Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe
Resource
win10v2004-20240226-en
General
-
Target
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe
-
Size
231KB
-
MD5
2334b1e2f8d58a4b1baa904c359ebf91
-
SHA1
9fd9f700d8a23375b5b2204702146c13402e590b
-
SHA256
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317
-
SHA512
65afbed0c0d80a298e34369bb0f04bc3ac2abe1f861bc052e3b11714ecc3e6e0ae6a9f84d440ec68f63a4a32f4c5564b5705fa97192fb8856a0192fb93ca5897
-
SSDEEP
6144:bm6z4HbT8z7f09l/hh3UfPlQk9vsGPaXzbHszA:C6z4Hn8z7faRHklQkRsys/iA
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://herdbescuitinjurywu.shop/api
https://relevantvoicelesskw.shop/api
https://asleepfulltytarrtw.shop/api
Signatures
-
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/2680-94-0x0000000002EA0000-0x000000000378B000-memory.dmp family_glupteba behavioral2/memory/2680-229-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2680-398-0x0000000002EA0000-0x000000000378B000-memory.dmp family_glupteba behavioral2/memory/2680-423-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2680-433-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2680-543-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2680-554-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4324-690-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Detect binaries embedding considerable number of MFA browser extension IDs. 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3660-498-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/3660-557-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/3660-711-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs -
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3660-498-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/3660-557-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/3660-711-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2680-229-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2680-423-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2680-433-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2680-543-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2680-554-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4324-690-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3660-498-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3660-557-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3660-711-0x0000000000400000-0x000000000063B000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables Discord URL observed in first stage droppers 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2680-229-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2680-423-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2680-433-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2680-543-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2680-554-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4324-690-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2680-229-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2680-423-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2680-433-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2680-543-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2680-554-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4324-690-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2680-229-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2680-423-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2680-433-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2680-543-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2680-554-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4324-690-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables packed with VMProtect. 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3632-356-0x0000000000400000-0x00000000005AD000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/3632-352-0x0000000000400000-0x00000000005AD000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/1824-362-0x0000000000400000-0x00000000005AD000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/1824-494-0x0000000000400000-0x00000000005AD000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/1824-556-0x0000000000400000-0x00000000005AD000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/1824-677-0x0000000000400000-0x00000000005AD000-memory.dmp INDICATOR_EXE_Packed_VMProtect -
