Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe
Resource
win10v2004-20240226-en
General
-
Target
055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe
-
Size
312KB
-
MD5
fa404e6e0f5574b90c7ec5e3fa67dffa
-
SHA1
43edcda3198aea86d473dacf6cdaf084fcace5a1
-
SHA256
055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a
-
SHA512
af252b0fd65be9bb0d9687a40759681402c6b41e752a991e0d7cee0bf7e986f582c3c10c1ea4d1695d627e97ad675514edab5e119a0715a94dfedcdd0f030335
-
SSDEEP
3072:OgCr5Jsw0RZJ/+pYYKEXnLRgowqC2gZd0mzwNrUBqCKp6qXKAG:kszx+Jluh701JU7KpBaJ
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://herdbescuitinjurywu.shop/api
https://relevantvoicelesskw.shop/api
Signatures
-
Glupteba payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4452-308-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4452-306-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral1/memory/4452-428-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4452-530-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4452-607-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
F2D0.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ F2D0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 281 4260 rundll32.exe 282 6072 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1940 netsh.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
F2D0.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F2D0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F2D0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
u1g0.1.exeu1g0.0.exeBKJJJDHDGD.exeexplorgu.exeDA26.exeEasyAppns.exeInstallSetup_four.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation u1g0.1.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation u1g0.0.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation BKJJJDHDGD.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation DA26.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation EasyAppns.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation InstallSetup_four.exe -
Deletes itself 1 IoCs
Processes:
pid process 3420 -
Executes dropped EXE 22 IoCs
Processes:
C63E.exeDA26.exeE1F7.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeF2D0.exeapril.tmpEasyApp.exeFE89.exeflashdecompiler32.exeflashdecompiler32.exeu1g0.0.exeu1g0.1.exe288c47bbc1871b439df19ff4df68f076.exeBKJJJDHDGD.execsrss.exeinjector.exeexplorgu.exewindefender.exewindefender.exepid process 1600 C63E.exe 948 DA26.exe 2324 E1F7.exe 1872 InstallSetup_four.exe 4452 288c47bbc1871b439df19ff4df68f076.exe 1320 EasyAppns.exe 4704 april.exe 5584 F2D0.exe 5592 april.tmp 5648 EasyApp.exe 6084 FE89.exe 1484 flashdecompiler32.exe 3456 flashdecompiler32.exe 5196 u1g0.0.exe 5200 u1g0.1.exe 1608 288c47bbc1871b439df19ff4df68f076.exe 5492 BKJJJDHDGD.exe 5964 csrss.exe 5984 injector.exe 5308 explorgu.exe 5228 windefender.exe 6068 windefender.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
F2D0.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine F2D0.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine explorgu.exe -
Loads dropped DLL 7 IoCs
Processes:
regsvr32.exeapril.tmpu1g0.0.exerundll32.exerundll32.exerundll32.exepid process 2168 regsvr32.exe 5592 april.tmp 5196 u1g0.0.exe 5196 u1g0.0.exe 4776 rundll32.exe 4260 rundll32.exe 6072 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
BKJJJDHDGD.exe288c47bbc1871b439df19ff4df68f076.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BKJJJDHDGD.exe" BKJJJDHDGD.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
FE89.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 FE89.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
F2D0.exeexplorgu.exepid process 5584 F2D0.exe 5308 explorgu.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 5 IoCs
Processes:
