Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe
Resource
win10-20240221-en
General
-
Target
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe
-
Size
305KB
-
MD5
4cd7bd5eb42f178955565815376b4675
-
SHA1
ad4290f9aeef9c8a730712a00918dcab76accad6
-
SHA256
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd
-
SHA512
bb4b30fd84d125027fa4f2f692b830cb96ad18948789387d29b0d60ec3a7d4cd48d581fe793404410274c4eb76a65b16be74bc82ea4bd4a1ce7ddcd37b60b785
-
SSDEEP
3072:OBw4siyVXC+z/7+EX4NxdsIP+vmVAPznIRjWg1QmgVbjhIjnAG:l5CK8F+vmWPDOjd2mgVbjabJ
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://herdbescuitinjurywu.shop/api
https://relevantvoicelesskw.shop/api
https://asleepfulltytarrtw.shop/api
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 -
Glupteba payload 9 IoCs
Processes:
resource yara_rule behavioral2/memory/2308-79-0x0000000002E50000-0x000000000373B000-memory.dmp family_glupteba behavioral2/memory/2308-81-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2308-366-0x0000000002E50000-0x000000000373B000-memory.dmp family_glupteba behavioral2/memory/2308-377-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2308-502-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2308-750-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1580-1064-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1580-1597-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1580-1601-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
amadka.exeexplorha.exe49CA.exeexplorgu.exe29142a0480.exeexplorha.exeexplorha.exerandom.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49CA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 29142a0480.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 76 4428 rundll32.exe 91 3960 rundll32.exe 113 4536 rundll32.exe 118 5776 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 912 netsh.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exe49CA.exeexplorgu.exerandom.exeamadka.exeexplorha.exeexplorha.exe29142a0480.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49CA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 29142a0480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49CA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 29142a0480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe -
Deletes itself 1 IoCs
Processes:
pid process 3408 -
Executes dropped EXE 44 IoCs
Processes:
FAEA.exe225A.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeapril.tmp3789.exeu3po.0.exeEasyApp.exeu3po.1.exe49CA.exe288c47bbc1871b439df19ff4df68f076.exeCGCFBFBGHD.execsrss.exeDDDD.exeE7E0.exeexplorgu.exeosminog.exegoldprimeldlldf.exeinjector.exerandom.exewindefender.exewindefender.exeamadka.exeexplorha.exefullwork.exeTeamFour.exeexplorgu.exe29142a0480.exeexplorha.exealex1234.exepropro.exeTraffic.exeexplorha.exe987123.exeISetup3.exeyoffens_crypted_EASY.exeu4qg.0.exelumma2.exeu4qg.1.exeexplorha.exeexplorha.exeblue2_A1.exepid process 1988 FAEA.exe 3888 225A.exe 4812 InstallSetup_four.exe 2308 288c47bbc1871b439df19ff4df68f076.exe 4468 EasyAppns.exe 1020 april.exe 5084 april.tmp 1216 3789.exe 1800 u3po.0.exe 4144 EasyApp.exe 1092 u3po.1.exe 4516 49CA.exe 1580 288c47bbc1871b439df19ff4df68f076.exe 1920 CGCFBFBGHD.exe 1696 csrss.exe 1836 DDDD.exe 4680 E7E0.exe 704 explorgu.exe 4932 osminog.exe 2136 goldprimeldlldf.exe 2416 injector.exe 1340 random.exe 4556 windefender.exe 5076 windefender.exe 4560 amadka.exe 508 explorha.exe 2824 fullwork.exe 432 TeamFour.exe 3128 explorgu.exe 3560 29142a0480.exe 1052 explorha.exe 3492 alex1234.exe 4864 propro.exe 3032 Traffic.exe 5400 explorha.exe 5972 987123.exe 6136 ISetup3.exe 5444 yoffens_crypted_EASY.exe 5624 u4qg.0.exe 5920 lumma2.exe 6008 u4qg.1.exe 5184 explorha.exe 5632 explorha.exe 5320 blue2_A1.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
