Analysis
-
max time kernel
125s -
max time network
285s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
Resource
win10-20240221-en
General
-
Target
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
-
Size
1.8MB
-
MD5
ed77409c8f8b66f81fae0754ee9d86f7
-
SHA1
d2500b7585bed8dd179e84f73644a5b2afd8c8e1
-
SHA256
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825
-
SHA512
1208c9dbc61325d2110ba9057ed1a0b4f94103d82fe172a5f40614c3a8d5621f8e04b73784bb70965acd6e38e9fb604e29f52cb8f04f66e5923cd4a06cc9fe92
-
SSDEEP
24576:GqS02nN1gZ5woLL7hI+b31tDiiMBp9fHfyk21adtXUzXZKktlrfCNK20x2+MI9pN:Wg5wABzD1gf6FIdtXUNDfCN10lV
Malware Config
Extracted
amadey
4.12
http://185.172.128.19
-
install_dir
cd1f156d67
-
install_file
Utsysc.exe
-
strings_key
0dd3e5ee91b367c60c9e575983554b30
-
url_paths
/ghsdh39s/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://sajdfue.com/test1/get.php
-
extension
.vook
-
offline_id
1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1
-
payload_url
http://sdfjhuz.com/dl/build2.exe
http://sajdfue.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS
Extracted
vidar
8.4
95002d0a9d65ffced363a8f35f42a529
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
-
profile_id_v2
95002d0a9d65ffced363a8f35f42a529
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Extracted
lumma
https://relevantvoicelesskw.shop/api
https://resergvearyinitiani.shop/api
https://associationokeo.shop/api
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3320 schtasks.exe 352 schtasks.exe 3844 schtasks.exe 2976 schtasks.exe -
Detect Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4436-317-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral2/memory/4436-322-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral2/memory/4436-345-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4156-225-0x0000027600000000-0x00000276038D2000-memory.dmp family_zgrat_v1 behavioral2/memory/4156-227-0x000002761C620000-0x000002761C72E000-memory.dmp family_zgrat_v1 behavioral2/memory/4156-237-0x000002761C380000-0x000002761C3A4000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 16 IoCs
Processes:
resource yara_rule behavioral2/memory/4148-217-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4148-218-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/32-215-0x00000000023D0000-0x00000000024EB000-memory.dmp family_djvu behavioral2/memory/4148-214-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4148-219-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4148-241-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-259-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-260-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-261-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-267-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-266-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-286-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-285-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-283-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-307-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2284-341-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1504 netsh.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe -
Executes dropped EXE 16 IoCs
Processes:
ISetup8.exeu29k.0.exetoolspub1.exeu29k.1.exeAAKKECFBGI.exe6D7B.exe6D7B.exe6D7B.exe6D7B.exe89BF.exebuild2.exebuild2.exebuild3.exe7086.exe8C8C.exeA082.exepid process 2936 ISetup8.exe 652 u29k.0.exe 304 toolspub1.exe 2360 u29k.1.exe 1328 AAKKECFBGI.exe 32 6D7B.exe 4148 6D7B.exe 1656 6D7B.exe 2284 6D7B.exe 2776 89BF.exe 4840 build2.exe 4436 build2.exe 1724 build3.exe 3060 7086.exe 3704 8C8C.exe 3452 A082.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3360119756-166634443-3920521668-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-3360119756-166634443-3920521668-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-3360119756-166634443-3920521668-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe -
Loads dropped DLL 2 IoCs
Processes:
u29k.0.exepid process 652 u29k.0.exe 652 u29k.0.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
AAKKECFBGI.exe6D7B.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3360119756-166634443-3920521668-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AAKKECFBGI.exe" AAKKECFBGI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3360119756-166634443-3920521668-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\33c275af-1600-4572-a418-42685e86f684\\6D7B.exe\" --AutoStart" 6D7B.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 31 api.2ip.ua 32 api.2ip.ua 43 api.2ip.ua 119 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exepid process 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2972 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 3140 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
6D7B.exe6D7B.exe89BF.exebuild2.exe8C8C.exedescription pid process target process PID 32 set thread context of 4148 32 6D7B.exe 6D7B.exe PID 1656 set thread context of 2284 1656 6D7B.exe 6D7B.exe PID 2776 set thread context of 1136 2776 89BF.exe RegAsm.exe PID 4840 set thread context of 4436 4840 build2.exe build2.exe PID 3704 set thread context of 1592 3704 8C8C.exe RegAsm.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4948 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1880 1136 WerFault.exe RegAsm.exe 2144 1136 WerFault.exe RegAsm.exe 3076 4436 WerFault.exe build2.exe 4884 3060 WerFault.exe 7086.exe 5092 3060 WerFault.exe 7086.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u29k.1.exetoolspub1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u29k.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u29k.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u29k.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u29k.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u29k.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u29k.0.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3320 schtasks.exe 352 schtasks.exe 3844 schtasks.exe 2976 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exetoolspub1.exeu29k.0.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exepid process 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 304 toolspub1.exe 304 toolspub1.exe 652 u29k.0.exe 652 u29k.0.exe 2972 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2972 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
toolspub1.exepid process 304 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AAKKECFBGI.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exedescription pid process Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeDebugPrivilege 1328 AAKKECFBGI.exe Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeDebugPrivilege 4156 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