Detects executables referencing many varying, potentially fake Windows User-Agents 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2680-229-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2680-423-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2680-433-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2680-543-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2680-554-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4324-690-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
2FE9.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2FE9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule C:\Windows\windefender.exe UPX -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 148 860 rundll32.exe 149 448 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 5000 netsh.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorgu.exe2FE9.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2FE9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2FE9.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
F520.exeEasyAppns.exeInstallSetup_four.exeu25s.1.exeu25s.0.exeCBGHCAKKFB.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation F520.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation EasyAppns.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation InstallSetup_four.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation u25s.1.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation u25s.0.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation CBGHCAKKFB.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation explorgu.exe -
Deletes itself 1 IoCs
Processes:
pid process 3424 -
Executes dropped EXE 24 IoCs
Processes:
C227.exeF520.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exe1C60.exeapril.exeapril.tmpflashdecompiler32.exeflashdecompiler32.exeEasyApp.exe2FE9.exeu25s.0.exeu25s.1.exe288c47bbc1871b439df19ff4df68f076.execsrss.exeE271.exeinjector.exeinjector.exeCBGHCAKKFB.exeexplorgu.exeF9E2.exewindefender.exewindefender.exepid process 1100 C227.exe 1388 F520.exe 2800 InstallSetup_four.exe 2680 288c47bbc1871b439df19ff4df68f076.exe 4100 EasyAppns.exe 3436 1C60.exe 1560 april.exe 372 april.tmp 3632 flashdecompiler32.exe 1824 flashdecompiler32.exe 4596 EasyApp.exe 2472 2FE9.exe 3660 u25s.0.exe 3712 u25s.1.exe 4324 288c47bbc1871b439df19ff4df68f076.exe 4996 csrss.exe 2792 E271.exe 3580 injector.exe 1340 injector.exe 1696 CBGHCAKKFB.exe 2732 explorgu.exe 708 F9E2.exe 1984 windefender.exe 4652 windefender.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
2FE9.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Software\Wine 2FE9.exe Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Software\Wine explorgu.exe -
Loads dropped DLL 7 IoCs
Processes:
regsvr32.exeapril.tmpu25s.0.exerundll32.exerundll32.exerundll32.exepid process 3712 regsvr32.exe 372 april.tmp 3660 u25s.0.exe 3660 u25s.0.exe 2148 rundll32.exe 860 rundll32.exe 448 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exeCBGHCAKKFB.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CBGHCAKKFB.exe" CBGHCAKKFB.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
F9E2.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 F9E2.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
2FE9.exeexplorgu.exepid process 2472 2FE9.exe 2732 explorgu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
E271.exedescription pid process target process PID 2792 set thread context of 3684 2792 E271.exe BitLockerToGo.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 5 IoCs
Processes:
csrss.exe2FE9.exe288c47bbc1871b439df19ff4df68f076.exedescription ioc process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job 2FE9.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4444 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1832 3436 WerFault.exe 1C60.exe 3808 4596 WerFault.exe EasyApp.exe 3896 2800 WerFault.exe InstallSetup_four.exe 708 3436 WerFault.exe 1C60.exe 4828 2680 WerFault.exe 288c47bbc1871b439df19ff4df68f076.exe 3652 4324 WerFault.exe 288c47bbc1871b439df19ff4df68f076.exe 1052 3660 WerFault.exe u25s.0.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exeC227.exeu25s.1.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C227.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C227.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u25s.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u25s.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u25s.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u25s.0.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u25s.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u25s.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2648 schtasks.exe 3152 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exepid process 4668 e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe 4668 e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 3424 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exeC227.exepid process 4668 e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe 1100 C227.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exedescription pid process Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeDebugPrivilege 4544 powershell.exe Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeDebugPrivilege 2680 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2680 288c47bbc1871b439df19ff4df68f076.exe Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeDebugPrivilege 2424 powershell.exe Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeShutdownPrivilege 3424 Token: SeCreatePagefilePrivilege 3424 Token: SeDebugPrivilege 1688 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3424 -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
2FE9.exeu25s.1.exepid process 2472 2FE9.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u25s.1.exepid process 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe 3712 u25s.1.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3424 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeF520.exeapril.exeapril.tmpEasyAppns.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exe288c47bbc1871b439df19ff4df68f076.exeu25s.1.execmd.exedescription pid process target process PID 3424 wrote to memory of 1100 3424 C227.exe PID 3424 wrote to memory of 1100 3424 C227.exe PID 3424 wrote to memory of 1100 3424 C227.exe PID 3424 wrote to memory of 3864 3424 regsvr32.exe PID 3424 wrote to memory of 3864 3424 regsvr32.exe PID 3864 wrote to memory of 3712 3864 regsvr32.exe regsvr32.exe PID 3864 wrote to memory of 3712 3864 regsvr32.exe regsvr32.exe PID 3864 wrote to memory of 3712 3864 regsvr32.exe regsvr32.exe PID 3424 wrote to memory of 1388 3424 F520.exe PID 3424 wrote to memory of 1388 3424 F520.exe PID 3424 wrote to memory of 1388 3424 F520.exe PID 1388 wrote to memory of 2800 1388 F520.exe InstallSetup_four.exe PID 1388 wrote to memory of 2800 1388 F520.exe InstallSetup_four.exe PID 1388 wrote to memory of 2800 1388 F520.exe InstallSetup_four.exe PID 1388 wrote to memory of 2680 1388 F520.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1388 wrote to memory of 2680 1388 F520.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1388 wrote to memory of 2680 1388 F520.exe 288c47bbc1871b439df19ff4df68f076.exe PID 1388 wrote to memory of 4100 1388 F520.exe EasyAppns.exe PID 1388 wrote to memory of 4100 1388 F520.exe EasyAppns.exe PID 1388 wrote to memory of 4100 1388 F520.exe EasyAppns.exe PID 3424 wrote to memory of 3436 3424 1C60.exe PID 3424 wrote to memory of 3436 3424 1C60.exe PID 3424 wrote to memory of 3436 3424 1C60.exe PID 1388 wrote to memory of 1560 1388 F520.exe april.exe PID 1388 wrote to memory of 1560 1388 F520.exe april.exe PID 1388 wrote to memory of 1560 1388 F520.exe april.exe PID 1560 wrote to memory of 372 1560 april.exe april.tmp PID 1560 wrote