random.exeexplorha.exe29142a0480.exeexplorha.exeexplorha.exe49CA.exeexplorgu.exeamadka.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine 29142a0480.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine 49CA.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Wine explorha.exe -
Loads dropped DLL 10 IoCs
Processes:
regsvr32.exeapril.tmpu3po.0.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 3296 regsvr32.exe 5084 april.tmp 1800 u3po.0.exe 1800 u3po.0.exe 2316 rundll32.exe 4428 rundll32.exe 3960 rundll32.exe 4620 rundll32.exe 4536 rundll32.exe 5776 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx -
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
CGCFBFBGHD.exe288c47bbc1871b439df19ff4df68f076.exeexplorgu.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CGCFBFBGHD.exe" CGCFBFBGHD.exe Set value (str) \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1903027113-674645041-2759338396-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
E7E0.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 E7E0.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
49CA.exeexplorgu.exeamadka.exeexplorha.exeexplorha.exeexplorha.exeexplorha.exepid process 4516 49CA.exe 704 explorgu.exe 4560 amadka.exe 508 explorha.exe 5400 explorha.exe 5184 explorha.exe 5632 explorha.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
osminog.exegoldprimeldlldf.exeDDDD.exefullwork.exeexplorgu.exeexplorha.exealex1234.exelumma2.exedescription pid process target process PID 4932 set thread context of 2196 4932 osminog.exe RegAsm.exe PID 2136 set thread context of 1036 2136 goldprimeldlldf.exe RegAsm.exe PID 1836 set thread context of 4436 1836 DDDD.exe BitLockerToGo.exe PID 2824 set thread context of 4368 2824 fullwork.exe RegAsm.exe PID 704 set thread context of 3128 704 explorgu.exe explorgu.exe PID 508 set thread context of 1052 508 explorha.exe explorha.exe PID 3492 set thread context of 3176 3492 alex1234.exe RegAsm.exe PID 5920 set thread context of 6052 5920 lumma2.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exeamadka.exe49CA.exedescription ioc process File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorha.job amadka.exe File created C:\Windows\Tasks\explorgu.job 49CA.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1276 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2792 4144 WerFault.exe EasyApp.exe 4684 1216 WerFault.exe 3789.exe 4664 1216 WerFault.exe 3789.exe 1472 2196 WerFault.exe RegAsm.exe 3900 4436 WerFault.exe BitLockerToGo.exe 2324 4368 WerFault.exe RegAsm.exe 2388 6052 WerFault.exe RegAsm.exe 5988 6052 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exeFAEA.exe987123.exeu4qg.1.exeu3po.1.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FAEA.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FAEA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4qg.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3po.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4qg.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3po.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3po.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4qg.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FAEA.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u3po.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3po.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3po.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 868 schtasks.exe 2116 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exenetsh.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" windefender.exe -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exepid process 3916 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe 3916 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3408 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exeFAEA.exe987123.exepid process 3916 30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe 1988 FAEA.exe 5972 987123.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 4704 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 2308 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2308 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 3132 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 3736 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 4448 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
u3po.1.exeu4qg.1.exepid process 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
u3po.1.exeu4qg.1.exepid process 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 1092 u3po.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe 6008 u4qg.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe225A.exeapril.exeInstallSetup_four.exeEasyAppns.exe288c47bbc1871b439df19ff4df68f076.exe288c47bbc1871b439df19ff4df68f076.exeu3po.1.execmd.exeu3po.0.execmd.exeCGCFBFBGHD.exedescription pid process target process PID 3408 wrote to memory of 1988 3408 FAEA.exe PID 3408 wrote to memory of 1988 3408 FAEA.exe PID 3408 wrote to memory of 1988 3408 FAEA.exe PID 3408 wrote to memory of 3044 3408 regsvr32.exe PID 3408 wrote to memory of 3044 3408 regsvr32.exe PID 3044 wrote to memory of 3296 3044 regsvr32.exe regsvr32.exe PID 3044 wrote to memory of 3296 3044 regsvr32.exe regsvr32.exe PID 3044 wrote to memory of 3296 3044 regsvr32.exe regsvr32.exe PID 3408 wrote to memory of 3888 3408 225A.exe PID 3408 wrote to memory of 3888 3408 225A.exe PID 3408 wrote to memory of 3888 3408 225A.exe PID 3888 wrote to memory of 4812 3888 225A.exe InstallSetup_four.exe PID 3888 wrote to memory of 4812 3888 225A.exe InstallSetup_four.exe PID 3888 wrote to memory of 4812 3888 225A.exe InstallSetup_four.exe PID 3888 wrote to memory of 2308 3888 225A.exe 288c47bbc1871b439df19ff4df68f076.exe PID 3888 wrote to memory of 2308 3888 225A.exe 288c47bbc1871b439df19ff4df68f076.exe PID 3888 wrote to memory of 2308 3888 225A.exe 288c47bbc1871b439df19ff4df68f076.exe PID 3888 wrote to memory of 4468 3888 225A.exe EasyAppns.exe PID 3888 wrote to memory of 4468 3888 225A.exe EasyAppns.exe PID 3888 wrote to memory of 4468 3888 225A.exe EasyAppns.exe PID 3888 wrote to memory of 1020 3888 225A.exe april.exe PID 3888 wrote to memory of 1020 3888 225A.exe april.exe PID 3888 wrote to memory of 1020 3888 225A.exe april.exe PID 1020 wrote to memory of 5084 1020 april.exe april.tmp PID 1020 wrote to memory of 5084 1020 april.exe april.tmp PID 1020 wrote to memory of 5084 1020 april.exe april.tmp PID 3408 wrote to memory of 1216 3408 3789.exe PID 3408 wrote to memory of 1216 3408 3789.exe PID 3408 wrote to memory of 1216 3408 3789.exe PID 4812 wrote to memory of 1800 4812 InstallSetup_four.exe u3po.0.exe PID 4812 wrote to memory of 1800 4812 InstallSetup_four.exe u3po.0.exe PID 4812 wrote to memory of 1800 4812 InstallSetup_four.exe u3po.0.exe PID 4468 wrote to memory of 4144 4468 EasyAppns.exe EasyApp.exe PID 4468 wrote to memory of 4144 4468 EasyAppns.exe EasyApp.exe PID 4468 wrote to memory of 4144 4468 EasyAppns.exe EasyApp.exe PID 4812 wrote to memory of 1092 4812 InstallSetup_four.exe u3po.1.exe PID 4812 wrote to memory of 1092 4812 InstallSetup_four.exe u3po.1.exe PID 4812 wrote to memory of 1092 4812 InstallSetup_four.exe u3po.1.exe PID 2308 wrote to memory of 4704 2308 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 2308 wrote to memory of 4704 2308 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 2308 wrote to memory of 4704 2308 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 3408 wrote to memory of 4516 3408 49CA.exe PID 3408 wrote to memory of 4516 3408 49CA.exe PID 3408 wrote to memory of 4516 3408 49CA.exe PID 1580 wrote to memory of 3132 1580 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1580 wrote to memory of 3132 1580 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1580 wrote to memory of 3132 1580 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1092 wrote to memory of 3736 1092 u3po.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1092 wrote to memory of 3736 1092 u3po.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1580 wrote to memory of 3732 1580 288c47bbc1871b439df19ff4df68f076.exe cmd.exe PID 1580 wrote to memory of 3732 1580 288c47bbc1871b439df19ff4df68f076.exe cmd.exe PID 3732 wrote to memory of 912 3732 cmd.exe netsh.exe PID 3732 wrote to memory of 912 3732 cmd.exe netsh.exe PID 1580 wrote to memory of 4448 1580 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1580 wrote to memory of 4448 1580 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1580 wrote to memory of 4448 1580 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1800 wrote to memory of 2332 1800 u3po.0.exe cmd.exe PID 1800 wrote to memory of 2332 1800 u3po.0.exe cmd.exe PID 1800 wrote to memory of 2332 1800 u3po.0.exe cmd.exe PID 2332 wrote to memory of 1920 2332 cmd.exe CGCFBFBGHD.exe PID 2332 wrote to memory of 1920 2332 cmd.exe CGCFBFBGHD.exe PID 2332 wrote to memory of 1920 2332 cmd.exe CGCFBFBGHD.exe PID 1920 wrote to memory of 3048 1920 CGCFBFBGHD.exe cmd.exe PID 1920 wrote to memory of 3048 1920 CGCFBFBGHD.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe"C:\Users\Admin\AppData\Local\Temp\30bc317abd2e1d88cfd57d59bcbeba370a52a19dae7abaa60313204ed08984dd.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3916
-
C:\Users\Admin\AppData\Local\Temp\FAEA.exeC:\Users\Admin\AppData\Local\Temp\FAEA.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1988
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\DE7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\DE7.dll2⤵
- Loads dropped DLL
PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\225A.exeC:\Users\Admin\AppData\Local\Temp\225A.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\u3po.0.exe"C:\Users\Admin\AppData\Local\Temp\u3po.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CGCFBFBGHD.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\CGCFBFBGHD.exe"C:\Users\Admin\AppData\Local\Temp\CGCFBFBGHD.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\CGCFBFBGHD.exe6⤵PID:3048
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:1460
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3po.1.exe"C:\Users\Admin\AppData\Local\Temp\u3po.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:912
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4036
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:1696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4088
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:868
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1552
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:2416
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:3044
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:1276
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 9724⤵
- Program crash
PID:2792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\is-G09H3.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-G09H3.tmp\april.tmp" /SL5="$60236,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\3789.exeC:\Users\Admin\AppData\Local\Temp\3789.exe1⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 9882⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10042⤵
- Program crash
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\49CA.exeC:\Users\Admin\AppData\Local\Temp\49CA.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:4516
-
C:\Users\Admin\AppData\Local\Temp\DDDD.exeC:\Users\Admin\AppData\Local\Temp\DDDD.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1836 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 8923⤵
- Program crash
PID:3900
-
-
-
C:\Users\Admin\AppData\Local\Temp\E7E0.exeC:\Users\Admin\AppData\Local\Temp\E7E0.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4680
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:704 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 11244⤵
- Program crash
PID:1472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1036
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:2316 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4428 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:3044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\903027113674_Desktop.zip' -CompressionLevel Optimal4⤵PID:4780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1340
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:508 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Executes dropped EXE
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\29142a0480.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\29142a0480.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:3560
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4620 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4536 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:4504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\903027113674_Desktop.zip' -CompressionLevel Optimal6⤵PID:3624
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 11524⤵
- Program crash
PID:2324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Executes dropped EXE
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3176
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4864
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
PID:3032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:4712
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:6076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"2⤵
- Executes dropped EXE
PID:6136 -
C:\Users\Admin\AppData\Local\Temp\u4qg.0.exe"C:\Users\Admin\AppData\Local\Temp\u4qg.0.exe"3⤵
- Executes dropped EXE
PID:5624
-
-
C:\Users\Admin\AppData\Local\Temp\u4qg.1.exe"C:\Users\Admin\AppData\Local\Temp\u4qg.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"2⤵
- Executes dropped EXE
PID:5444
-
-
C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 7924⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 12204⤵
- Program crash
PID:5988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"2⤵
- Executes dropped EXE
PID:5320
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5076
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5400
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5184
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
527KB
MD5f5a7589d2d30519ad9ed81210b2c3726
SHA137a6956bbfdc3ec8652d6116cb564904f82cda65
SHA2568bbb641b9a16ae17a20922447fa9b73d3e767516870b4536e784e84e19f3c3a4
SHA5127e25860d83c4631dfc59fb0f85f136285bdb15176fca06c7c8d2df39ec5e749eb17eb88999d550f679bc175b3ddd79e477e2ba2664dce22c012ae8ad38561aed
-
Filesize
389KB
MD521a68df5f6104108ad89424c2c9d6684
SHA1b4e7d6b38b13fd834ef84bd0ac224774dee1924c
SHA2561e1e813a2c0eb98f114958be835024328f945ae6b07261e0398bac01b224fa3d
SHA51266ebdbee720b055140ac61e0994bc83d7aded05bcf2f79c12a8ba282ad34375f005bf22fef933e02f025ccea28ebc34529c87d1b1101b59d2760ab8cda31bd14
-
Filesize
1.8MB
MD5cf03bdc20ea3733b3b7504b8c2b80c0c
SHA1dc13cae80fe4c69c286ebd3c016d633a9e4ae5d3
SHA256065e12d31345139cd23fd62e9b51f87bf9e0b4b6f9e12487b4b0bc6af375e98b
SHA512b434905da512130b55b49e33ab6cdc3968400b6776461861512fb66a68f6e950c55dc18d7672f61e3091cd1fccd30b5a20578bd1d2e779e02c337bd83750d77c
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
2.9MB
MD5aafc00662f8c68cbd45a08c885a2d6fc
SHA1bd1f70f190579debb213bf3022a304c0d9ce6a9f
SHA2568003cded35a962784da90078ec690fa1a6ee9d565d1d9da457811e292745d955
SHA51220a61dbfa4ab76de740fea6d976e3ff3f48f7b2649dbe10c2f545c0c45a272652b951c6e7ca5a9d31a90ac157498a2368f0f0b72657348d23614d75da4207774
-
Filesize
1.8MB
MD5444532fcd858195a7e6e08dc42d9b119
SHA1d6648434771b3072314ae6f170a771f0f1e9408d
SHA2563c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1
SHA5124f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2
-
Filesize
896KB
MD5203db991985ec1fb80c1eb8cf156cabd
SHA1e34ee0e878021816a81b9e04313833686c3be74d
SHA25614df113e769a5bfcb187f9f706dc8c14cf6f46ad587fbd26397ad21a387c891a
SHA512ec0934c4aa7d703a8c953e2a5f7c7a192c0e33723d36abe68d56c38351e53257af071ac152a408e7565a43364271bbecc01f6b80addff6839790f6a13e7f0c6e
-
Filesize
576KB
MD5d1fc5f7386e62f8fef5dc2f1dad205b9
SHA13c1d44e3e68f20e6b7a95cadd151d96778da97ae
SHA256d38b81ccfdf090fe35f302e758251ce2151e7a684196cac899ce2dcceb77ccd2
SHA512d6138779737863467a16343311f527add43f890d46922caea82f828ee940d00b35053b63aa6df95634fd6e52654feb089bb7960eb732175befa8f5810d82b3e7
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
231KB
MD57381ea960bed2021a7761d78049d038b
SHA19ab316797a88ddfe7d95a0e74801b5e1851ff640
SHA25639020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed
SHA51252cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c
-
Filesize
410KB
MD5c2d63badae88b87da297268bf006b8a3
SHA1b7983a8b1d5d438a80e401f5bc073aff8701735c
SHA256db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d
SHA512f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20
-
Filesize
832KB
MD5e3c0b0533534c6517afc94790d7b760c
SHA14de96db92debb740d007422089bed0bcddf0e974
SHA256198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952
SHA512d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e
-
Filesize
322KB
MD53c30dbf2e7d57fdb7babdf49b87d8b31
SHA133e72f2e8e6b93a2ecffccba64650bda87e08e0d
SHA2568d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
SHA512c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657
-
Filesize
5.6MB
MD53abe68c3c880232b833c674d9b1034ce
SHA1ab8d0c6b7871b01aadac9d8e775b2a305bc38a6b
SHA25607632170506689c16d08c0ffe3b8ac37f959a35e5a4ac811e38318ac83b58f92
SHA512bb44f8d068e360427fde7015d7b845ecd1f58f4f11317e6fa1a86f24a2744f23e5f60c9019818a800f4a01214513be4978126edda298778b3f9b19d8c7096351
-
Filesize
1.7MB
MD5ac26ad10945b2c8e7cc1f7fd5835510a
SHA1c43b4a1c0fc9e688c06182259421052f53a0b55f
SHA25609091f0c570502554ba3fa64db6fbc6e0f29fd4070d1cb43cdf411233493b5cf
SHA512e71210a5ecfa2e0b6fac2a37c05716d946534beb4518ab0fdceb600ebd7c267052782915229d2ceb28017152c0851b2b4821d7b74ecae6506e0f7a31644da9f1
-
Filesize
1.6MB
MD58f1ac43ee49d5872c65553185e223c21
SHA13c6ec1aa9a463802bb32a2e8c582f9805844f20e
SHA25644aff6b5918dfb9084cac32b1f76eb529b6c4d166b28f2bfb86280703d8bdb58
SHA512aba23231fc023a379b9a574abb6112a54a8b7568fa3fb7d33e605e5f4611173c33b5b1e2dd6ea4d0003af06a76dea12d3d13cff7363f0f2635cf8f6a7ce9fec2
-
Filesize
3.0MB
MD5d1f66a1bf396a36f189e94b11c0d7155
SHA1f20471b0631cd85289f5934bb9f0f596f32da519
SHA25684f554dc9b699e89f303fb09fe5e36ab2dea56cb59edc42dc2be52f35c8311b6
SHA512b0e1051d1cd32597c22f45b2a6c7d3729c90f422ca292d56a7c4830b8c015b93b9e3ceafb967b54190d148722cb82a73d4c1dd005651aaad265c3ed875404afb
-
Filesize
1.4MB
MD547ed9b4a796eff4d099b1ee117ffcb33
SHA15dec55eed196e535899d686c2ffc60be9805d329
SHA25653dec4fa70ca163edf42e213bc35768d4d1d1c50df73689f1568b33b00aa4e1d
SHA5127e7b0474c9144d43042fb35d67a3d30d4434dba921db267427176bc27f5351dd0b894a2e720226ad9aeb7cd0b60e3fbca22b6cf1d4820bb9822a92bbaf519a7c
-
Filesize
695KB
MD5b65d0222719bbb66875cfda609d3489a
SHA1020b468917dd73ccc343cb0bc2117e713c8fd8c9
SHA2561cc172e1120fc965086c5f4792ada2b0fbd2114ab57448d220003738c2f193ad
SHA512fe059667d7bee821caa42f06a9830caeb88c6d1a9ec6278eae7b48b89ac92aa4d46a39f67e4dd54dc7db02235b6f6fcbea02c779e0946b76014713ca706b0cd2
-
Filesize
832KB
MD55afcbfe882fa47d5bd6fb4b2da54ad75
SHA1b89018725773503484c847ec8c7590c3ae456b3e
SHA256f4ee6ef98466bf6b8d20a9b98921914269ffa0deb7d08d7c1f6e82dc6b183503
SHA5128a8c42bada2806de18dada0fa8b243fa27417d6836ed6dfa084cb2fc33fc32dcc6c923ee7e406b03c9eb5dfbfe4c0c70854670bba32f20d2938b98561a85f315
-
Filesize
1.4MB
MD5d0deddbfea5bb2a5d9a36981a9a57d42
SHA109c7ba5d84f53a6c108558506f18044d43e808e9
SHA25658bdfd52b713d0aba2a5b665c24e4a89106b781cce82f55d1778fa04e786dd1c
SHA512718b757880703e923e8498430303494607c35c7107feee0b1dcbe6690c295c69f0952ccdc6a7298782e2c14a031c4da7c0c45af6eda10dac167c08cca383980f
-
Filesize
320KB
MD5240f386a74a76fde770acb50fdaacf1d
SHA1db8436cf240fb7f3817622ec70bdaad2d3d617db
SHA25688890ccb22c1cf24d7ec431d2a7b4e9bad4799748740f69bbdf61ec8e895853d
SHA512851ae2642f3336ff97e0d94256f30ad28ff132a94957b6b97dfd8fa82a299c35a0ad7cfd7e3179ac4d3595705289ecc6729f293a1176454391a7e8a5f62e66bb
-
Filesize
192KB
MD5604e8136547e1620dbf8c66dc50eae04
SHA1844ecc1376e576bc6c640834d4474695523b79e5
SHA25676ee16a5524b77d56b19894763c3da3ecfc413cc807ddca0f43412daac898564
SHA51261817482a11c395e875e3fc313b19432175d10af5f3da94fb775cbde27ae9aa282a458a53aa73bacc4b214455a45b767cb2ceca6db6ebbb34ea8099079e6fcc9
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
512KB
MD5eec64a0a0cd82f4ad3c9ff0a9f44294a
SHA106a6c52325ba7c216f30ecb9065c7cd45fddbc7c
SHA2560f401f2f6019637e36e14c68f51186fd10a4e2dbf4113da5166ac6cbb73a546d
SHA5128f9eb0bb46e4ee923048188a9361ee4e0f151793535991e68b3cd42a745c3baff8fffc72a0a1a55547a218a2660030b074b26f46c36546cf386af4954dcb4e7c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
988KB
MD5065760220981039db19b9701aaeffddf
SHA1318170b5ca3673cff578d89b7de116f9d6fcd961
SHA256cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf
SHA51281bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895
-
Filesize
704KB
MD5496d47cbc13d577e44614bad6ed06d1b
SHA11fe28b3f9cc1684c80a82ab56eadaf20996cfbad
SHA256bcad0be854565171ed8d485af15daa4ef09a8bed3feb333ff5884acd28d997c4
SHA512edd3adf588ca20b2bd90c7e004dd8fe972d513dc2437c4ae0f28fa443257d77af1cab61ce0dcba36e07086605aaee737fb3f142f8fae3fce96fdf68ffd87e67a
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1.4MB
MD515e8b5f6fbb72905369b4b502988cee1
SHA16c7d8a057b424c5e88ef07feb5076a4ad0da9346
SHA25649bd8d137d06d104296dfd84742dd00791e457c62b2c74d912223c17b113527d
SHA5126442d7a2e7ff2b3a1f4e647c514543bde028a79529502159dbaf3b7c91cf8329dfdf4dad138bd02d8bd8670db1b0a65e587fd4212476ed377dc23e6fb73edea0
-
Filesize
960KB
MD5ec910ee73f05957a3ff1b1b5baf806e9
SHA1ce45b2d96c3c3f795cf691af6135d2b82299eda3
SHA2563eedd2ac5d682006cd481cdd3db37cdb05bfde303020891f493cad1019a82a17
SHA5122cb911d4ad70bea840bac2c9b16f0b34e2092f4b8ec7150666a7cfdd1f2c59dff6ee1459da0e564b1ab55bd8fcc8ff368689b9da34b0bd50fa1af56eeda9de5b
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4KB
MD5b4c6a965d8d3bacf6c9bca59baea4a57
SHA1c1592b90900cb8a064fe2385fcb8d0a3c6b348c9
SHA2566fc475fc8a3638cedd55f91db8c0d81b774751f2424d3581a9266207e1eda142
SHA512fe8a708c00dc489e42f0b87e9cfa62c9eb7aaf126c8fe8f7cc7aa84ea3d1b2a269c340403c3a3ca412e6848a071c3175c923ca744fb8c5a3034fb33cf0e68252
-
Filesize
2KB
MD58ef8d35d750b07ca7e99dce7edd96018
SHA1f2cbc0353c795fff7c1524b2faff94f344be116b
SHA2564f2689873ea9de5d6aeb9c3458a46231f5d7dc380f7d276833ac72263c1a008c
SHA512456bc88970860ba3e862868b49263693f6c0517ab234bb9a9693ac936203a3e775148500d2c6c492bb79ca6be59d74871827ee118ce70bf8bcadf2cd1a33c160
-
Filesize
3KB
MD551a732caf63b8f1ed884151dd72935c3
SHA1a7e49e8b15e721964275006cdf7a3cd58ae5b1d8
SHA256a4fee49f91edfcaf40300053327780527913fe473343eb34145583007b0e5831
SHA512ab64b204c36c30ea4a6f4b3502b3783d63cdaab84bf5b2e18ede931b1a147b3bbdddde2fa6b8558c015d37da14e78e586f63c22b8e9c0786d1211d8af15c8ea7
-
Filesize
576KB
MD59e1d5fca6bef22b50be35cb557a7f669
SHA1574490a58f23c94d97c9d2b0bab2e15a3c5017d3
SHA2567193a907e371892d83951b28431b03b2a7e13574351f4fdc2081d901dfa736c6
SHA5120fbc94871e4300b6e1471ffb5934095356d028b101878cd07f29b14273160952c56d38a1d264088a4007d16bee2766edcc0d7efd5d7088fec0ea7fc533b07b02
-
Filesize
640KB
MD5d45770fecc44ce080d0d57c2fa1e82ba
SHA1d5b7ece4dbf62917bf7892b5812c0fe915ec78a6
SHA25600efd1a621a4625e1534a24b162c303fbac8b85bf384b77cd74b6320835adf61
SHA512bec8ebdca9393ac41a39e05944172b19601db66cd55f9f772ffe0cd94c7f0cab307e6a095883d55715401ef001eefa6372328b151f843d69d10b48804417b1fa
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
192KB
MD5141b49056d1c6a3b8bc211ea5d001911
SHA1e07f7577241a86975ea7098316d7163ff04c138b
SHA256c519b483b6d7ef8f6f1ad81b513799a97fad546dc34e8995b76135cb9d75aa21
SHA5120092ba1983711cd0670675d6b022a7478dca519282f56888ff53b02d9c151e4a0c671d6244bd0ce5e77fc21c6f1e8f8d6d15126d69b3e4b8e2ee6870681bee0a
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
3.4MB
MD5f870b179c1a8c59f1827533de041deb6
SHA1bc620dbf25814bc7d98a72867dace022f7f66dbc
SHA25687552dcb12ac83eee4deadd495943d5e8a0ed9738411eebba78512851fdea470
SHA5120daae445b5b3c6fd9952a158032a3b9c3c20ca492579e69e0f2336748ded6d808892d7d1a66834acda0578b2b37d9a6765101d31c4d3c186ca7a9f1ab811594e
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5d41d323ce3bd735a6e9eb88799aa2ecd
SHA1788cbb1875a4f7e857c10ea19e7dd6224d9fd4b8
SHA2568240c118c191f4568fe19be89acca41a92c1b030f50a52453c9fe7d8c8330c3b
SHA512e2c26aa3add39ada9fb9b819cfe1e58386448727eb5a0cfac2844a5caa578f44db1cac0daef0d925a775ba6b8791bae5a9480b10049494c98a6408453cc269c8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5616f5bf136443b9e435151d594a1203e
SHA136d3d82f8fdd7cc0bff91ddc1545909142c3f9a6
SHA2566e381a04c50a621f5c893536f420a14de8f37e04566877c0dc2b3d131f2d5caf
SHA512558eedf6dfa4b1eff5336d9b32364fedecc7fbc2066bcd90beeabb016f9888288b14bf700b0363d5e21a594a705133413c22776e452cb0d4082a5f026bdb591c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5769bd931a33a304f7ff5fe7ce86c73b0
SHA10da593d76179c096b8b1d5954b68dac8b25c023a
SHA256fd5a2094f8249feab36aea37a7242c16435dc8e85543448e716f835687422dc7
SHA5122011e6c9dc10ef3c3929836c93f10121af68d76c75f9892d22ed0bc8aad4814b99f064ca13d4f29fdc4f6b99380214a8a51fe602e91aed1a4257632cb0f70406
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ad3f926f4be54d54d2a542203a1eec52
SHA15cd679dbdc84e0f666db2398c33d79365dca0c16
SHA2568b04fc53808d0a349fe8693d199dec3e33e2c2d6a58103ed7d509ae7f07e2fac
SHA512743dac8d63061f819d995699a2db52a0506b10a9ff136df2e2f95a7829fbbb64cd7ba10e3078658d90274d88196245b369267b8bc03d05d2260968711b7386a0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD500eafdfc8aefb56ef031d2ee2cf99658
SHA10a1e51d99d2b6f178d57ea9da1e2cefb169b2cc8
SHA2569a75e09810eeeb4ca820e2af985eff949a4652fbc285397b435ec4bfc4893dd2
SHA512dfb69ed4cf363e1a68812b0fb738f449cabc84047c8faef50779e14ff91f80c9bd8e130f954af046150a8680fdacab8645174ec7bd24096f1085cb9df1e747ff
-
Filesize
4.1MB
MD5c8564b4d627953e836d0faab99740a6a
SHA174b37a34950bd081d10072b4dae88952a4c52178
SHA256051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31
SHA51277af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
1.9MB
MD5a1d098ea468c9cb1ffcea9f9356a713d
SHA14d823cb7927b6ff059197871e70287b90e3003e7
SHA2563deb805191106a5b9545b00589bfb7d21db8ba510dc64faaa0dc400096d343df
SHA51227f79b13ccbf6fcfb0591e402de557af164d45a0e5d0186e06ebcb8e6fafaca0b38c17e987344bf3052b1ca1f69020a44c0585abe04442c55eed1d3aa7b0ea51
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63