F2D0.exe288c47bbc1871b439df19ff4df68f076.execsrss.exedescription ioc process File created C:\Windows\Tasks\explorgu.job F2D0.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3900 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2480 2324 WerFault.exe E1F7.exe 972 5648 WerFault.exe EasyApp.exe 5356 1872 WerFault.exe InstallSetup_four.exe 6028 5196 WerFault.exe u1g0.0.exe 5984 1608 WerFault.exe 288c47bbc1871b439df19ff4df68f076.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u1g0.1.exe055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exeC63E.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1g0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1g0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C63E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1g0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C63E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C63E.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1g0.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1g0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1g0.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5556 schtasks.exe 4016 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exepid process 2224 055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe 2224 055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exeC63E.exepid process 2224 055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe 1600 C63E.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exe288c47bbc1871b439df19ff4df68f076.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exeBKJJJDHDGD.exedescription pid process Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 1712 powershell.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 4452 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 4452 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 1796 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 5672 powershell.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 5492 BKJJJDHDGD.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
u1g0.1.exepid process 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u1g0.1.exepid process 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe 5200 u1g0.1.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3420 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeDA26.exeapril.exeEasyAppns.exeapril.tmpInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeu1g0.1.exe288c47bbc1871b439df19ff4df68f076.exeu1g0.0.execmd.exedescription pid process target process PID 3420 wrote to memory of 1600 3420 C63E.exe PID 3420 wrote to memory of 1600 3420 C63E.exe PID 3420 wrote to memory of 1600 3420 C63E.exe PID 3420 wrote to memory of 808 3420 regsvr32.exe PID 3420 wrote to memory of 808 3420 regsvr32.exe PID 808 wrote to memory of 2168 808 regsvr32.exe regsvr32.exe PID 808 wrote to memory of 2168 808 regsvr32.exe regsvr32.exe PID 808 wrote to memory of 2168 808 regsvr32.exe regsvr32.exe PID 3420 wrote to memory of 948 3420 DA26.exe PID 3420 wrote to memory of 948 3420 DA26.exe PID 3420 wrote to memory of 948 3420 DA26.exe PID 3420 wrote to memory of 2324 3420 E1F7.exe PID 3420 wrote to memory of 2324 3420 E1F7.exe PID 3420 wrote to memory of 2324 3420 E1F7.exe PID 948 wrote to memory of 1872 948 DA26.exe InstallSetup_four.exe PID 948 wrote to memory of 1872 948 DA26.exe InstallSetup_four.exe PID 948 wrote to memory of 1872 948 DA26.exe InstallSetup_four.exe PID 948 wrote to memory of 4452 948 DA26.exe 288c47bbc1871b439df19ff4df68f076.exe PID 948 wrote to memory of 4452 948 DA26.exe 288c47bbc1871b439df19ff4df68f076.exe PID 948 wrote to memory of 4452 948 DA26.exe 288c47bbc1871b439df19ff4df68f076.exe PID 948 wrote to memory of 1320 948 DA26.exe EasyAppns.exe PID 948 wrote to memory of 1320 948 DA26.exe EasyAppns.exe PID 948 wrote to memory of 1320 948 DA26.exe EasyAppns.exe PID 948 wrote to memory of 4704 948 DA26.exe april.exe PID 948 wrote to memory of 4704 948 DA26.exe april.exe PID 948 wrote to memory of 4704 948 DA26.exe april.exe PID 3420 wrote to memory of 5584 3420 F2D0.exe PID 3420 wrote to memory of 5584 3420 F2D0.exe PID 3420 wrote to memory of 5584 3420 F2D0.exe PID 4704 wrote to memory of 5592 4704 april.exe april.tmp PID 4704 wrote to memory of 5592 4704 april.exe april.tmp PID 4704 wrote to memory of 5592 4704 april.exe april.tmp PID 1320 wrote to memory of 5648 1320 EasyAppns.exe EasyApp.exe PID 1320 wrote to memory of 5648 1320 EasyAppns.exe EasyApp.exe PID 1320 wrote to memory of 5648 1320 EasyAppns.exe EasyApp.exe PID 3420 wrote to memory of 6084 3420 FE89.exe PID 3420 wrote to memory of 6084 3420 FE89.exe PID 3420 wrote to memory of 6084 3420 FE89.exe PID 5592 wrote to memory of 1484 5592 april.tmp flashdecompiler32.exe PID 5592 wrote to memory of 1484 5592 april.tmp flashdecompiler32.exe PID 5592 wrote to memory of 1484 5592 april.tmp flashdecompiler32.exe PID 5592 wrote to memory of 3456 5592 april.tmp flashdecompiler32.exe PID 5592 wrote to memory of 3456 5592 april.tmp flashdecompiler32.exe PID 5592 wrote to memory of 3456 5592 april.tmp flashdecompiler32.exe PID 1872 wrote to memory of 5196 1872 InstallSetup_four.exe u1g0.0.exe PID 1872 wrote to memory of 5196 1872 InstallSetup_four.exe u1g0.0.exe PID 1872 wrote to memory of 5196 1872 InstallSetup_four.exe u1g0.0.exe PID 1872 wrote to memory of 5200 1872 InstallSetup_four.exe u1g0.1.exe PID 1872 wrote to memory of 5200 1872 InstallSetup_four.exe u1g0.1.exe PID 1872 wrote to memory of 5200 1872 InstallSetup_four.exe u1g0.1.exe PID 4452 wrote to memory of 1712 4452 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4452 wrote to memory of 1712 4452 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 4452 wrote to memory of 1712 4452 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 5200 wrote to memory of 1796 5200 u1g0.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 5200 wrote to memory of 1796 5200 u1g0.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1608 wrote to memory of 5672 1608 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1608 wrote to memory of 5672 1608 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1608 wrote to memory of 5672 1608 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 5196 wrote to memory of 3092 5196 u1g0.0.exe cmd.exe PID 5196 wrote to memory of 3092 5196 u1g0.0.exe cmd.exe PID 5196 wrote to memory of 3092 5196 u1g0.0.exe cmd.exe PID 3092 wrote to memory of 5492 3092 cmd.exe BKJJJDHDGD.exe PID 3092 wrote to memory of 5492 3092 cmd.exe BKJJJDHDGD.exe PID 3092 wrote to memory of 5492 3092 cmd.exe BKJJJDHDGD.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe"C:\Users\Admin\AppData\Local\Temp\055e37bf8546779aada7a3924dd4abc0ae80ebb2877ee4b15aae4c59766ee94a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2224
-
C:\Users\Admin\AppData\Local\Temp\C63E.exeC:\Users\Admin\AppData\Local\Temp\C63E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1600
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\CC88.dll1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\CC88.dll2⤵
- Loads dropped DLL
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\DA26.exeC:\Users\Admin\AppData\Local\Temp\DA26.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\u1g0.0.exe"C:\Users\Admin\AppData\Local\Temp\u1g0.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:5196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\BKJJJDHDGD.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\BKJJJDHDGD.exe"C:\Users\Admin\AppData\Local\Temp\BKJJJDHDGD.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\BKJJJDHDGD.exe6⤵PID:4508
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:1812
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5196 -s 26164⤵
- Program crash
PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1g0.1.exe"C:\Users\Admin\AppData\Local\Temp\u1g0.1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 6883⤵
- Program crash
PID:5356
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5452
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1940
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5240
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:5964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5556
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:5128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:5984
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4016
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:5228 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1240
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:3900
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 7124⤵
- Program crash
PID:5984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:5648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 10884⤵
- Program crash
PID:972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\is-8FIR8.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-8FIR8.tmp\april.tmp" /SL5="$A006C,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5592 -
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -i4⤵
- Executes dropped EXE
PID:1484
-
-
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\flashdecompiler32.exe" -s4⤵
- Executes dropped EXE
PID:3456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E1F7.exeC:\Users\Admin\AppData\Local\Temp\E1F7.exe1⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 11042⤵
- Program crash
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\F2D0.exeC:\Users\Admin\AppData\Local\Temp\F2D0.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:5584
-
C:\Users\Admin\AppData\Local\Temp\FE89.exeC:\Users\Admin\AppData\Local\Temp\FE89.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:6084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5648 -ip 56481⤵PID:5412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2324 -ip 23241⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1872 -ip 18721⤵PID:5236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5196 -ip 51961⤵PID:5920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1608 -ip 16081⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5308 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:4776 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4260 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:3848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\098131212907_Desktop.zip' -CompressionLevel Optimal4⤵PID:2496
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6072
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:6068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.4MB
MD5a6c0994e8f7e9c62fd0b60ec30da571b
SHA1a59232ade92bf57f80c6594ac8d6b95dfb6ccaac
SHA25658db50c6d66818fc189f27d929db52d1a9e263fb69e168bec45caf0102f19c93
SHA5127dc1b5b9f3fe8824d681a79ab626dce792dd0fcbf60acf123277cb2baba9c67743a06c8d94c19485c2f79cb54f3a11810d197e26439b2b00991063c0a942dd9b
-
Filesize
896KB
MD51b6be626e595bdf28fc05de25e3a598d
SHA1e11a4363c382828341429e90756e2488f43c49a6
SHA256330d9c7292319b3c7a4d654575913bdf3ae11644f887eedd4502d1a88af8927d
SHA512ac9e22fd1674c83596172a1046623a0748d3ad9ac8d9f9288d58172ec5546d281b9b1d1760037e2469864962d7fabc6e49ea96d7a7f5c9aa22cc4ea3bd9294e0
-
Filesize
576KB
MD527af71172da8736647dbdaeee9d42001
SHA10899fd8c46f62f1ea3bd4bf99f3b6888eb5b9564
SHA256411e42551d70016666a05c01636974ea476e66f3c33f6f0516c4e707dcfdf4b2
SHA512afe0a34d2275392d4fb85b598a4d9f1d77308939af3ed07da5a330740b0e4eca6c57a81e2d1ed527361f43bfdeda208e68fddcbe4751444b3676901539f9b205
-
Filesize
1.8MB
MD5dfb04c99ff9c9c5e3680e9f66eed0b42
SHA16f1bfffeb5d0df4af3c02969d42c075d6f8e28d8
SHA256ec056709f6332170c8c92141476541b3730b1e610d6d8e835e1489b608ea892f
SHA5123f7e6edb722a154094d59e8d92cdacca74e86a2853c567a4158025525780d62f0854a3eaa3007874f0d2a3ee467285313e84336a7550e06de52c86ff361696b1
-
Filesize
1.8MB
MD5253f5ed6a125b1f38411a1f390ae9ac9
SHA1418b6d3fb0b9ef54b85246febea752ec8244c7e0
SHA25652016a0cb2675cea5efac8fedca3f81d26a0d8626ae0e5886d4c4ef08dda1e19
SHA5129b3172c53497fe70dd0fdc4f6fc2e4b9abec205af55f865b1409b09019ead7ecf757e08c75df14229625e631d2cdf7cb66f7925c9d962a4168ddb9921044a1c0
-
Filesize
1.5MB
MD58033d19aba0fe805d3060e2d205c4b60
SHA1e2be2bca8e28988c23d9dd8978fc22929a6003bd
SHA256a249e197aae4c00e59d32c5da4ecf80c2c1a13cf8187da013c47c057e1ce0804
SHA512b8e79d4f33ad634325cc43612ba9448cf35f5989d56fe5a2f112339fd859e1b81e73131ddf9b0b4c043bbae6fa79d2a90600538f57783d22c1301df4b00b0770
-
Filesize
320KB
MD59acd857cf4985e8f3d622a9d85cb26ff
SHA10346667ca562d15ed5f6775b59591bfcc882a280
SHA2562f5050c752c7c00d3017bc8699b9422e9b0428b0b44ae45a1dc4f27e52de67b4
SHA512e9d9964b828606e8912efa1846b0295239c5496a78ffe91989f8d7db8cfe41d9bcba182d3ad428930d04727d424f1da8eb61d5f68818bbf0448401597473b409
-
Filesize
2.6MB
MD552974f91133691fa47dbb9b5bdbcc91c
SHA188404a3e0608a12b02d7dd1dde31e2edc90d8aba
SHA256c55d323dc328a9181bc9d91d29fbd1cc8eef786762b356ae59515dc51a6ff177
SHA512f43e4701234a8740838abe729026630dd3d041a1173d434b451a0450909e6d311a86caedbb650bae4aa556a24053ca044ba2a976d11e385e3c94a3009b4560de
-
Filesize
2.4MB
MD5606439b2a114682a2ee6ebad826fd9af
SHA1708e3410cc3402d250276ed12cd4351bb4cd7052
SHA25631ad4287234e99358c23f6c5b52b5e67c343296a072442bcc8e8d2c81d1229a0
SHA5129cf9d925ed55768baad5f4a6311c5f65e92cef0a43c5cc6e57b9b62cd894c3ed6e28c4312e8ffa0eefca1f610c22f5f5162ed4bdb5a3b15000ff42d69abc4cf1
-
Filesize
4.1MB
MD5c8564b4d627953e836d0faab99740a6a
SHA174b37a34950bd081d10072b4dae88952a4c52178
SHA256051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31
SHA51277af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
313KB
MD5a4272a7c88cc8308535ee3d009f83343
SHA168a121961abcd93c899e7280e897666d0008ff08
SHA256ecb59c8684d0d10257ba1dc4d38035bfdaf749071c8a867a4c81b661c2c2ce36
SHA51296041b91df7cfbd80a69f385d076c4a841eb0b130bace83a6a291ef6c87a0cc779bd52c6578ba00baef5f37b9d6931f267e455045346f882b11eb81a00798ae4
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
4.0MB
MD568d69ec657238f2d0aee371af7cc567d
SHA1d6d823e9bd716f098929624dcae3884a7620c098
SHA256a75728df98a3a7a602054c71e636c2b3c28a47019627181ae0d1a352c3ca62fd
SHA51237ef48279527ea0ca893584519d0e3a5f0327a2c562665f38fce8c91481d9049a9d618a00ca5d1dfb656984573d721bf5fc193b39618ed5cbed0df66a4db04a6
-
Filesize
3.7MB
MD570e0b39b61ef0821579366b73b042208
SHA17da9e4ea2f9a5945e7205b9c246d8324bb12897c
SHA256ac2e064296fc1b5539e1012b192c90231f14b5fa276cb89aeea1b24f3b2e1a68
SHA512a83a13f399810a2dfe08b631f8cc50cfe402ec4b7c57c4f5986860d1f0ab97d4f0b9884875080b16ef0c8bbe5afa93f3fc54b782d81078f9a07dd51303512656
-
Filesize
1.2MB
MD549cc7f8d72febdd93762e4918dd4b412
SHA1be6db908dbc676b88ced592d7fdebdcbe6f9da20
SHA2567e37003fd694d0f5a110c3ecac6d9452696c6c2bcec3c96ba76ddd19b2ab4087
SHA512172d329a51892694275e3a98470792c6bcac0836c0d67d38b6d2c8e8c6a0c58117d04e795a924668037ce6da52cdd2254f50e7ea6fecf9951e0519e48989d9f4
-
Filesize
512KB
MD5cd2177adb1d2db047d852265d3ef4d5f
SHA15953f535aab3c0ca28a44b2baa293ada2c4d7b30
SHA256111c3990dc3f11752ffa5fb117b32bcaa033efeb4ae76af7518aa707ae710d0d
SHA5123a81b91715c57de2524088822b0448a30987290385df7d37495598b55ade5e4bc3386f3b8f626c5a6bc7f61e6df5616a403d1302c5ed4baa45c7b6a2284b1e2a
-
Filesize
988KB
MD5065760220981039db19b9701aaeffddf
SHA1318170b5ca3673cff578d89b7de116f9d6fcd961
SHA256cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf
SHA51281bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895
-
Filesize
576KB
MD5f8f2b0590aa6cacf7986e22625aafdeb
SHA19a55a92ca6a0041a608134d9fc1cfe7c85fc3f28
SHA256445f4ed9835d8ac5e2015faff3b5f090f12c7e254cc63898cfe0218b342c3e84
SHA512b3f1730c17ab24f6fe940541efa6cb3517ffbb48a21547fd50ba2372c251a9e2a1ea2fcec955a945c4960236d1deb5b9c63b09adb7b1887ac185bebee5f426ce
-
Filesize
1.1MB
MD5c35e1b75e0c129cf9853ed7b7fd5cab1
SHA16aee4c79639abeb46558e4ebd005dcdfa0096020
SHA256f06b5e2f95ad381398cfd0ecba059ff41d425987aff169f1004e8d1297b404f6
SHA5122d01cf63cdcafa93509c64bfa3ab8b2245dc8bbd96d91a12d0a7ea4fa4d44c07cf1ba5d8b4ca75c906c990a9c34713de4cffb5e1abc6a94107f340938cce7bc9
-
Filesize
1.1MB
MD518a04d971146c757f14a9910a78aee0c
SHA1dd9c7245de75e881f58e77d7d325390b23c7ab07
SHA256dd8e6dbdceb01a4a87a6884e58f5ac0cee413213c2690da79d6f56e5171ae5d2
SHA51223bb841556e71d80c091874337d67496975069ff8b504d6a710de64ba62b8ee6fda0d907368c774be27313de21da93d0b20a770df7052bdb516e4f668a48d875
-
Filesize
896KB
MD59c66abd4f9686fafda345d33662569de
SHA143c9a85ba22c74ff3d24258e41b5a72f39487424
SHA2563769d12b7ee5655b4a1c0cdfb62639eded2ca03e754daf42a0a67aaa7f2f185b
SHA5121aed9b2cab97ccbc5a2123739ba90dcccf218228b44703dace01610c115b8c518195bc6585909e6e704d58bdf16237a15bfe1277cdef04324761201f3cc58c7f
-
Filesize
832KB
MD5ca9bf6d70e1587054361fe2998e9b3b2
SHA179174f3d5d2306de31609864241e8b9394f1f5bc
SHA256bc733798be14963ad33dc29059c0d6efcb0f82529f42b2b514d40f452c096156
SHA51218c91006b100731b8a07f3f33c36184e1ac6286e301ceb8e40d4f86db9670c3cb6198250391b3b2ae879c957120de617d2e95577cc3ea85f0f7754036e89293e
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
384KB
MD5fab2096b8b2b7995d6653b99c71cc419
SHA17311e88d04874db5c13749f74939da0ba7e20670
SHA256484cfec19520e0448de6eed6bc247c3e4c43913d5cee0ac8a9c713c46fd570fb
SHA512393687cc76e8913792eb50ac1a1fc415276a7cf0ed78cf2fcef7d05205744913d46f4d425261a97d71be503f0644cb2b87e648876d8e432d85a3950189a78167
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD5fc124cbb469fb164c1e2dfea9038aedc
SHA1281c35cac9f069e1f92835cd7cd9da29bd7c24e9
SHA2567ca1c9be51ee89e622b573bb773cb75df288d4521574d650237bb3f1ec7f83e1
SHA512b33c036abcaa5866bb005d57e1784c813bc2623cdbdee9356371986535a4c237fb8232ccad1f0369dea4c8e9aa1af9577650c27e31d7cb761532306b417ea797
-
Filesize
192KB
MD55d4ac72967d655e2768084a3d6518990
SHA1fb958903b70a96219a7e0c2a9fd5cce47884f152
SHA25607531662fcf7eae82e4fa1ad35eab3333ae0f4f0b56d9db0e90bb80ee0ce21f0
SHA512ad58d15aadb1d94c1beb64e0755a17b7787cd9fcbdb1d7fc80249344804a78dfbcd7ea5f8f97330417761fc8cfa54c726acb8adca44183be2597ee87cb8dba86
-
Filesize
429KB
MD5dcb7e0db4aefc90c299741178bb6a13b
SHA1fda3d1bb163b3f3150ca75485beef4583abdbe73
SHA256aa405181d498ebb6249c5bbc9880d053ba5ca6a7a3f65bfe739c4b070b9926a1
SHA51213f4a4101c2eee648cfb946a7478b54cf121e6915e80f29082106f072ac0d6a63781a10b5c7ef485c839086f2762bc9f5a4e4625f28c0addf1124c105f2eedb2
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5b908f3d9bccce31b608355c6072b341a
SHA11e04d7f4addf74660d810498bce1142b95448d6f
SHA256d35fa2f8407c1fa901b677e6df2cfc6be4a0a3e0a60cb63c7616570f51c11890
SHA512df7853dda53f4c1e373671c74f6de1e495b87631089a0e2e4297abb9c71ca8418aee87d528b30fda2c9e075c246177defa91d9dfaa97116f9913f5fb2a4aaa89
-
Filesize
3KB
MD577aab38e79c19501fc63993beae474d8
SHA11f7e8a332a89508831f0b5f11d7937c0a8e02d9d
SHA256d6a9d98e2f71f9be7ec061fa7268b34fb07695a2065b521ca85867f544bdcbe2
SHA512c87deedeee3c3ec9eaca0ed20c81669d4fc7881157e984768d1c856a3b3e5a31d3b54feddf03ce17fb9ba2c980fab4401af65759d21c94571fbbce9f2e9e11a3
-
Filesize
677KB
MD58519bfba2d14dbdca979e73c62ed4b46
SHA1388030278d4f7e4d88754adc3ff95df54e01eda9
SHA2566848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5
SHA512a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
313KB
MD5af18a4dd8756963f563181c06b9a5f2a
SHA10ed6466d2671a581cd4ae90ab8e7a476be48cb95
SHA256244fc2603ec7810801f663f2e1c944ff51ecaea1bcc3bf5d08fc7012fdf28b71
SHA512617cc693cb9d521d4d7978f0579a6d47c36e0604238084880de577ef88e23573c34975a4853a1d2e5c4b4704de78b4648f35d7348012803136156b2a6ae5bdef
-
Filesize
14KB
MD5a5caebdfd810b40e670323e1ee0c4a68
SHA1a4e1a5b3d50e3ceae2dfb7dbb3c19bfbb4efa620
SHA256b8ccaf18a3b58f62c613621dd6788c31df95cf2af5124a3f4dab2f8cba6078f8
SHA51236fc1165a10e27628c12f4de21666f26d60d5f26d018682bd91e7e2ff828997d5be733970ded940f2804ae013279e91ee39e5c7a2b2cfbca485b7eb80a0f82b7
-
Filesize
3.3MB
MD50a42e4ec1c3c7d120a4d96c00ffa1b16
SHA1cbcc5ce358350042c8da719161b962278cebe78f
SHA2561b5d3b882ddaec11e10a1b26726caaeed74289d6429d5e903685da2553d82bab
SHA5123f8d1af0155020246cba7b01d54f0b2bb1a5b8ce3d08fefecacd071f58bd3180d8a3dfa23c9a630db6f04d23793555e7522e14d51f81be0f74cd02ef8d2572d7
-
Filesize
2.8MB
MD52a0ffe1da593f1a4b7bb348f5c3c56e2
SHA1942f33925d18f6d5874fffd550472d7904b5e18a
SHA256a77f9dd1f5a74bf92f7946c8bd8fae41409e341834529deb0e6d254336d9f1ce
SHA512bf5182259fe412db2264cbe94ea081963e845d1244297e34f1e24879942697ec2d1b11d3868f30c25ae85a6bf417d07a22b0f85c06bd1803429743970815d01f
-
Filesize
3.2MB
MD5b911d13a16edc205a8e56e0a6c9436c0
SHA129fb10bac40b87aff8349235d6e85b13041858c5
SHA256bc8381badda264919ffc77550188bb94cde353a678202cc962f52691709eeea3
SHA512f752781257c58fdde6f131f4940f5c0d6bebdeed174edfbebef11615371837058844ec5c055af5d33dc6dd7fdd39d6a66deadfabbf4a48f773b2e2767b2fee58
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
128KB
MD59a257316ba3f8d6339102e0af7ebd871
SHA1cccb834e6dfdb0aad6e445d6b7187aed5736f913
SHA256beb8e8b4ee588853efcf488323087ad6862ce09cb01694a26c76ac59835f40c3
SHA512f380348b55af71d0d5ccf267c0609234ae1b798c45d92da3c31ea0047bc73d0f9b64c09cc13691ccde180bcb2c0f0f630f3718167f584cfc2c9f85907578c2a4
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51143244100077c73a983ef49e2dcf1b1
SHA15c6beb32e0d3c306dda32d38cc3007201c62d1ef
SHA256b2e86d8f30adea0cd7c512601d1b9d944f8ebeb7cdbfff51b744cadcb41a40a1
SHA5129b6bab03e379f8d34d250913ff554be4437eaf78c4f3580cb739e2cd088ea45262ed0b23960ae011ee6e866b1e3f37fb2c38ec6ae642994225fc34fd35375cca
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD557d36966897dfc79c35868af74a9e7ce
SHA1095a50de19039810ae366d4bcaf30396bfba6e0a
SHA256b92701e161b85942968cbdbe432284cf93ef58d32ace61c4177578b9e74b9f4f
SHA5125ed78d60d5437cb4306d0987d6bc0d6bc52dcc796a2d20bee146005f1ed036d21b087274fad291988ed7454bad6289476ea1be08487103d7c9cae0a1fd0df029
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55efb44007cb16d06142de35a238ba5a9
SHA11da525886067207e37d62fe4677ef483b404ab59
SHA25603708819040fc74af38ecc297a108a776c37cf713a570889f7ef5c2b4cbb5634
SHA5129dc36f060c9e38bdd23b5bf10a1cc9c79176cb6230030bbc76fd4bda14d06f4dfb0b952b60dc3218a11b208eb8412f8548d4824a13c4c430b9469fb4771a6aa4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56531bbb39fbe74352c1c5e8676abd01a
SHA16992b3a78f46c57cc5f49cf022d221a9fb7609c0
SHA256765303f3bdc70155fc197b8777e3ffdffe25a8b905de25a8453026290658e3d4
SHA512cdec4addb63fe5f45d59ab5a0669de654083e1be999618b5f6eefa8273d5f565598ef3bfd5a6aeb800dc4302838b453c5aa994fcb1adbd381cf0a317379a85ac
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD517a0a4222172063f187298f7d5068b21
SHA1c93eb339de6f9ac7612e62e8cbb9e62d54dfed0c
SHA25682e68413f04c1fb207b5a9950a5f65bf4d9c4ff6772ea4a5e16d346355885b08
SHA512b04497a01e6c1fffd4997434d797fbada5252e778c04cb010f1c78fb4896ce8197e1bcdd6abbda51f254e415688397a7476dab69ea9a6a51a4ce7b9861d44e8e
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec