Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-03-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe
Resource
win10v2004-20240226-en
General
-
Target
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe
-
Size
1.9MB
-
MD5
b3f2dd3e80bb69607cb632e8d91c68f9
-
SHA1
14ca3b89c6eacccf014045a26e62750c3d20689c
-
SHA256
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7
-
SHA512
6a124eae24b603c43d9f9eb4c63b9eda3fb21189a69f32ab06e40de975ff1c14a749e1cd235edab973647aa4b09808b70bd7c2a1d1d80328a1531ae8b815ec04
-
SSDEEP
49152:NuetGYUVAgyd1wKjynZPKFZa2CchmW9OAP:8eARE1wK6KnUYLP
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/432-231-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral2/memory/432-239-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2840-261-0x00000000030C0000-0x00000000039AB000-memory.dmp family_glupteba behavioral2/memory/2840-272-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2840-391-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/432-440-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1076-446-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4264-598-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2864-597-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4264-657-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/440-660-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/440-717-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2864-749-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4072-777-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4072-799-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4072-813-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4072-827-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4072-834-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4072-840-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
explorha.exeadfbOTSuFSGJSqdMt1gqIu6P.exeexplorha.exe471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exeexplorha.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adfbOTSuFSGJSqdMt1gqIu6P.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 9 3300 rundll32.exe 10 2300 rundll32.exe 41 2324 rundll32.exe 45 2100 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 1956 netsh.exe 3236 netsh.exe 4908 netsh.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exeexplorha.exeexplorha.exeadfbOTSuFSGJSqdMt1gqIu6P.exeexplorha.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adfbOTSuFSGJSqdMt1gqIu6P.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion adfbOTSuFSGJSqdMt1gqIu6P.exe -
Executes dropped EXE 24 IoCs
Processes:
explorha.exelumma21.exechrosha.exeexplorha.exeboom8.exefile300un.exeDvwlK6NfXuNruCarnvSOOWrF.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeUdkjoWwZieUsrvfE8JpHfXVM.exelANimeHYWuuDti6zSuHw5MGs.exeu1pw.0.exeUdkjoWwZieUsrvfE8JpHfXVM.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeu1pw.1.exelANimeHYWuuDti6zSuHw5MGs.execsrss.exeboom8.exeexplorha.exeinjector.exewindefender.exewindefender.exeadfbOTSuFSGJSqdMt1gqIu6P.exeexplorha.exeboom8.exepid process 224 explorha.exe 2832 lumma21.exe 4340 chrosha.exe 3244 explorha.exe 4892 boom8.exe 1132 file300un.exe 2228 DvwlK6NfXuNruCarnvSOOWrF.exe 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe 1076 lANimeHYWuuDti6zSuHw5MGs.exe 864 u1pw.0.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 4264 1BdVyRMcDnlIbWxTzAJLQpAw.exe 2736 u1pw.1.exe 440 lANimeHYWuuDti6zSuHw5MGs.exe 4072 csrss.exe 2108 boom8.exe 4992 explorha.exe 1416 injector.exe 4576 windefender.exe 3592 windefender.exe 2344 adfbOTSuFSGJSqdMt1gqIu6P.exe 2008 explorha.exe 4672 boom8.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorha.exe471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exeexplorha.exeexplorha.