to memory of 372 1560 april.exe april.tmp PID 1560 wrote to memory of 372 1560 april.exe april.tmp PID 372 wrote to memory of 3632 372 april.tmp flashdecompiler32.exe PID 372 wrote to memory of 3632 372 april.tmp flashdecompiler32.exe PID 372 wrote to memory of 3632 372 april.tmp flashdecompiler32.exe PID 4100 wrote to memory of 4596 4100 EasyAppns.exe EasyApp.exe PID 4100 wrote to memory of 4596 4100 EasyAppns.exe EasyApp.exe PID 4100 wrote to memory of 4596 4100 EasyAppns.exe EasyApp.exe PID 372 wrote to memory of 1824 372 april.tmp flashdecompiler32.exe PID 372 wrote to memory of 1824 372 april.tmp flashdecompiler32.exe PID 372 wrote to memory of 1824 372 april.tmp flashdecompiler32.exe PID 3424 wrote to memory of 2472 3424 2FE9.exe PID 3424 wrote to memory of 2472 3424 2FE9.exe PID 3424 wrote to memory of 2472 3424 2FE9.exe PID 2800 wrote to memory of 3660 2800 InstallSetup_four.exe u25s.0.exe PID 2800 wrote to memory of 3660 2800 InstallSetup_four.exe u25s.0.exe PID 2800 wrote to memory of 3660 2800 InstallSetup_four.exe u25s.0.exe PID 2680 wrote to memory of 4544 2680 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 2680 wrote to memory of 4544 2680 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 2680 wrote to memory of 4544 2680 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 2800 wrote to memory of 3712 2800 InstallSetup_four.exe u25s.1.exe PID 2800 wrote to memory of 3712 2800 InstallSetup_four.exe u25s.1.exe PID 2800 wrote to memory of 3712 2800 InstallSetup_four.exe u25s.1.exe PID 4324 wrote to memory of 2424 4324 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4324 wrote to memory of 2424 4324 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4324 wrote to memory of 2424 4324 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 3712 wrote to memory of 1688 3712 u25s.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 3712 wrote to memory of 1688 3712 u25s.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 4324 wrote to memory of 4068 4324 288c47bbc1871b439df19ff4df68f076.exe cmd.exe PID 4324 wrote to memory of 4068 4324 288c47bbc1871b439df19ff4df68f076.exe cmd.exe PID 4068 wrote to memory of 5000 4068 cmd.exe netsh.exe PID 4068 wrote to memory of 5000 4068 cmd.exe netsh.exe PID 4324 wrote to memory of 1920 4324 288c47bbc1871b439df19ff4df68f076.exe Conhost.exe PID 4324 wrote to memory of 1920 4324 288c47bbc1871b439df19ff4df68f076.exe Conhost.exe PID 4324 wrote to memory of 1920 4324 288c47bbc1871b439df19ff4df68f076.exe Conhost.exe PID 4324 wrote to memory of 2300 4324 288c47bbc1871b439df19ff4df68f076.exe schtasks.exe PID 4324 wrote to memory of 2300 4324 288c47bbc1871b439df19ff4df68f076.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe"C:\Users\Admin\AppData\Local\Temp\e499e8022dd2df0e3204a5fc7061b290c429ab845940efa4f782f988a9930317.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4668
-
C:\Users\Admin\AppData\Local\Temp\C227.exeC:\Users\Admin\AppData\Local\Temp\C227.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1100
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\CC59.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\CC59.dll2⤵
- Loads dropped DLL
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\F520.exeC:\Users\Admin\AppData\Local\Temp\F520.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\u25s.0.exe"C:\Users\Admin\AppData\Local\Temp\u25s.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CBGHCAKKFB.exe"4⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\CBGHCAKKFB.exe"C:\Users\Admin\AppData\Local\Temp\CBGHCAKKFB.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\CBGHCAKKFB.exe6⤵PID:4504
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:1944
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 24164⤵
- Program crash
PID:1052
-
-
-
C:\Users\Admin\AppData\Local\Temp\u25s.1.exe"C:\Users\Admin\AppData\Local\Temp\u25s.1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 7243⤵
- Program crash
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5000
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2300
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:4996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1052 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1920
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2648
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2300
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1340
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3152
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:3756
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:4444
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7164⤵
- Program crash
PID:3652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 10123⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 6764⤵
- Program crash
PID:3808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\is-IVHNL.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-IVHNL.tmp\april.tmp" /SL5="$801C2,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -i4⤵
- Executes dropped EXE
PID:3632
-
-
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -s4⤵
- Executes dropped EXE
PID:1824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C60.exeC:\Users\Admin\AppData\Local\Temp\1C60.exe1⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 10842⤵
- Program crash
PID:1832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 11002⤵
- Program crash
PID:708
-
-
C:\Users\Admin\AppData\Local\Temp\2FE9.exeC:\Users\Admin\AppData\Local\Temp\2FE9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4596 -ip 45961⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3436 -ip 34361⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2800 -ip 28001⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3436 -ip 34361⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2680 -ip 26801⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4324 -ip 43241⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\E271.exeC:\Users\Admin\AppData\Local\Temp\E271.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2792 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3660 -ip 36601⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2732 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:2148 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:860 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\045580317372_Desktop.zip' -CompressionLevel Optimal4⤵PID:3220
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\F9E2.exeC:\Users\Admin\AppData\Local\Temp\F9E2.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:708
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
128KB
MD5938a2c7d49c08b85329be291368f5ec4
SHA15549aef1f1c4d56dbfef3b743a2af76916146398
SHA256ede39a99b365a9162817c1a1f4787f75675f6782e97a4e5da03c746c1e8a6332
SHA5121edbc2aca9f9b643a9245872e46ff2b8e198165d63d058b6bae4e496389b0388de83b03b901949529646335d6f31e2fd60b9ab6232e93d40bce2aa6142b9f90e
-
Filesize
1.7MB
MD595dccef9f0bee7ef720486845368e79c
SHA1e1a504d43e02b53b18bec110dbcb1e4b3f48681b
SHA256777ea399013368cef357af77c88df152776feb2fa1bc3fae2cb01dd378adbbcc
SHA512aea82c540ce49543e77a53f4376b5e88442bd3e0fdc29390b544274b9f2140b5e75b0043031adccd2cdee5e4b1a968bfac50ad1640290dc2839fd50b16ef5899
-
Filesize
421KB
MD5c3d259b868dfa77e4955ed5b4a5fb7f5
SHA16f57f1711f5734439b713338a8430e0e80e2bd5b
SHA256d4b9d1e10290349b015ada3e86b6fd4c73a4450d3665c3f8a8f266c496c72f18
SHA512a7882be9a2a643b7507e12d09acae117986f890d089b027bb18eee3e6d85aff04f51360cd2f72da0e56a545c09fab067a93a52f0b83e742f7aaa20249ae44ca8
-
Filesize
2.3MB
MD51a6212bd50131b501fd686aa403b5571
SHA1c0ee0b6a73c0f6a4c3a3001cd0d4270446b6f62c
SHA256ee744184fffb5722a24c893fc295ce92f4e8e448470bd57ed42f25db39663457
SHA51280a0d40cf72993ca0053e948c65842a1f0a65b415f6c0fdc0f28c57d62a26e5f7ea5b6f63cb6ac90e88a712c9c970f909f67828ec644d0d5798cf5983675da15
-
Filesize
4.1MB
MD5c8564b4d627953e836d0faab99740a6a
SHA174b37a34950bd081d10072b4dae88952a4c52178
SHA256051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31
SHA51277af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776
-
Filesize
3.1MB
MD5c391fca4149be8a8fbca1f957fc42092
SHA1945e7b4365d77e707d0331eab7cd99b521d000e9
SHA256052a030b677160621a73979a46e315413d265c1fa7bd2cf6cbb1564a148d3f9f
SHA5129ac73ba465723500ab6e57b6e64ef6df272f56f85f59cbacd3246a6a74ea469b7ca9ef675b90169e2191cd2c2ad6c2c442efa72835b1f030ca71e6b7763bfdcd
-
Filesize
1.7MB
MD57239ead58031ed82ad01dfaffa7d6514
SHA14b0374341c3a08b37d24e96fc7e2bae0b3f15b61
SHA256cc0e7a732dd7617ea4bcc9401258d63c970607dc85d82dc8831d005ab319150d
SHA512b8faa738e050af8d4a68b826c648eac9a15cc8862e670d052a56171b0545435e5247f05abd9d950de1505e0692bf3f90b422735f578555c8bc4fa1c2583fed21
-
Filesize
1.1MB
MD5617e2cd3470cb96f3aa5ab71e409bbf9
SHA1a95af84b2208f78903c30848bbf0149547a0f3cd
SHA256063ed666cbfda51ff4cd567cef11a89ec5085ac38ad3dd821bfa32d5b10416a4
SHA512e45ced1d7b52fc751d48e3ad82d7b2165252a65e3177d3f185469aa18e318e4d5484c49e31d19046b92a4fc36441cfcd27a954d6be3548fb35dece89c96ef101
-
Filesize
1.8MB
MD57c396270dd3aa8f5358a690fceff3a8f
SHA1321c2273f7ceb2f8b084110ecff5a815132a4317
SHA256d976e0a0a5ba6eef37a509186ef3c2732f1065b3bb34e96d4d0ac0f89d8f5332
SHA5124af01db833d93c40bc6dc97f8b3b70915c4f4cf54e50eb17ffb71a4b04bd14b07f0d33e9e22693d140f70900a18b600072ed9f9baebf6dd4f3792d5dee3d0d85
-
Filesize
230KB
MD560cfb7d9800c28666f19a6be76994545
SHA1e5b1fbbfa182239425d9b6f12beabdd1f5b1096f
SHA2562c72c603a6c9992c0f190e65ffc1290f00d31945804750f14d8b3596b9745758
SHA5127f4231056c76951d693815c4d22aeb8db765d50db7e073b4d7ed839f1fb501074496f05d5e89aa6fea5c90a1c7a1aa35259df95c8481d1ff8e8a8be18221e9b2
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
640KB
MD5830008125e08beaff2fc9b534c6d214f
SHA19427a609d8186fe4a9dbee482995119a4f71daed
SHA2560da07e46a0d4feee5c5bf19da99beba7b014014fd7c4d356e6a5dd55bc2f05ec
SHA512d2df61e121508ae9b82e679ef776406221bc814a00a15bdf55303e28172a0c5f9c8dca387504904458a05b8200b31d2e344b9408e14f3a00a63f88067fcdca38
-
Filesize
320KB
MD557dfe01b74d59d438193aaefa29492ab
SHA17cd1e3d444d390b8b9acf418ffc58dff585afe88
SHA256401b7124c6bc3e702c232ee9773ecb9648149f60e688687bdd4f2b9ef070bf07
SHA512075ec0b2ff1103882844b046ce5c05f16abe31affe5550e6f1818cb1bb42ed041c8d71324297c537e703e285c4ca798a41b3133d18e90032f63c0602dd86732b
-
Filesize
988KB
MD5065760220981039db19b9701aaeffddf
SHA1318170b5ca3673cff578d89b7de116f9d6fcd961
SHA256cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf
SHA51281bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895
-
Filesize
384KB
MD511b5924c0dc4e2d63207500634709d56
SHA168ec7940876513a7129c3f500b5341a9f6d8b89d
SHA256fcc6be5bb062de91fba746c90e77d0117bdeaeb6d2cdad29e2dca07285c24b5e
SHA512fcda1d57b6c4eb45b5d2eb59b06ce02d6d4f2ba5d2d59766252b1fea75c1341c3e3f9b8ac7a04179ce7f8cf4d4c03e74ce464dd7bf64aab636b8280a7b757eab
-
Filesize
5.2MB
MD5f48ae6d4eacd157cc10915fe1e3b9c3a
SHA1b1bec23a066799189fb2b3948e083ec0cf29f952
SHA2560707dac8c51217815ad81fd792203cb9e89e1590af8063caea8710b26093f498
SHA512364cb78b2ae110719d2c73214469bd463d505a0720488434a5bdec544e1c0c95a2c8a8e5bf4988a74cc4bcebb5dc282236769cc95d18d7520b6bf525eae03e30
-
Filesize
1.8MB
MD59e1c06a16c9930566f7c4bec387e8b55
SHA1cb7e883a0550f7474cd865da4d72ecd46ec547b4
SHA256011d119459b39f8112a6bbad0cfebbbb97196c5bc3663f8f1e3457f517827e7d
SHA5127483a041358d1acbc25dea36f5a3c9a6e6dd0dfb71783f3d00945c225edec65e6c915a7147de77417628ff7e2a735f0dbcc123a89f8f936e2b72c73dd80de8ec
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD500afae68a43d8845cbe0555330b2d332
SHA14db6e7281ba89d9808bddd823cae64fa6f7c6ea4
SHA256143d067bf572802cb8a76ad8e9e8b240b4f5cc6b757400a20fdfde18fb92a1fd
SHA51240670fd43961e6f8c41052545361af45393b508991c40393d63481db1a0389ee1ea9dd8f9a0077f3db4178968d4d404646992cdea3983a34ab6f041e408f5742
-
Filesize
448KB
MD596536cc145bb38ca4747dd924641ae52
SHA1dbc065d376e9f0084b4896698f3289262a5ffa6e
SHA2560d2741cf2412ec57481c11c7fbec19d7ad314e45dc9997b3fd6cfdaa6b7ec944
SHA512af565c6f1507004cd26fa0c2fc8e014960e6a4644c6dab7211e8591cc4b679eaeacd7b12faaca76b02496ef01f17b9f8815711127adc9d43550d4e8b3953fbe3
-
Filesize
192KB
MD55d4ac72967d655e2768084a3d6518990
SHA1fb958903b70a96219a7e0c2a9fd5cce47884f152
SHA25607531662fcf7eae82e4fa1ad35eab3333ae0f4f0b56d9db0e90bb80ee0ce21f0
SHA512ad58d15aadb1d94c1beb64e0755a17b7787cd9fcbdb1d7fc80249344804a78dfbcd7ea5f8f97330417761fc8cfa54c726acb8adca44183be2597ee87cb8dba86
-
Filesize
192KB
MD5b0501abdb7e3d679dfeba1158d0b7cb0
SHA1272a4664af0c6ba1ab40459656e60c5cfb3725ee
SHA256ba77a33078a08cdc1dc6ff3fde2a7a1a9d5d2520a3ff74cc8ea95e288b1e3fc3
SHA5121f36cce8c018f046a4fd19011dfd9914ac1b8708e95c06e44ff065b7aeac9b44da7630ce0f915a693a556b2257c3d8aa603d653d43f6a3690aec9c98dbdd7936
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
3KB
MD588aba96b3bd1119a44173fcaa05846a5
SHA14825aac249064009e7552521078c63990e501bb4
SHA256679acfe628efe9f7e6423e12f51d1ba5b29826c4ef8e46e873653b6e76d35700
SHA512939fdda959477c8eeb3678ddbfa67edf774e82b4c948acb36e1b3d7a4ca62861cc58bf519290dc5687118849932f1c42419a1ecc2c79a01eb490bf5f3dcc9f0b
-
Filesize
677KB
MD58519bfba2d14dbdca979e73c62ed4b46
SHA1388030278d4f7e4d88754adc3ff95df54e01eda9
SHA2566848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5
SHA512a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
261KB
MD5117317fbb36d19cd13ec4ad689003337
SHA1255559041e48bf87b5409d62da5bdb93e4933c8d
SHA256afd1ac557f3abeb5bb9a8358f0a3b06e5d276ff7b478b768af4d34af6e15cba2
SHA5121c035c63157a3bb6cb00b9e3c2e6ea9af15b8b8edb3a6a34eb2a2530a3d080a37f806a6b2045bb68ede64373cb85b18b1e8632a331ad5448e9e77ffdd2801e80
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
1.2MB
MD5c713698774acbf295528b4d19cc7800d
SHA123005d8a605ebffd31f6564af3c6e1d70a6d2195
SHA256a9ede3a195f0f57040b8e77907e9676e84ee63ae34806f2933bd2f72a26cfcb1
SHA5122a7bff3212702ea928604fe779e7537d123a95294624a1a2b59efc2ee7e10b78c62eca33fc4ff6709aa64a8c8848e56ea4301a772def5d5e48c8c4f79c8eb926
-
Filesize
1.9MB
MD5a1d098ea468c9cb1ffcea9f9356a713d
SHA14d823cb7927b6ff059197871e70287b90e3003e7
SHA2563deb805191106a5b9545b00589bfb7d21db8ba510dc64faaa0dc400096d343df
SHA51227f79b13ccbf6fcfb0591e402de557af164d45a0e5d0186e06ebcb8e6fafaca0b38c17e987344bf3052b1ca1f69020a44c0585abe04442c55eed1d3aa7b0ea51
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
192KB
MD5922e9bd10aa9555b696b43d24027234b
SHA103f176287383b885b927028baa6e34e57a84bc70
SHA2562d05d884a7e2a031bd3334f36eef3d172b9a25a9c2dc9222fe52eed5e3c6ea72
SHA512a633ba9061ed501408fd497c7b7e52e91be051931ea80cb54ac5010cfe944197aab6bb28d992dccb9f3649e934c0ed8d5895db2e38f1d8b80dee2d5668011e30
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57b99f2e1ab340f7e7b1567c468719fd9
SHA182cabc6fd714ec277da85445048d5b1ae87ab165
SHA256f0a8981dbbce75c370b30bae64dd4673e0c21d4c2d6a6fcb7ae8081cc6828353
SHA512a440ed27d65c25e86fa271237e8f1383f7f23830a44d78b237d3faa42aa005f0859a54ec6f189d1b152ad077c94ea71f7231e36fc899f16017bea793c84abf91
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5db54b2fd6f7ac34e729fc94f8bad8af0
SHA11d466b69cbb016d68a9559dadb88e927de0d56ee
SHA2562acad2ad040c9e0ba51c9d3c38c38b774cf4a859ed70e0157f5b0dc6713445d3
SHA512fa3ef033137c867b582b579d6f99666c3b5110e5468d39bd062220acee39c24454c0dcb04f273053fac86ea8a1540f607d79e0095ca4d05add6864324fea5d9b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d5fb05e08e6bc96ee241c67045ad0466
SHA11d98b88a4c92869730706f0d8e13c5fd20dd3ed8
SHA2569f9fcfcb30ef30d6d611f92b275202cb6bd7f78cad066150e4545c6fa054f068
SHA512f40d9aac92b4dc015dedcf6f238f61424e4c496a346bc7c9fb487e39be85af52f0e23c3969641a88d3d03fd9bb01ff655748884f66d3529a5b9df6a8579865bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD518f3a7ca9d4d5b90d05da08e1b3c4b0b
SHA17c06c5a7d8b605293eec38dc324dc91feabcc28d
SHA256b603923b6aeda4e198bc9e07f2645db917d754de613def2dbf04592d05ed9458
SHA512f12bea6d587756695ecd996574b389e043aa43236ad9e3c438461fccbdb64324bc32f5882246032cfa9d03ab658ba745f75d1d8e81d720ed40a3b71b0e05221c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56a74a927bf124d9bace3ad49d1b6737d
SHA107f6cf277113f7dead56ac9b54ece67484ad01f6
SHA256014065fde317ebaea766907cdf1c719f4c3924ddf2beb7edf7a3730acaaff194
SHA512dd898ac3f763d5363fd5b392afe32788df1838caceda9fba60204f9d44ac93989592d5c541aaaabe7e7ff56f580763eb3c18d0f44af061202f106f0fd6d3d56e
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec