4988 1384 WerFault.exe 146 232 960 WerFault.exe 158 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI digvhbv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI digvhbv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI digvhbv -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u12g.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u12g.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 660 schtasks.exe 1992 schtasks.exe 3944 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1000 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3856 taskmgr.exe 3856 taskmgr.exe 3664 d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe 3664 d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3856 taskmgr.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3856 taskmgr.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3856 taskmgr.exe 3856 taskmgr.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3856 taskmgr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3664 d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe 4944 digvhbv -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3856 taskmgr.exe Token: SeSystemProfilePrivilege 3856 taskmgr.exe Token: SeCreateGlobalPrivilege 3856 taskmgr.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeLockMemoryPrivilege 388 conhost.exe Token: SeLockMemoryPrivilege 4932 conhost.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 1404 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 3508 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 3508 288c47bbc1871b439df19ff4df68f076.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 2520 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 4464 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 3948 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe 3856 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4624 u12g.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 1332 3256 Process not Found 106 PID 3256 wrote to memory of 1332 3256 Process not Found 106 PID 3256 wrote to memory of 1332 3256 Process not Found 106 PID 3256 wrote to memory of 3168 3256 Process not Found 109 PID 3256 wrote to memory of 3168 3256 Process not Found 109 PID 3168 wrote to memory of 944 3168 regsvr32.exe 110 PID 3168 wrote to memory of 944 3168 regsvr32.exe 110 PID 3168 wrote to memory of 944 3168 regsvr32.exe 110 PID 3256 wrote to memory of 4556 3256 Process not Found 111 PID 3256 wrote to memory of 4556 3256 Process not Found 111 PID 3256 wrote to memory of 4556 3256 Process not Found 111 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 1332 wrote to memory of 2016 1332 5743.exe 112 PID 3256 wrote to memory of 4792 3256 Process not Found 118 PID 3256 wrote to memory of 4792 3256 Process not Found 118 PID 3256 wrote to memory of 4792 3256 Process not Found 118 PID 3256 wrote to memory of 2792 3256 Process not Found 121 PID 3256 wrote to memory of 2792 3256 Process not Found 121 PID 1816 wrote to memory of 2508 1816 cmd.exe 132 PID 1816 wrote to memory of 2508 1816 cmd.exe 132 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 216 4388 csrss.exe 134 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 4388 wrote to memory of 388 4388 csrss.exe 135 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 PID 2716 wrote to memory of 4932 2716 csrss.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe"C:\Users\Admin\AppData\Local\Temp\d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3664
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- DcRat
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3856
-
C:\Users\Admin\AppData\Local\Temp\5743.exeC:\Users\Admin\AppData\Local\Temp\5743.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 8963⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 10323⤵
- Program crash
PID:1404
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\C36B.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\C36B.dll2⤵
- Loads dropped DLL
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\D270.exeC:\Users\Admin\AppData\Local\Temp\D270.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2016 -ip 20161⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2016 -ip 20161⤵PID:2804
-
C:\Users\Admin\AppData\Roaming\digvhbvC:\Users\Admin\AppData\Roaming\digvhbv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4944
-
C:\Users\Admin\AppData\Local\Temp\CBC5.exeC:\Users\Admin\AppData\Local\Temp\CBC5.exe1⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10762⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4792 -ip 47921⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\B99.exeC:\Users\Admin\AppData\Local\Temp\B99.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2792 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "csrss"2⤵
- Launches sc.exe
PID:2284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "csrss" binpath= "C:\ProgramData\SystemFiles\csrss.exe" start= "auto"2⤵
- Launches sc.exe
PID:4832
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "csrss"2⤵
- Launches sc.exe
PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\B99.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2508
-
-
-
C:\ProgramData\SystemFiles\csrss.exeC:\ProgramData\SystemFiles\csrss.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:216
-
C:\ProgramData\SystemFiles\csrss.exe"C:\ProgramData\SystemFiles\csrss.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\conhost.execonhost.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\6DFE.exeC:\Users\Admin\AppData\Local\Temp\6DFE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\㝺㍢㕄砸䑇扸c"C:\Users\Admin\AppData\Local\Temp\㝺㍢㕄砸䑇扸c"2⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 18203⤵
- Program crash
PID:972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4584 -ip 45841⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\3064.exeC:\Users\Admin\AppData\Local\Temp\3064.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2684 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\8684.exeC:\Users\Admin\AppData\Local\Temp\8684.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\u12g.0.exe"C:\Users\Admin\AppData\Local\Temp\u12g.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"4⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:3656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe6⤵PID:2820
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:1000
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 23724⤵
- Program crash
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\u12g.1.exe"C:\Users\Admin\AppData\Local\Temp\u12g.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵PID:1284
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:2140
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:660
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 11443⤵
- Program crash
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2468
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2876
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:5044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1992
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2976
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:3944
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2128
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:2960
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\is-0JGE8.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-0JGE8.tmp\april.tmp" /SL5="$5047A,1478464,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4516 -
C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe"C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -i4⤵
- Executes dropped EXE
PID:2696
-
-
C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe"C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -s4⤵
- Executes dropped EXE
PID:692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\91FF.exeC:\Users\Admin\AppData\Local\Temp\91FF.exe1⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\is-NVFK1.tmp\91FF.tmp"C:\Users\Admin\AppData\Local\Temp\is-NVFK1.tmp\91FF.tmp" /SL5="$3024A,1643956,54272,C:\Users\Admin\AppData\Local\Temp\91FF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4500 -
C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe"C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe" -i3⤵
- Executes dropped EXE
PID:3624
-
-
C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe"C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe" -s3⤵
- Executes dropped EXE
PID:4752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1384 -ip 13841⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 960 -ip 9601⤵PID:3132
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3104
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
6.9MB
MD5fb389ed2c216fd1f7fd1c335fc85f44b
SHA19fa15ffbafa3e17549b735a431f692f95be8e933
SHA256de8d67fd0bfeb0c7ba78e642cc75df3f31613466051e884e0c02189dad60a8f2
SHA512df43cf93f728edb3aba11cc8f40d85a018bb228ee26a99ffa972817af6fca25a93d7aa9a76bb9464dbeaa237ede88218efcef6141a354877b6a1594188f5eeed
-
Filesize
6.1MB
MD59e9dd0562ba22b4581b592e574c709f9
SHA13fb79b06de14f149f70a353d192272626fe4a735
SHA256815aaf17fac9e3c1446923230be27fb9e0e0a2128dcd2590c1791206ef9de58c
SHA5120b3d487272a64e8b77a27fc630918e421ec3280c7d35a49e834a60d237a8c503f60984048803a1bd13297ddf9c6162fd4569a15d35e83bc77e36a4bdd1c6ac9d
-
Filesize
2.6MB
MD555e306bebe2c81057d8558ccce6f091f
SHA1b0c02653872e9935c9c930e07104d514574373d6
SHA2568fe39fad30fdd27f9fe5f46034b17a9ab05ddb7e14bde736313691bf7bddd335
SHA51245d4cd5a3d497d3290ea99321eaa43232c3b83fcf573138afba79e43ba79f23abe6a6b5cd936da41f719a47f7f0a88ca5737fa8f73a4f08775961ad4fa82b21c
-
Filesize
4.3MB
MD5b08700b4ea3c43945992e34b3c7ca8a1
SHA111958c7e84c853d294a242d16a0089fd42a7b10d
SHA25666d59f4837ae226914ea96dd74a47202cb329d5535993750c4f28a1c6cb85368
SHA512062f5e03534cfa1fdea793083cd545995fbc6686fdc802127b56fce26d67b88e9e97ee2f00900cd241e9b442852ad4c8a23551d5e1ad93d4bc30e433fd5c6a04
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
163KB
MD5420a051aaeb1c899b95d65f846589dca
SHA1881135c6486b132d46e2ce5bff064b8668ad77f3
SHA256b777314fb730f99ff6c35103e26628eee20bf2166496318a7b9da9044f632a00
SHA512d6fb8bdb79f94ff774badf81bc7551a2811e5da085b595d79f8008d98c90261faa6bdb5d2f617cfc35e5b30ab749e0b37b87366a1b6ba9297925260bc499926d
-
Filesize
576KB
MD58b744e85b34bc21d630c0669e5d457fa
SHA1e646ca548d94395ccc0da91142af69417390e722
SHA256b56ca41b73a778f6da5e2e6b4c747c32d184118b64f5d98d666431895baa3f11
SHA51254e703f9c4cd83313f4a959dd3607e605d47e2c73757eeaccfeccb4e84b0b44bef66fe2cf831992c4f87d78b1bdcbcc68cf72ecd882d8ede1482719ef1a1221d
-
Filesize
4B
MD5f2dd0dedb2c260419ece4a9e03b2e828
SHA10aaf76f425c6e0f43a36197de768e67d9e035abb
SHA25626b25d457597a7b0463f9620f666dd10aa2c4373a505967c7c8d70922a2d6ece
SHA512fecd7b408089255b3467dc1f7231cc6388c9e1c65dcaa5e50f3b460235d18bc44033b08184018b65ac013fdae68c0088381644a6302b9d89e468f57ff9a005dd
-
Filesize
122KB
MD56231b452e676ade27ca0ceb3a3cf874a
SHA1f8236dbf9fa3b2835bbb5a8d08dab3a155f310d1
SHA2569941eee1cafffad854ab2dfd49bf6e57b181efeb4e2d731ba7a28f5ab27e91cf
SHA512f5882a3cded0a4e498519de5679ea12a0ea275c220e318af1762855a94bdac8dc5413d1c5d1a55a7cc31cfebcf4647dcf1f653195536ce1826a3002cf01aa12c
-
Filesize
856KB
MD53ce2c4cb64ade4e937c2daa9819a95fc
SHA1dd7f22e1f690bfbbc28e917b29ec01da01c618c2
SHA256a99bf3d8604c60252977949a6b7be36368324c3b7b0db55d9da16bf796a1f9d8
SHA512fe54569227111d6e97b7fca8b98fcb3b5a28cf982366a17a40edaa4a21194a1f2ef70085fed997b406e0403e6d2deeb26a141266033b67bcc15d27989d22ac8e
-
Filesize
14KB
MD5c552651577a45ef74b5029d7e2f0fe18
SHA1add5ec61cf60dede73e4c05bd5ecef112707ce95
SHA256b6619b8d405978126ba853fb29f4ec37d154d4323937e3fb967730b17330d3ae
SHA51284f0919c3baf4226ed599858f471a51807ff905a838de4899b4e5ff644693136d0d98fd27e399a8ef2fb2946248c94f82c4b66a30de457c1da219d7b9703dea6
-
Filesize
1.9MB
MD58c2c5dc12085aa41954570aa2cd702b8
SHA1757d393669c8cc2f1dea878e7a116fcc591688fc
SHA2563973bdcfae8dbc943db694e13ee182b6dd1e06ab5983c41b454cd62b0def333f
SHA51290d2d41dbe747bd011be23e82d2dbf9874a38a7ab8a2cb16dfc55d6e0e3cd733a474ef8b803914e1c7a282cb9527e50aa7f629e790d03430d1103031bd316a1a
-
Filesize
1.8MB
MD5aa623945e48c0db7c50bc62016704730
SHA1da8e003a107cc80ea6cc818ea44b041719314968
SHA25654b32240776d5fc4e35568f2c9840e04150bbbc9653841550b98cdbbc975d809
SHA512cfa81366616d928cde855aa540c31e32c5b58d25db05e9d8efaefba4fe899d22c7dcbb60284045b3988a7cb678dd088755db966f202acef3cf86de7af614e0e4
-
Filesize
2.5MB
MD536e5c74739ce1d04df387cb30c6925ba
SHA183dc7e0a36d6b8b6fbc524b317da74a4f8685a3c
SHA2564385944236fe6960147b379c39571b810486cf3944514a8c1c63ccb6f6fa5c89
SHA512fcf26a0d596267c6958bca5689c86676c6f994202bf1aab86f23dd56daeee9bd0729632d799238e905ef41423144ff7e84e552103be23b1ccdd065a662193f1f
-
Filesize
2.1MB
MD5617d46f3afcceb83e4f38435c85a9193
SHA122b677a4b4b84b8962ef09fcf152e042055a7e94
SHA2569928791f4b0952630d66a2e60ef4921f276bc90204af0b5ac3b7d7d4fe11776f
SHA5125c91345090bdd3285717166add3db15e9db6363cb89de0e109e487fc066cbea72615cf749747056751fce183c166cf9e98e1417ab6f0beebb6296d08bf9a3cda
-
Filesize
4.1MB
MD5abc868cf6f8183990f8d476dbe1224ba
SHA1b9226909d1c0472af5eabd6949232d509ecf38cb
SHA25617573c321796456afc4e0fdf9eb00326636410dbbcd2c4c92495ef39a2f48924
SHA512d1c1e5c11cb58430b8f9455fbbdb094fc51cdb75382b1e7d1b03c08936f553cfb73c71c9869428e8a77ad3e9de8cde15bbd733b4843cb9ed9dc394d1a160ba01
-
Filesize
2.6MB
MD542a9f3e0c3055a0392c186c32b9d1bb4
SHA11335da3f3e178606a846a63fdd9ea62f7eef1da6
SHA2561ac8eea09ad61d97df446c250ed794b51bc1592bfe3f60fffbdead9a8c100637
SHA512a47e55126e5366a11122d3e45e3fbeab34c05835a7f8bb3f20b295186987ac095d4ab65eb3536f6254a4b894eedc110cb3805aa75e148bd9cabf88b20faad2cd
-
Filesize
2.5MB
MD56dd22dc9fe3c1224806279db0dd2dc8c
SHA1ee287cfc48b3cc48b8f89df6c742f8696bb9b225
SHA256934dcf414eb7844c5e3456daa4c31a3879a279db41a5b36008b70047f1ffcd0b
SHA5128841b634ca55e6ee00bd5de60c6c65753a3cac8306c0297438e5f15cd536e969d8e6ab7e21292081d2b18f59306c421dbcbc4d10ba5d2a10e1130122b71e474b
-
Filesize
2.4MB
MD5b4c77aaa26e437858f099abfdb8ee1f5
SHA1c0bd1444874a16b42a5d1e22b10e0744dd0f15c6
SHA256e564d98fbfb0405a28d41e54db998225decbe3574641c985f5d39d071f259f12
SHA5126fce5c77a06b6ec781af4717946c6ef680e411202137d07a026a5d519c59d15fdc682aee17137cdc8dd336256abe7a8727ad248a7b33723af9225a44f3e4d034
-
Filesize
2.7MB
MD53b81dfdfebfc9fe8ef2c628235ab4ab7
SHA10364d950223bbe4c656548946934820bbe57bc6f
SHA256b99061d7551600cd55733eddf4a5e3e48fc856855a5c90d427d161bbce839d1c
SHA5125f094c7ad7ea2ccff66a7cffe1813941a048ad29bf7a83f4091697e8b1c6418a1104ce5a61547998330bb7652968bfc32a4e38a1789f9f6cc48b72d1b5bd7708
-
Filesize
258KB
MD5fb7d7239d00d4f28dacb1af390061517
SHA11ec0c1fbf666ba9a2c40b2f5a555035e0f89a53a
SHA256ca87c7d4d0793caa2f79b7503d8e08b8b20dc2234492d35396fd118c277c565c
SHA51291400915a3f9d771fa85408b2c65078d9ea1aab4fe141e21f302448f26b5c8734ab4936cdd9c93ef44a02eb76833d83fc32359460a2b1d5de9393fcec4f25bf9
-
Filesize
194KB
MD5440d300fe8047bed52f06e3e001569be
SHA1892458b31b09bc38adf4316e188e6d7525485073
SHA2564c5b67bc04466b44c33532a98759b315293712fb122c1ea4f276f1acee20f6e8
SHA5125d2a9148aa5c7495d29ffd468c15946eb2a73b5cb284bd82b029985c3b0a040c7dab94c1391891a2679831d1c356fc9f7a2c7c1fc69afea3ded52921a4aab17e
-
Filesize
2.1MB
MD51cdd589d8a2441ae48cbf2a2b3a4b971
SHA1f86c0dd29a5b07a50d9397f74a03ef1aabdec3df
SHA256f47ae060b95211ccdffa19acdd3f26964f40b39fa288a8f6a469964a96125f3b
SHA51200053cb50dae4403f5f00dc027c1d539d9a99934d37052afd5a4568227e02f83dacf5c45aa1899381331b3ae0eb5f3f3a06da2f7fde7a6da1f15eb645b0be74d
-
Filesize
1.7MB
MD5a55ed7550e830248e3e7837fe689827c
SHA1b3cc4c0ed2ddbf41bfb3530de93d1859773a9475
SHA256bf30679ec471705adfe136a75aea30d5598641803fbf5ae158011b332c28cb18
SHA51242b181075dbc5b82d320f5b3928934bebfbacce8b4304c62e27e46993dc48ce59c91065a75872aa76aa7416a84a4ec846da489b5490fe7ba0008ba075b5ab637
-
Filesize
1.9MB
MD512c0e9872b1f975e014f6971d2901b9c
SHA12747af2fa099a3e2897c98d0c2ae10efb91ffcbf
SHA2569b1882e78875196fcc56470994ba043b2109f7ebd2871905b1f13b286749cf8f
SHA5129d1a769091c52ba380be7e08bb63669dd7298c3de8395f8a469f23a9bfb638359d1b422d3fc2db6fa320210c883862f2ed9662a678fe72c0c685209d1bc5411f
-
Filesize
1.5MB
MD5113c4e7ec5d8998d0807672525d1d67a
SHA1676778e5518ce38d603d4e2b7930358de4b00fbb
SHA2564e33f47a4dcfefa9714d67b91fc09e15add44db0ea66a0bfd7f0c4b977f66899
SHA512db71c9c10ab8b32968961358bcf94b6a24ab6d260864158406b9b9b61ce977f1349c0dc720929800506f2c9d51e1a31fbbff9eec9fb4691cd367ab6c5cf6fec1
-
Filesize
5.9MB
MD5a3ff8b9c8da4315f1188fc97649b3ad1
SHA1a33e754466f63412733e61883d8f3e50ea59e41a
SHA256d7734cbccd3a3d77cf3a2d29ab01f1a7e33360fc1ecd5eacdf0bacd24ce967b9
SHA512ecae64af1675f9620c30cbd65c0a7e9a6a84b1db165b10fbb87a06fc4c873e93e6b7155002214f8446875c269272ef1f6c944628ddbadc9d6df425cf2ed52dd8
-
Filesize
5.4MB
MD594747f53ec89cd6dc330c01cfaf3fa6b
SHA15d5e438442692f30a68f32906c64f6a9c46bd803
SHA25655733ad32d880c6d944a88e2393751e06e99fbaf8d0bf71566d136213de01872
SHA512c9d2430817526faf40526f5c364b08aa58ca686e1a513f3444f753ad903aad242c05d0162d10d54f29df0a6e2a7b40cd7af815851d35e20872e4ac5e02835e7f
-
Filesize
2.9MB
MD5441e0b373665cbb5c31b83046144c19f
SHA1d8df44336a6933c8bbc8ef3e7417771a04bdf72c
SHA256cf5db7b441e8c5c899f808436d53848b2d37ba3167776902e3ad94a2629f7b30
SHA512e9afa8a09a5b9b32562c10c28348cac3bb25da25dff6bb638f2c1460ceb8ec517a1a291fbd2066de938adbce5787e068bf1454cd63f2113942bdca160aca2d96
-
Filesize
6.0MB
MD5754c89bb86b1dcfa3439879b90a0454d
SHA1e208b934cee6006237c378d5afc8b382f93e2217
SHA2569047c1300c1738def1558c1589c3010544b913871ba1db0a029bee7d900b67cc
SHA512618857849c8020c9bd8104f1d7b26913615a4fe5d9f52d07979d52d663ace5ea8cb683ad0165c91bc5641fbb2d67030428bc80850abcb44d77d604b8dd14371f
-
Filesize
554KB
MD5a1b5ee1b9649ab629a7ac257e2392f8d
SHA1dc1b14b6d57589440fb3021c9e06a3e3191968dc
SHA2562bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65
SHA51250ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b
-
Filesize
366KB
MD5f98c75a2502a2f5251b262e4aeaf1c16
SHA10edb55ec7e7768a39f1bf37dc27aecd04507f63c
SHA256392ff6fc0a544611919098a630cebfd47ecd210cdc34c97081bfe31c938ba67c
SHA512b05969d381c66f06b3ec8af2a76312e3bf6cef34e84ef062685a16062ee50f0aa198a8d2d7641939ec2c66f08e3439357f15087eb51a7ef1b63a6683a129bd58
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD555b6c10a35399e2e8b25a4d7bf21a9b5
SHA1f50fcc707bbdeb121d33f1e76e915fc98541e798
SHA256af55ab0993c59466b348f0cf0fc05f606910ed19fe81c1f04b5e19d885a3aecd
SHA5120ea5159ee941371c3f4b3f7dbe23e80ac97c510799bb9e96c32417f0767cafdec4d13c34f55bcb26223e0457ac2d234b87bd1e0d6c079f9833c5620c2255149e
-
Filesize
896KB
MD5909cc21ca77aa84e90637926823577f4
SHA168a104ee3641a29e53e03533bb9ca7c3b32e9cc3
SHA2560a10223f76ff767f6dda39493d1f8d94c53e01c03e5e0c8669865bf32ead78d6
SHA5121b596d8603cb10bf87ce266346e43b1e9d8f0eaa78256314542c923d05c9d6eea2082f2ce40649170961a3519f16530908d1d4fffd13535cfe5494b785e15709
-
Filesize
1.2MB
MD55ea8a2c88594f2ca90100e2197789f06
SHA103fe75e3631cfa435ea4aa49b9d16d3256ee23f8
SHA2564fba01cc0930ab66f5c3ed21464227a1978e08e4ea7aa867e95fdf457e772836
SHA512049080527c7404c9b835924143c39888aa31353477b9ecb9f7447efb6e33a7a404e20881fd754d8ee9e23df93d6405b514e4e5f507766376bd3d9e44b3b5adc8
-
Filesize
256KB
MD5953c00d92ff1336d1db8052616abfa74
SHA1038efbda17bc77980d505398425211776ded2f4a
SHA25687b0950dda8f940b7d5765c91a2915524011754c448e1a2f28c9e330ee425fb9
SHA5122b2d35676d1f858aa6cf78c1a517cfe9e997c7e79ddcbba28ac5a8fed9bc101cb42cc6f814aa290a9960b6af7a98210d71023ff893d9866a6bf8d916cd96705d
-
Filesize
192KB
MD5115eab531930265a00fb23e55fc31990
SHA12de77c75b43892aa0d7511e3a99b8f9848827786
SHA256744418eaaf23c708479a42a57e1c17d792dd6714b4478d8e856f07b65b8dacf9
SHA51238c86b40e56251aa4dace68bb98ec6b49b9d5eedd2aa7686323fc32ccd6302740038aa573ab27af425a62870a87d0facaacaa01864956354efdb22b154bbc58b
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
221KB
MD5f2f1385bc802279c033efe2ab64867c4
SHA1c6a01b873e5b77232e1523c1e1df3fae02aee18c
SHA256cd4734f9192d1094da769a96899e9e9a45b4c63c02cde51d1ec6f788f0d12d2d
SHA512a84af2fedf5be38950c30426991b622598515a379d946e806cadf5be7e95884bd8afca7edc9f76b13bbef5c251c2e21481768484f77016909b829534700294a7
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
38KB
MD53992f464696b0eeff236aef93b1fdbd5
SHA18dddabaea6b342efc4f5b244420a0af055ae691e
SHA2560d1a8457014f2eb2563a91d1509dba38f6c418fedf5f241d8579d15a93e40e14
SHA51227a63b43dc50faf4d9b06e10daa15e83dfb3f3be1bd3af83ea6990bd8ae6d3a6a7fc2f928822db972aaf1305970f4587d768d68cd7e1124bc8f710c1d3ee19a6
-
Filesize
1.5MB
MD563ea0347e1fe9e7e316dd4cee2955e37
SHA12cb8fb83e0132dfa005f0d67cc0addeffb66ee03
SHA2565c889633d065ff47815ccab303228bf08f2b882a5298eacc015ca03de2feeadc
SHA512e62cee8e175b2bf9b9142a8c3ec634508770459c8d9c6abea8470ef9f3eda3f46f987db1f6931a70cf56a3885ad6400ddb6a40c93d18e53996cf72ff7cf93d2b
-
Filesize
576KB
MD57bad3244ac981f97cdc4fd97d96f402d
SHA176d16114dc353d35157079f2f0c204fec47acc0e
SHA25678d1444a6510936d45e1dc00dbbac25cebacfc23be2b0874734d2cd88468d0f1
SHA51299fd8d820be5b9589fa4473720f9706dc8adc7122a293bcfdb726552e25140f47f0569e4669ac6f32d5581510b046966405ec3022e7818be27bce490f8d174ae
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
209KB
MD52cb4d9235c8edfaeeedf9258177cec57
SHA1401520c963a302e4df292c032416febec06e5666
SHA256d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278
SHA5125d1059c1618e8cf1645a7775da743b02ef387d249c6b263e20ade68362ee06e43548293c1bb224719014618458b6bb6b00c7664fbea97b2414976ce980a8d950
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c5fc920bd798adf2ba1d7a21939420ca
SHA1156d18cf971ebbb7c718e3ffa2999267b0a21071
SHA25621bbdeed04bdd90b06d782c882165d8025942f8e5550aa85d009fd11b2e63442
SHA5120381c2cede613c4e93024b81636fbb44d76f8e8de1cdaf00dee948bb942430edfc85ebece856aec93200989f186d181304ac6e09744321443fc3f190c0a293f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58234490132f4e16500172b6ddc2ed770
SHA1749f1715e03c9954bc9015d73f2ea1b8be6b0218
SHA25619b83a120748d3f30d2cc5f8e1b6614f8840cdf893ac740ea2aa5ebb12605832
SHA5129b1ce3ce60628f1d0464b6f1568be5ca622de6362a79fcb032b860d64ed1538933617060925d4c78d9d0c4e3d378f0b643e6ed917c0f9706e98fd2bb4f6f659a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5eb4bd6583b07f9323a3ba87daaf45db3
SHA1716fe80cee1fe6ee9fb3e5302486aa1c7732ff46
SHA256d441f82eeec320fb839bedeeb0a487b90fd99baf4cfef49fc772c6772c733681
SHA51279fdec88830544f1c54f9c7cb87369ca1af139a6ccbaa1545f3f45af3f6352b4294bbcacb58b5843b9b1afb721157375c1ced653121003a95279d8b387320204
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e545a97c0510dc4b042aeebc382c3a82
SHA15c3fc25125c89d4fb8da81ef8135ad9175b371da
SHA256b8946f680b10c6c7f1880bfafef4c2cb2e6b9a9a4e73688fd1e8ba7909951549
SHA51211e253b02860654d24cc180c4686e55ba87fd0de07e17a17d78c2c1f2769d60dbc09b6096132ce06339ec47c70921068f54ccd4ec6f83254025e3041fd596017
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59ad435167f6ca6ebbe8d0e9feef916a1
SHA12387de60e066e3b509b2842007a65e10659c00bc
SHA2562f5cf56ba962a09ca98097d5d5a9046a1213f2bebf3bb75da91b52e04d7fcb45
SHA51260c6194b77cfa090089b8929a0526693ff49f00bd81f8b3ab9ecd544d37331a06dcf2d88b6fffba85b5368524831200595e8b6579eb38055a3da9e780a1174e4
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
2.6MB
MD5df190521162efa8ce7216c58eb9fc1d4
SHA1d3dded830143c8cf6595ed4b544cedd390166872
SHA25605333e7484646c7d9ae1441abe5b4d968694936da36f295685712a7386004db2
SHA5129d45fabaa9a6fa843c1b26edf5e046237017d34712de29177e5b3309b34f01a75db1d2e99b2bb43b22a1f1cb83bb464d9534440773f50be02877188897c999b3
-
Filesize
2.7MB
MD5f7f1d61ee3e8ec8ad87605be88ca7ea1
SHA1e0defcd3a5436ed613f87d932be720aa825f680a
SHA256d871497296bb83c0e5a9e8ae81a077dc6eb9a50d7a953d2031d12aa97c6cf082
SHA512769a7773403d9fbe5ed7f78ffdbc9552a3e1f5cec7739a155514ab7ea95a9388aa8c91f88e2ffd3f110fac57c573e391b61d031411b5b04f38cbde1bbc60e512
-
Filesize
677KB
MD5246d2d67c9b6c276597b936347d66273
SHA12a1994f6b6fbbb4948e40bc75bfb038c778855b8
SHA2564e5ca184b8077fc2aa07e18dc4e6e82eda07eaf93eb4ebd25f3cc618ab57789e
SHA512c6bfe9232aee3b0d3a6a569b85b9d6ff22bb5099b494341c49cfdbc7b3b1018a669da058fcaf4f4bbc73146c668093b906ab6a1b062fd19ed754e6fdab7afc92