u29k.1.exepid process 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u29k.1.exepid process 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe 2360 u29k.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeISetup8.execmd.exeu29k.0.execmd.exeAAKKECFBGI.execmd.exe6D7B.exeu29k.1.exe6D7B.exe6D7B.exedescription pid process target process PID 4828 wrote to memory of 3320 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 4828 wrote to memory of 3320 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 4828 wrote to memory of 3320 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 4828 wrote to memory of 2936 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 4828 wrote to memory of 2936 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 4828 wrote to memory of 2936 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 2936 wrote to memory of 652 2936 ISetup8.exe u29k.0.exe PID 2936 wrote to memory of 652 2936 ISetup8.exe u29k.0.exe PID 2936 wrote to memory of 652 2936 ISetup8.exe u29k.0.exe PID 4828 wrote to memory of 304 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 4828 wrote to memory of 304 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 4828 wrote to memory of 304 4828 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 2936 wrote to memory of 2360 2936 ISetup8.exe u29k.1.exe PID 2936 wrote to memory of 2360 2936 ISetup8.exe u29k.1.exe PID 2936 wrote to memory of 2360 2936 ISetup8.exe u29k.1.exe PID 3416 wrote to memory of 2388 3416 cmd.exe PID 3416 wrote to memory of 2388 3416 cmd.exe PID 2388 wrote to memory of 872 2388 cmd.exe reg.exe PID 2388 wrote to memory of 872 2388 cmd.exe reg.exe PID 652 wrote to memory of 3188 652 u29k.0.exe cmd.exe PID 652 wrote to memory of 3188 652 u29k.0.exe cmd.exe PID 652 wrote to memory of 3188 652 u29k.0.exe cmd.exe PID 3188 wrote to memory of 1328 3188 cmd.exe AAKKECFBGI.exe PID 3188 wrote to memory of 1328 3188 cmd.exe AAKKECFBGI.exe PID 3188 wrote to memory of 1328 3188 cmd.exe AAKKECFBGI.exe PID 1328 wrote to memory of 4960 1328 AAKKECFBGI.exe cmd.exe PID 1328 wrote to memory of 4960 1328 AAKKECFBGI.exe cmd.exe PID 1328 wrote to memory of 4960 1328 AAKKECFBGI.exe cmd.exe PID 4960 wrote to memory of 4000 4960 cmd.exe PING.EXE PID 4960 wrote to memory of 4000 4960 cmd.exe PING.EXE PID 4960 wrote to memory of 4000 4960 cmd.exe PING.EXE PID 3416 wrote to memory of 32 3416 6D7B.exe PID 3416 wrote to memory of 32 3416 6D7B.exe PID 3416 wrote to memory of 32 3416 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 32 wrote to memory of 4148 32 6D7B.exe 6D7B.exe PID 2360 wrote to memory of 4156 2360 u29k.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 2360 wrote to memory of 4156 2360 u29k.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 4148 wrote to memory of 4016 4148 6D7B.exe icacls.exe PID 4148 wrote to memory of 4016 4148 6D7B.exe icacls.exe PID 4148 wrote to memory of 4016 4148 6D7B.exe icacls.exe PID 4148 wrote to memory of 1656 4148 6D7B.exe 6D7B.exe PID 4148 wrote to memory of 1656 4148 6D7B.exe 6D7B.exe PID 4148 wrote to memory of 1656 4148 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 1656 wrote to memory of 2284 1656 6D7B.exe 6D7B.exe PID 3416 wrote to memory of 2776 3416 89BF.exe PID 3416 wrote to memory of 2776 3416 89BF.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe"C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe /TR "C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe" /F2⤵
- DcRat
- Creates scheduled task(s)
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\u29k.0.exe"C:\Users\Admin\AppData\Local\Temp\u29k.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe"C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe6⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:4000
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u29k.1.exe"C:\Users\Admin\AppData\Local\Temp\u29k.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3709.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\6D7B.exeC:\Users\Admin\AppData\Local\Temp\6D7B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\6D7B.exeC:\Users\Admin\AppData\Local\Temp\6D7B.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\33c275af-1600-4572-a418-42685e86f684" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\6D7B.exe"C:\Users\Admin\AppData\Local\Temp\6D7B.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\6D7B.exe"C:\Users\Admin\AppData\Local\Temp\6D7B.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe"C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4840 -
C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe"C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe"6⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 21287⤵
- Program crash
PID:3076
-
-
-
-
C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe"C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe"5⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe"C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe"6⤵PID:3920
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
PID:352
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\89BF.exeC:\Users\Admin\AppData\Local\Temp\89BF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 11243⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 12123⤵
- Program crash
PID:1880
-
-
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3140
-
C:\Users\Admin\AppData\Local\Temp\7086.exeC:\Users\Admin\AppData\Local\Temp\7086.exe1⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 10402⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 10842⤵
- Program crash
PID:5092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7578.bat" "1⤵PID:3320
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\8C8C.exeC:\Users\Admin\AppData\Local\Temp\8C8C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\A082.exeC:\Users\Admin\AppData\Local\Temp\A082.exe1⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:496
-
-
C:\Users\Admin\AppData\Local\Temp\A082.exe"C:\Users\Admin\AppData\Local\Temp\A082.exe"2⤵PID:2532
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3208
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1316
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1504
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4956
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:1504
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1060
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:3844
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:164
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3456
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:2976
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1604
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4948
-
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe1⤵PID:4512
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:4640
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe1⤵PID:4428
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Roaming\cudfdufC:\Users\Admin\AppData\Roaming\cudfduf1⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5608881bccd83bd848d8e1c5e44052740
SHA1ef6b2e8c88544fc767f62c5e6479929a414faca4
SHA256fe4388c8a609d41bf65a8925f7002372fd327de30af9cbf98c0cdd93d395f7d5
SHA512fa978bb43a9a5a2a5489be9911a0b2c0ea1dc0a3756844a42246121bda728a6cdf5120b0890eb921f8ddf57ab4b07e1d86764566e4ab56dc4bb1191f91974cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54dc6236e8396a9a2ccba6ba22ea3ef9f
SHA17068e2137e367ff08f0936ccc100e2202c65966e
SHA2562d9bf25c2702dec5342160aebd9a3f3f618742385f70bf77501e4bf9bcac3d61
SHA51200df5814b2725954264946a76e66f6be2c9ac0085a0f76c164583deaba5b0682d2f9ae2032266d3a37528c1bd6f879b5f9c4fcd42e49480f1d8e19f0daaf9be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD52475fd3b961e3b6a901ef05bc0a0823a
SHA1396065d29c521e08f7bebbffb8a1c3e947da0290
SHA2563751a14dddb80463bc974067635bd4937e127ba1e754f8fad2c0a3e829626989
SHA51268f9c0b25a12079ade2a3f7760e3acab40743a3d384aae2ffc656d5f4fffb2ce72266a5362fff6271a17fbc30d40f55ec4f45c78ad8acf869a1d31f1f77b2d4b
-
Filesize
55KB
MD515db2266de28fc9c4a3bebc166843c05
SHA1e9d4f950ebbdb842ee4193fd8e5ef3295866c827
SHA256ff73e83e0832648d0a184aa1b1054169cc0064986a154371c6b63ed8b7355432
SHA512ccba126e40f29a7c7524483be53e259786cc29234f34bf1f549f26e2c1e59ad41fe840ad0866123a13292f7ea46e5b6640fe11ace0274962e7f554de56a05e14
-
Filesize
47KB
MD55ffe3f5682ffcb833cab3a8056f3c1c6
SHA1190dbccb12cfbe3626c40aea7cb8f1a0c984ba7b
SHA256a5bcd64d0566c77226f916cb18785b9ad945ab83fd2f2c6178d9a6f969df2a18
SHA512a6ccc9a5686cd2a7bef8b128ecc77a75524ee1cf9899e2bb38b8e8d017aee358e0434ead9896444febda74b0f90d6514921032505b0a03026fe0a8f0a5572394
-
Filesize
83KB
MD5d5c0ae3fb55bd533588096971a9061c2
SHA140faf1ea0450a34e5d243eca27d97abed33760de
SHA25641f2f81c64c77fd8ed780f320b45a3464c5432f92065202d4515d8d456f62401
SHA5123fa0e996281496f27307f5de6ad819b043bf9e092a726e0bf71de06cc5e9b50ea37da8e7ac34f697c84db5187b05ad8d513d739e0f63fd73e29cec09c3d1e58d
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
259KB
MD54013f30c97da6aefa499907203fb1b0e
SHA12913a74b37428226b5b372773d73abb6c7d80db5
SHA25627b6f56b8e0db1dd14b5702f034da3a16520cf1aaaf6c143ef1ae1dfadd9ed69
SHA5124a29681b175c2aa471378b6ab04f1deccf223ac30506a2ec60baef6f89bd5124b5cf964ae8aa23fc91782158f1cb1e14ef813d25cd9b90c09babeb7690b0366e
-
Filesize
985B
MD531574c2183556c75b422cb4596a7049a
SHA1ce09ba667f90b87f4c63228fcb5f75615a973132
SHA256736754730ef68934226d4238ba213ea2dc21b30f61b7fbdac2f22709d6b12223
SHA5128aceafb0dcb228a3656be3b5aa91347370d56335da8d1dec67051b43f24000986d2de08f3f615c6d0df81b6949162e0894e794986e198825dd39d6127a0420da
-
Filesize
115KB
MD544f6004025611f7f1475e78c45ede467
SHA1c1aa1a27a72035d45c4f736ea827c739f139898f
SHA256ac21ea1504181c6447cbecf6e80848011401006064b9ce80f5c62023bb187bb6
SHA51204e83dcba3f602f122683ff1f230770507e265fcefd8d1ae6baf785079b173f2b70c51d5c7ae783ae09decb2259c8cc94107a12f0d853f32186871233240fc58
-
Filesize
76KB
MD5d2351c17036b07e5e45aafd15b5a4b84
SHA1b5ef1d5743ddd8b23ea3a3c083070f7c0bb05a27
SHA256b5944a5220d6fa39345131a27837c9f0a8f32519c4178a47a4bbb4b88d9be397
SHA512f0d29cfeca503c360ab059444c4bcf69de7ffcc44deb592f3db6d89130616bb42ae8489594ad1ec8abfcc3b2d29355e7370d82bc1df459f76cc57b8cbeeed683
-
Filesize
138KB
MD5041657c83d7c9978dbe43d218dc479e6
SHA1951e08f6e9cd689901bd9a88ecb0d5803bfc642a
SHA256eae2cf710205796b54b803e33134c5fa534f3e602ea59fec9b1eefb466603857
SHA512e43478b4037e0fe07e1de933b0cadc8d5def21e6d78e4cb353f09d8973089b29b2393533535623efc6aedb0d6cbedee6eacb8ea7dd922fb51ae3788ce8a0b7e5
-
Filesize
231KB
MD58ad1f09f9bd6d1e486898d9b0c60b5f7
SHA1e6c0b8e8a15ee4ed8ed21fc0be618cd39927f225
SHA256d640e24c44544c63b539f4c1ea7bf77b117356fafa1287de0dde8ebd52297f68
SHA512f399f70d552bf0d64f9ba9847d59e229eb50b73ed8082b4056cff99e2e2206a3d26d66d2f36481c90d5fec568ab491e35a65675a1499c5270041a8f88227e4aa
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
694KB
MD566cae38d3dd49eb51abd43b4d20df5d7
SHA1d08d08bdb702ada3d1497acce915161e45f66282
SHA256856fa56b3353ce942fb919813343d57cbd22e35c7174b58ac376cd575e3e2762
SHA5125deb715d126003aaac662977089a9b6342d1ab848b3150b91c166b4e644910e630d0d40b16572b4c1b4d48330d89e8637d192cb83cddde43c0684a68c128be88
-
Filesize
456KB
MD5a09a5efcb6504b505a82689135c5394d
SHA102520b264669ac2283c9f412033911673dab7159
SHA256e40a2265f557ae8268cc2e58c7a62c31b2e089465f4c885d8d4c999439a46b5e
SHA51293957c75cf482ce11121e9604be6a0a9463cff063bc1b33045324ddbc4218010eb6821a45c8b715341123e599d0bcf6e98a1e166b616a4caef6d3eea26528534
-
Filesize
1KB
MD54d848873fa4f1e3309a8eb566749d66e
SHA119f14ad58e83f2e6988c8f376bdff8ee101b5d6a
SHA256f5394aaf0ef8f8cbac47992cf3156519fd77d1481561e85abf0ec4e445eeb1a6
SHA512ae1033d50bce09f71e49651399cfc3740261f24c028f3c205aa7b1ee94084b64dc54345225c448384241def0611fc2e7557a61cf7f24f4b36036708e7a8e1a27
-
Filesize
152KB
MD548edde531c98855a939569cfc8404322
SHA1fcfbf27742d4e158d2954d5615546f8951cb61a4
SHA256a8e9c5c942eb6e5e7082abbe1834473a8a6341206e2b054c8fe8edcfc47c9eaa
SHA51216ac4a816c88710ab01cd390bbad97c7bb19ed781a4d4e3b1fdfa84a7a5601b30316446ebf7b318895bb8c2fcaca389549261f894722250835cb5a55deb0e8b2
-
Filesize
341KB
MD5be5877408b4c6500afcecfa287e3aa56
SHA139476b9104a96f09734cc237d80e5009dd177d68
SHA2567da4341216461c41ccbaab92a50ae43e387eec6c5cd62eb6f52e29b21bfcf768
SHA51273a2bbc8f0d3af7bc364e682110d6849e1c5f4c92fff531f38147b4c9f6e26db5a9be82c1909604c4e7d8d10890df79d12cbbb137329b70661b12420dfdc9ef3
-
Filesize
2.2MB
MD55ea2783a31e61dc879745a665e51c38d
SHA1fff59be0d75c01f567781766aeb08cbbdc63a029
SHA25673488116ac8ea455a05e2cb81db9d4821705132663943fa5c04296894b0f7f04
SHA5128aa3c9f05a6e0194d25d04dbc350c71fde97233dc5e462b790fd6e6d5b70cb38bec1fbb6363720969eca9aaa7563c815acda74f51c3a6de4ef69b14e309d8fb4
-
Filesize
1.9MB
MD557dda47759511e1a485075620b084a6d
SHA1d588be3c963a4143db652a5ff0a8aae6a94ce429
SHA25622a1ab5440d6e7faef5666d22ca7f67ea4b61dce2db6e99100d81606c611e5a9
SHA51271bcf65f240d1e8949a431404dbfc7259262df9a149dff22fee04036d4ab277b97c7cf0bfafe7ac68e327a6c90b4bfa962ae11fe6d44771e057cc752f2860b9f
-
Filesize
149KB
MD5824197e6c27b269650c8818a4234e053
SHA10fa1ac50c426474a8a42312e278b1f48f703485c
SHA2569f05399848f83e558fe644cc9534e64562ad90d7bd81e18462485b9e2b2cca2c
SHA5126aadf51b8bc2ce2c7e11e1f6b3180114b50d84a40a6b4266054196a29657c2a271396299c3f2c8f4787ec6f7245a69118210098f3d3abfa5fb134d91d6154851
-
Filesize
172KB
MD586d8b3243d5c7c224d92f357341f433b
SHA154b4c4484275ebd2c44555415ae3d799ec191b22
SHA256f16acbd063a73d32230d6924d7950a5ed3ade8425636cb5d5bac56a6681ae58d
SHA5124c0bf724b2e6abe78281b1068cbe4d97714825dab2a61f045ffae2fea5951ab67cd844479d2d0c27bbc903f156ed41f1aed29997a7a5600388d18ee18346d8fe
-
Filesize
124KB
MD515e99fef6ef1009225f7c4c6e150be76
SHA189bc8a468138da2fac12db6a0fb7b93ffd8703c3
SHA25611d03ca1f0e3a488cd6ce3b2db917f470218473ed7cbbe75b1e7bf301ea23269
SHA5123b8ef63d2f08ef6dc0d74e596c23afaa701b22d8dbf52fc1d073b0d285256f340587d9a933d7eb664f2a79df9e0576fa6737a9919304e67150e39e3d51c10480
-
Filesize
192KB
MD51102814a961eec810381ac28cdcde664
SHA1aa9cbfad4df8f0a40252029a78cfd1681c6a982f
SHA256e9a7210a1969ef1e3368b4a4ff31e98c7e9a5a547e5b7ad9048874ab89b268d6
SHA512bf620705a8cdcbc27f90614bb35600a2cfb35477657776e6020404e33f17b0766c5a28bd072405fbeecb73e8899341e3b75e8ac306b342c324e2f263f0efa5c3
-
Filesize
3.5MB
MD560c7e1b1a242996c6dacc9e634616498
SHA1625c90ff16010adbb7919b706491b850effb8537
SHA25622c0f9e1bd8575f187c7c8c958098b447dee0a7c7675ef166185f0139dee0a89
SHA512b7452767e367b1ffa28a411ac82db978d2f0ffd015ba8180aa30d96706b5faea134e17a491c143ade1f9018b386befebe213c2113ffede857fdf1e9027555358
-
Filesize
4.1MB
MD5105f3de24a97884559ba933061f7c46c
SHA13088f13998ee97020394f584a76c05a48c3ca073
SHA256c59efa3d6fe0d425b42bfc950fa83b307058c704eb896376e93f346c2cb818be
SHA51269420543ee5cecd1cb98e34e6293238394a01118ff94b324dc48ccc2c3d060f6d0002fa805d05611c99892c6769e095fdf3093f53cc8f3f320912baad07102d3
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
35KB
MD5fc2a0d37d6be67007970a7472e2fd30d
SHA1a004f0f67fecb96cea13d05605ca7537d43d6c13
SHA256acc0dcf2374e39b051e5b387dfb632d6265a308fc55409d39832e80e46ad99da
SHA512cfc0fd667cdea97c34c610f3e451e20cfb05af3057968877d9acc953a095d235673463f2cb92816fbc60445559928c3f647cd797b0a439a1d0e3511e76d8d7ba
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
175KB
MD5be6898b8ba85fd78a8f2a2c2a2b3c344
SHA1a411f88965b5aa8c2ac023b2c88e415c900559d4
SHA25651d69b0d5c5415665d16ac0eaa276b8e843f4a069ef07f6aeee028264871bd89
SHA5122e36f3362772c2c47e4c1f08c0d8a41617eace13dd1421b3c68f16c81fcff83aa1fe42b39322abae8b55f7272725ef3d4957e6fdbe1d37a9bb306036e370d738
-
Filesize
216KB
MD5eefda5058ba47fcf6814933a7c888e95
SHA164d9883a4010fadf740f1de698077ce0acd2adaa
SHA2566e9702d3030bb0ddb97a6ff4e92bc059808be6457220bcff38f925b851982882
SHA512014ffc27ca7a6b77f23c5a52447647322276124c8b833440f31f95c178877af7ca918d7309b47f74424c780985ff1664ac1d986220dc09013e688f0c092e717d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55cf658688247efa9a0470e95c5deb865
SHA1e2155775d41d5555ec349f65196076333b54e70c
SHA25695e65885674bd3b70d6628832ed4b1c39d1d2286a73904d783923d8d66a7bc4a
SHA512392782e5f756ee316f26e3de2c2833be7dd9a7a85e437fa94045dcccc65cfa23e86e3ca6c8a38608bdff78b174fe2523d6242cab5b2f7cc5b40a7dcb02675804
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e73867c86e2b3c8492fbdf3725f5ff3a
SHA18f8016c9dea9b33d8b994473760a356bd9b6e0fa
SHA256ff39a763279b683f955846e722261c5c3b110104e15edcf029f3aa3d2b6e1369
SHA512589cde370ad3fdd6e704c1d4f9e11620056a993e7de284144169a2615a535ba05d3d42f2f03312be0d25dded426b499c120034a2b0897a8883d9e2049fbf2463
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50a46b5d6840b261abe30dc3fb1bc78b8
SHA17825f285ddf29806a728f70d2f8732482bd69de7
SHA2562dc95b3da9784c92e35b50e3c1c172dc94ad3f07406e44107c1a677012c3f67a
SHA512087bf906148d44062d84911c0b1eb0e47bd3938cf893adb5f33b63f4690c51499033a6f61be8d32ab816fcee371a7da0338194f047658f0ba4033c8f0194fec6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5871ae7752819ec11c56c0254e158c2e0
SHA1de458c29d91d73581062cfa93f3d4289f3f07b31
SHA25683c22f1e5124209b21f185690a798e7eb922127a4057e0d95e11788655df7b1f
SHA512fa9a3b687fd09332165f3ebf08b720570854b388e3458410999457d895f56ba079cf5d33545e489f36bd606111276a35ee036c34adb1234272a1932f2494217f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55b6cc14e3f9746d8a9b65771d7ad298f
SHA13d9eeefdff42dbb727560c83e809afef7db31767
SHA25625cd50a56c44df53b3440fa8ac4132ba9f28ac3972b611fac118eb8e212cb63c
SHA512f5f1a3910a0cb1efedf295fc9b87b4f3084fe16bf49f379c2403bb33b615bf86e2819f70c8cba2592730d545f67c0b32073d182c3b9028360a584d9bafb6956a
-
Filesize
2.5MB
MD5b15d5541f9a22d572857e9390e6de1ae
SHA19f63a6f7d635e868e5b714899c8abc1be6ac9461
SHA256819de2ce29b15e8c8652daea25852c22d0a25e1d9c5db864e7dc902029608650
SHA5125150c14234c2aeae82d97904181fe6e2d6bbb901a8cd5edcbfb383bc83f88af3aed984e832a354af993dbb5c280c5ddcaed68746f5bad5e7af6a32b54e30a1ac
-
Filesize
2.3MB
MD5e3d1a53c5c2520289a4d90ffc34d2dac
SHA1d07c1bf357faa58fd7e7963af87cedd2cf46a2b7
SHA2561c0fe0072699144b05370175e06fda792c93c50a7475bab751da22a574f0a45c
SHA512c02a013ad6932cd7f06256eee91f73d779755c71aee9657d299a200581e85233e45c1e5ad4f5c89e18a8dec54f558479fb9238283053e98d9ef2091c49b6dd89
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
684KB
MD530d795fde46100de122415462a9109fc
SHA1de12905d1f6f56e4fcc8ec1af0628b1f18d7f346
SHA256e82293117f921356eb9e0101820cfa6b0afa8348078b3c01b2faf6252d708ae0
SHA512774b0501fee5384452a1b9df78fb4d05f8bfd6ec67b30824f5320935151a17609aeea04dac00162aea7b907cb6fee5fd26076629301d14792017c82b2641281d
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
597KB
MD5cda008017efca5318e15d4180b8ec2ff
SHA135c40d4ff864975e69bb8aac91f6eb2766a36052
SHA256d5aab49883d19d1a1e2484a0505ad4b27adce5e02e0c6d5917abcee6b68ad31f
SHA5129cbc43e7bd69d21cec968244726e78f71f22b404a77d7e377c2c9212b65ed01608cc3b6fe61278c7337473c9484c2fe1929531fd6fc6cfe9e47a7e6b6d060908