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine explorha.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 3704 rundll32.exe 3300 rundll32.exe 1216 rundll32.exe 2300 rundll32.exe 2324 rundll32.exe 2100 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\adfbOTSuFSGJSqdMt1gqIu6P.exe themida behavioral2/memory/2344-857-0x00007FF6F3810000-0x00007FF6F4227000-memory.dmp themida behavioral2/memory/2344-858-0x00007FF6F3810000-0x00007FF6F4227000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\u1pw.1.exe upx C:\Windows\windefender.exe upx behavioral2/memory/4576-810-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3592-825-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3592-837-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
file300un.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeUdkjoWwZieUsrvfE8JpHfXVM.exelANimeHYWuuDti6zSuHw5MGs.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\.BLRVzdv\\svchost.exe\"" file300un.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 1BdVyRMcDnlIbWxTzAJLQpAw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" lANimeHYWuuDti6zSuHw5MGs.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
adfbOTSuFSGJSqdMt1gqIu6P.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA adfbOTSuFSGJSqdMt1gqIu6P.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 57 api.myip.com 58 ipinfo.io 47 ipinfo.io 48 api.myip.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 17 IoCs
Processes:
powershell.exepowershell.exepowershell.exeadfbOTSuFSGJSqdMt1gqIu6P.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini adfbOTSuFSGJSqdMt1gqIu6P.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol adfbOTSuFSGJSqdMt1gqIu6P.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy adfbOTSuFSGJSqdMt1gqIu6P.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI adfbOTSuFSGJSqdMt1gqIu6P.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exeexplorha.exeexplorha.exeexplorha.exeadfbOTSuFSGJSqdMt1gqIu6P.exeexplorha.exepid process 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe 224 explorha.exe 3244 explorha.exe 4992 explorha.exe 2344 adfbOTSuFSGJSqdMt1gqIu6P.exe 2008 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file300un.exedescription pid process target process PID 1132 set thread context of 2360 1132 file300un.exe CasPol.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
UdkjoWwZieUsrvfE8JpHfXVM.exe1BdVyRMcDnlIbWxTzAJLQpAw.exelANimeHYWuuDti6zSuHw5MGs.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN UdkjoWwZieUsrvfE8JpHfXVM.exe File opened (read-only) \??\VBoxMiniRdrDN 1BdVyRMcDnlIbWxTzAJLQpAw.exe File opened (read-only) \??\VBoxMiniRdrDN lANimeHYWuuDti6zSuHw5MGs.exe -
Drops file in Windows directory 10 IoCs
Processes:
lumma21.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeUdkjoWwZieUsrvfE8JpHfXVM.exelANimeHYWuuDti6zSuHw5MGs.exe471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.execsrss.exedescription ioc process File created C:\Windows\Tasks\chrosha.job lumma21.exe File opened for modification C:\Windows\rss 1BdVyRMcDnlIbWxTzAJLQpAw.exe File created C:\Windows\rss\csrss.exe 1BdVyRMcDnlIbWxTzAJLQpAw.exe File opened for modification C:\Windows\rss UdkjoWwZieUsrvfE8JpHfXVM.exe File created C:\Windows\rss\csrss.exe lANimeHYWuuDti6zSuHw5MGs.exe File created C:\Windows\Tasks\explorha.job 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe File created C:\Windows\rss\csrss.exe UdkjoWwZieUsrvfE8JpHfXVM.exe File opened for modification C:\Windows\rss lANimeHYWuuDti6zSuHw5MGs.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4660 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2152 2228 WerFault.exe DvwlK6NfXuNruCarnvSOOWrF.exe 1772 864 WerFault.exe u1pw.0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1pw.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1pw.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1pw.0.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2840 schtasks.exe 2152 schtasks.exe 2384 schtasks.exe 4124 schtasks.exe 4120 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exepowershell.exepowershell.exepowershell.exeUdkjoWwZieUsrvfE8JpHfXVM.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" UdkjoWwZieUsrvfE8JpHfXVM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exeexplorha.exeexplorha.exerundll32.exepowershell.exerundll32.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeUdkjoWwZieUsrvfE8JpHfXVM.exepowershell.exepowershell.exelANimeHYWuuDti6zSuHw5MGs.exepowershell.exeUdkjoWwZieUsrvfE8JpHfXVM.exe1BdVyRMcDnlIbWxTzAJLQpAw.exepid process 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe 224 explorha.exe 224 explorha.exe 3244 explorha.exe 3244 explorha.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 3300 rundll32.exe 4944 powershell.exe 4944 powershell.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2300 rundll32.exe 2304 powershell.exe 2304 powershell.exe 4404 powershell.exe 4404 powershell.exe 960 powershell.exe 960 powershell.exe 4944 powershell.exe 4944 powershell.exe 4864 powershell.exe 4864 powershell.exe 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe 3944 powershell.exe 3944 powershell.exe 4048 powershell.exe 4048 powershell.exe 3944 powershell.exe 4048 powershell.exe 1076 lANimeHYWuuDti6zSuHw5MGs.exe 1076 lANimeHYWuuDti6zSuHw5MGs.exe 2700 powershell.exe 2700 powershell.exe 2700 powershell.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 2864 UdkjoWwZieUsrvfE8JpHfXVM.exe 4264 1BdVyRMcDnlIbWxTzAJLQpAw.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
powershell.exepowershell.exepowershell.exeCasPol.exepowershell.exepowershell.exepowershell.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeUdkjoWwZieUsrvfE8JpHfXVM.exepowershell.exepowershell.exelANimeHYWuuDti6zSuHw5MGs.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 4944 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 2360 CasPol.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeDebugPrivilege 4944 powershell.exe Token: SeDebugPrivilege 4864 powershell.exe Token: SeDebugPrivilege 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe Token: SeImpersonatePrivilege 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe Token: SeDebugPrivilege 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe Token: SeImpersonatePrivilege 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 1076 lANimeHYWuuDti6zSuHw5MGs.exe Token: SeImpersonatePrivilege 1076 lANimeHYWuuDti6zSuHw5MGs.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 760 powershell.exe Token: SeDebugPrivilege 3884 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 5000 powershell.exe Token: SeDebugPrivilege 3916 powershell.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 csrss.exe Token: SeSecurityPrivilege 4660 sc.exe Token: SeSecurityPrivilege 4660 sc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exepid process 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u1pw.1.exepid process 2736 u1pw.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exeexplorha.exechrosha.exeboom8.exerundll32.exerundll32.exerundll32.exerundll32.exefile300un.execmd.exeCasPol.exe1BdVyRMcDnlIbWxTzAJLQpAw.exeUdkjoWwZieUsrvfE8JpHfXVM.exedescription pid process target process PID 2344 wrote to memory of 224 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe explorha.exe PID 2344 wrote to memory of 224 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe explorha.exe PID 2344 wrote to memory of 224 2344 471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe explorha.exe PID 224 wrote to memory of 2832 224 explorha.exe lumma21.exe PID 224 wrote to memory of 2832 224 explorha.exe lumma21.exe PID 224 wrote to memory of 2832 224 explorha.exe lumma21.exe PID 4340 wrote to memory of 4892 4340 chrosha.exe boom8.exe PID 4340 wrote to memory of 4892 4340 chrosha.exe boom8.exe PID 4340 wrote to memory of 4892 4340 chrosha.exe boom8.exe PID 4892 wrote to memory of 2840 4892 boom8.exe schtasks.exe PID 4892 wrote to memory of 2840 4892 boom8.exe schtasks.exe PID 4892 wrote to memory of 2840 4892 boom8.exe schtasks.exe PID 4340 wrote to memory of 3704 4340 chrosha.exe rundll32.exe PID 4340 wrote to memory of 3704 4340 chrosha.exe rundll32.exe PID 4340 wrote to memory of 3704 4340 chrosha.exe rundll32.exe PID 3704 wrote to memory of 3300 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 3300 3704 rundll32.exe rundll32.exe PID 3300 wrote to memory of 356 3300 rundll32.exe netsh.exe PID 3300 wrote to memory of 356 3300 rundll32.exe netsh.exe PID 3300 wrote to memory of 4944 3300 rundll32.exe powershell.exe PID 3300 wrote to memory of 4944 3300 rundll32.exe powershell.exe PID 224 wrote to memory of 1216 224 explorha.exe rundll32.exe PID 224 wrote to memory of 1216 224 explorha.exe rundll32.exe PID 224 wrote to memory of 1216 224 explorha.exe rundll32.exe PID 1216 wrote to memory of 2300 1216 rundll32.exe rundll32.exe PID 1216 wrote to memory of 2300 1216 rundll32.exe rundll32.exe PID 2300 wrote to memory of 2656 2300 rundll32.exe netsh.exe PID 2300 wrote to memory of 2656 2300 rundll32.exe netsh.exe PID 2300 wrote to memory of 2304 2300 rundll32.exe powershell.exe PID 2300 wrote to memory of 2304 2300 rundll32.exe powershell.exe PID 4340 wrote to memory of 1132 4340 chrosha.exe file300un.exe PID 4340 wrote to memory of 1132 4340 chrosha.exe file300un.exe PID 1132 wrote to memory of 4404 1132 file300un.exe powershell.exe PID 1132 wrote to memory of 4404 1132 file300un.exe powershell.exe PID 1132 wrote to memory of 4832 1132 file300un.exe cmd.exe PID 1132 wrote to memory of 4832 1132 file300un.exe cmd.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 1132 wrote to memory of 2360 1132 file300un.exe CasPol.exe PID 4832 wrote to memory of 2152 4832 cmd.exe schtasks.exe PID 4832 wrote to memory of 2152 4832 cmd.exe schtasks.exe PID 2360 wrote to memory of 2228 2360 CasPol.exe DvwlK6NfXuNruCarnvSOOWrF.exe PID 2360 wrote to memory of 2228 2360 CasPol.exe DvwlK6NfXuNruCarnvSOOWrF.exe PID 2360 wrote to memory of 2228 2360 CasPol.exe DvwlK6NfXuNruCarnvSOOWrF.exe PID 2360 wrote to memory of 432 2360 CasPol.exe 1BdVyRMcDnlIbWxTzAJLQpAw.exe PID 2360 wrote to memory of 432 2360 CasPol.exe 1BdVyRMcDnlIbWxTzAJLQpAw.exe PID 2360 wrote to memory of 432 2360 CasPol.exe 1BdVyRMcDnlIbWxTzAJLQpAw.exe PID 2360 wrote to memory of 2840 2360 CasPol.exe UdkjoWwZieUsrvfE8JpHfXVM.exe PID 2360 wrote to memory of 2840 2360 CasPol.exe UdkjoWwZieUsrvfE8JpHfXVM.exe PID 2360 wrote to memory of 2840 2360 CasPol.exe UdkjoWwZieUsrvfE8JpHfXVM.exe PID 432 wrote to memory of 960 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe chcp.com PID 432 wrote to memory of 960 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe chcp.com PID 432 wrote to memory of 960 432 1BdVyRMcDnlIbWxTzAJLQpAw.exe chcp.com PID 4340 wrote to memory of 2324 4340 chrosha.exe rundll32.exe PID 4340 wrote to memory of 2324 4340 chrosha.exe rundll32.exe PID 4340 wrote to memory of 2324 4340 chrosha.exe rundll32.exe PID 2840 wrote to memory of 4944 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe powershell.exe PID 2840 wrote to memory of 4944 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe powershell.exe PID 2840 wrote to memory of 4944 2840 UdkjoWwZieUsrvfE8JpHfXVM.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe"C:\Users\Admin\AppData\Local\Temp\471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2832
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\181651180316_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F3⤵
- Creates scheduled task(s)
PID:2840
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\181651180316_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'4⤵
- Creates scheduled task(s)
PID:2152
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\Pictures\DvwlK6NfXuNruCarnvSOOWrF.exe"C:\Users\Admin\Pictures\DvwlK6NfXuNruCarnvSOOWrF.exe"4⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\u1pw.0.exe"C:\Users\Admin\AppData\Local\Temp\u1pw.0.exe"5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JECAFHJEGC.exe"6⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\JECAFHJEGC.exe"C:\Users\Admin\AppData\Local\Temp\JECAFHJEGC.exe"7⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JECAFHJEGC.exe8⤵PID:3968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:3884
-
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30009⤵
- Runs ping.exe
PID:4536
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 24486⤵
- Program crash
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1pw.1.exe"C:\Users\Admin\AppData\Local\Temp\u1pw.1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:1596
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:2384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 15405⤵
- Program crash
PID:2152
-
-
-
C:\Users\Admin\Pictures\1BdVyRMcDnlIbWxTzAJLQpAw.exe"C:\Users\Admin\Pictures\1BdVyRMcDnlIbWxTzAJLQpAw.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Users\Admin\Pictures\1BdVyRMcDnlIbWxTzAJLQpAw.exe"C:\Users\Admin\Pictures\1BdVyRMcDnlIbWxTzAJLQpAw.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3900
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:3236
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:4124
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:4528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
PID:1416
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:4120
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:2520
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\UdkjoWwZieUsrvfE8JpHfXVM.exe"C:\Users\Admin\Pictures\UdkjoWwZieUsrvfE8JpHfXVM.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\Pictures\UdkjoWwZieUsrvfE8JpHfXVM.exe"C:\Users\Admin\Pictures\UdkjoWwZieUsrvfE8JpHfXVM.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:1048
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:1956
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:3944
-
-
-
-
-
C:\Users\Admin\Pictures\lANimeHYWuuDti6zSuHw5MGs.exe"C:\Users\Admin\Pictures\lANimeHYWuuDti6zSuHw5MGs.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\Pictures\lANimeHYWuuDti6zSuHw5MGs.exe"C:\Users\Admin\Pictures\lANimeHYWuuDti6zSuHw5MGs.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:2472
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:4908
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
-
C:\Users\Admin\Pictures\adfbOTSuFSGJSqdMt1gqIu6P.exe"C:\Users\Admin\Pictures\adfbOTSuFSGJSqdMt1gqIu6P.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2344
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2228 -ip 22281⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵
- Executes dropped EXE
PID:2108
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4992
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 864 -ip 8641⤵PID:4400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2008
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵
- Executes dropped EXE
PID:4672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a87844d5b61c42fc602f01070f37ec45
SHA1415b87ba63f0d908bb804ba10d91a74e536ad9f3
SHA2566a58c5abebd242398876f15234c7794b10fac5e79ac7ba1074b240a2acc30a81
SHA51263541fd2ed677c03c11af0c2433ada1e97dd1da818a33fe4ed7b9b897679a01acc1c8385f34051cae3516f249cd4c85978d52450280f9a355a61bdcbf33e5eb9
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
19KB
MD52a8a93ffb35287f206bdd2826994f069
SHA1df7d3bf4bf3ea09b2628ae7393b447dbd752b4bc
SHA256aacf541ad17df6462dccd3f5ae943faf0816f943155581f5ab7bf10ff8fbd0fd
SHA51204cb30d1d735bf380f784fcfe40faf7ede7e9366aa7466a404f775a88d927f872849aa5689c8526a88a2cec208a9da88ac96cf5af550efaa242fc0c7f1cbdd31
-
Filesize
19KB
MD55780e3562b3e17497c1780ca0d55016d
SHA15162ebb3cba413ef969152f23abaafe5f999fb6f
SHA25696314df87db0a28aa7764a04a16523b1555eb51d1c41a0dfc5b0b1bf7be7ecd8
SHA51260e2c63d627f73eb6d32d7bc28fd87cf6444db0358ecfb55ec29bdee8495212db5dde2285d71f1e471142a65985bcbc8b0912f6a823c2f0051b473cbe82c816c
-
Filesize
1KB
MD5ea679f6422e28ec487dfc3245a3a8497
SHA1c569ffb4476d1be8366111e49957646786ae2e4d
SHA2560a9541404f8ba0cfaf9aba4d5a550e73d9310cfc7dc39d010c324589e4d82d9d
SHA5121473d185e20860ac6427b8895701eadddfd89d59bed52e53c1eb4dd405ac14e53404848f05bfa49d654198f2a65bd22fac06393f03dae02023bb1ac1a20b7c23
-
Filesize
1KB
MD50532ffe54904f25817f386dafc950278
SHA1487ccf4949f78cf390b612c7359468ba6c4f15fe
SHA256bb239232c0532cdeda9bd3e4ea46d9e6ee7d2b19d51f22f19c90012112d70a39
SHA512a75e52368845555c23bf5f5ca3153664ced6656417fbca241f7c50c6fb49981c6fe7c6d145e21cb38fc6c10c72cb998a758189ecdbdcd06730fa9994f3f0972e
-
Filesize
1.9MB
MD5b3f2dd3e80bb69607cb632e8d91c68f9
SHA114ca3b89c6eacccf014045a26e62750c3d20689c
SHA256471ad12514f66c86a1560bc3b233b9f286c46e3fb4fc7d3debda864a74fdd8f7
SHA5126a124eae24b603c43d9f9eb4c63b9eda3fb21189a69f32ab06e40de975ff1c14a749e1cd235edab973647aa4b09808b70bd7c2a1d1d80328a1531ae8b815ec04
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
4.1MB
MD5c59b5442a81703579cded755bddcc63e
SHA1c3e36a8ed0952db30676d5cf77b3671238c19272
SHA256cac7fc4ae9c97eba7455992b2d41449ee257ec485c562bfc7245a90033b1d774
SHA512c9c834860982652e7ec1db085e534f6b1c35298ce75b29c2cbb0ac04ff40cd64363b458bcbd8c0983cf1ed778a4269372c6bc4ce7f831a6e1e70ee5f4a0772f9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
297KB
MD54d6e9c7274a25f8a3c4bd17f6ec08a8c
SHA1d10eeb950d8db466e57c557918f9f9d50ee3f4cc
SHA256aa1e3f7b1f83b009b871b23fd6c38f5f565a1c4eaaba46183927b1117db916c0
SHA51251975c4122958b0181e0e4d13c340df3bc4de645346855574b4bae73f9d5a1862331d9dbd10b1e9b5bb5f8505b43180a7c08a9c31b9497fe5d1ba6512280ca11
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
4.2MB
MD53ea1c7a37900d463735a6213e966a696
SHA1f6c9b35fbddc4ca152463f0f659de628fe431d60
SHA2569eb4f9df9e7489857a1720954cbedb0fc62c8d56ade99cc5cb0db885e99e2fcf
SHA512492dacd0e0c8738c22d1d22de9b2c2fcd6d5723decd38fe09ef3565daa01831e0ab54a5b5e054bdc2dc8018bc515c125840c67c9a89d89d59090220562bb1f2d
-
Filesize
3.7MB
MD549a9cc4cfc79207e04c4d62be083104b
SHA147b7380dc57819e1cf8c8ae0eec2e000749e56e5
SHA256e8ba5b5c6c98415729c894429d76eb9833484818c7fdcfba0376a2ac1c280a88
SHA51202507d19e91fc1fd4edba84d88e6bc04608bc444cb1804fd0833a0e554c4274a9c81d0f57f9ec2bd3af1e74791f248284a970e663b5ab13add30a1bb50850ded
-
Filesize
442KB
MD5cc080b9c420dee1ffd36c49d6ba319c7
SHA1ab482891179187bb831ad9336662707168bc20d0
SHA256ae42d43f2b7224c82969757e554f83596d97095e920e569862e25a0bf7804435
SHA5128739b9c222d386b2fad1d1473b72dbe08949105c085555d50c2de4089f0a44b9e9c90c40a8ef87e2cbaa4e468d356858fba06054644e69473ba416084081916b
-
Filesize
3KB
MD5ac094cf49cc8e4aa296d42252f8ddb47
SHA199f3502498e07fae94a11decc04b8d143f1bb082
SHA2561cbe212f26875805db667dc3ea662e3739b7919da01b03136d39f62cf9dc0fe1
SHA512957ccc3d28dd9ba13af8abfb931dce654fa4b604596d2cb260bb661cd2471c951f415ad2d71983d0eeb466bf9098c8c6dbd38179f054ee6ae041c892a454ebda
-
Filesize
2.0MB
MD5d80202038d61df9e26cc41d6688d2f69
SHA137eacae605a5fddd9a200f89d65c0d17a4a81a77
SHA256d48bdfafa1e28e859c0954025ca6ba7dcaea3001f95ed149f9e941a7a7753d4a
SHA512631dcede3a218028a4398abb1a89961d8b41827cb7fc25d6431a2b6cb42e2823f1d2d34cf059068e33ab4652005c55ea2966e16bb00d2cf8967842b18e010dd7
-
Filesize
1.8MB
MD588f17372966f7193dbbdbe313911e409
SHA19adc12a65d8840f2fdf84af643f4444617caafce
SHA25617591f34a3d67bd1d6858ef036b8b9e272650050ca3154f7680769097a3e33ef
SHA512c74087829a10eec5a76318cb66f3e306e623296874fa754810c6338c6307c022d3adaffdc2fd8a47b1ea8014c3eed90337f91c6ffdcd06e63ca88cc23603cd61
-
Filesize
4.0MB
MD50049661810e6b2c3d28d53a82735bffc
SHA13d60c9bb898a0a0f25483944ab3480d70d14b28d
SHA256857bd5eb63c7ca9d452be488a9352b4a7454d3fa3f5597886f7674434cd8cc5a
SHA512c0d6d013148860f0849ab931b92d1bf61754d69b5591cc21c7f50913daceba9fb0f5a1a9313626a17c277f386a4ae3809186da25feb62dc58af12882d4537f3b
-
Filesize
3.1MB
MD51455f682b81ed91fadbf94dae75a8444
SHA1fde4f15880f613d83fe6edcad05c8ce6d14b0201
SHA256e6cb6698c0f4d79fc06551d8e30f46ba8c45b445b7145d03a934872b66738314
SHA5125db42106589f65983f7f2ddbccf2cf6ae2e21a0c10e5b624a426dfb1496984ddb9332225d90eb19f0d505777f425dd2b7085b7547c9a0d0a0bd6282f7ff5b257
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
3.4MB
MD5681bc85b7458ed7ddcc0c357f415df19
SHA1aa9b49f53c831a6481dbcf5c6c82198e40285636
SHA2566ca31002920cf4db47a46ccebdd1c8f21014bcb68c3518310c4de8b53103ddc3
SHA512f5667b3c6984b52408131b070b8bdc844860e83e8705d3d5afaf730a813e7435fec315474ba71e51b980e6726ef84a9d712d10464864f4c4dd542cb053831e89
-
Filesize
4.2MB
MD5dd32e7295d82d43a3ca3b2f76675b75c
SHA156df103da6522971a9dfcb4fc385730ba1c88bd4
SHA2563f41f2a99d908433bc2b502914e782b8d2fea63bfc41e4c4f950bead7ca9ea7f
SHA5126a7148fc06b3c3eb25fb541027c2799c10508e96cddd6c2d18bf0e51c53749e9f9ef018b8bf0596b81ccb6b60e32587b4af8961f77b7f8bf91c9204078d65884
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD504c2fbf8e6ea52cbe19419d69ac28922
SHA16e16fa0778bcf9fe1a106146c214c52839a9907e
SHA256159762171181ad66e77a432f98eb1044b337911c67b5c4c84f30bc0d71bd8764
SHA512b5ae5912dfaaa1efa8f0776e20f3ecc613540016959aced478eba6936f87b2a8b3be5dfadf6e1bdf5f337ca8d599dd6f47673596b98df7f5acc8e74d8cfa1ca2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56ae1c6cf32ae4e55a7875493ac199263
SHA14d3bcd5d4f8ddbc2b40d61e5ecf811b36702e44f
SHA256addd565da0b751b4df3b29f77ccdc07e44ce9598346a88d08a959ca56444705e
SHA5120ab59d5be604788bdd36cbab8e795aa3554d4617f3bf73d7c1b90a8586bcd29da6359b6fe0be7c0604889524b140185c28203abd6a69c447d04fe1ff684b28e7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD563e4d08f4c725db27331cf6238ce73ea
SHA190bb14f6606fef981c80a2f230cec7827901e09a
SHA256f04ff994eae5a09931edd8f79a773f38bf6b4623a9774be9a6bc56f507e8ef8b
SHA512b12291220a9bc363026d3048ae808d8856d90e58f2e0aa2b9845ff563b38584a94648257c370f764301e68a91a03cef54cb78f261099c63eb96053c303e6a418
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD532f48e6400a26943885ad6e6eddc482e
SHA1e9d9168f0b3470b2cdf784398514660fe7fbe441
SHA25628165fc2e6937f76e8efc8e4feb2e7987d900da8a8431ee2d784b66562228e01
SHA512d73d242ec327520698f3305eb5a0f806a48f99e84ab78fea8d6214ee6f502cea01c2a2ee429dac9c891bc6f82f5686053d7e31a7f472c3a340ea7166952ecf2b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a9718b0038fec6ad937caf046149a512
SHA1516e3a7707e903dcdd312f284912278cd43f71d4
SHA2566b4062777e637f88377f5ff48161862c39b0b462c85badf9546f0628cc12cb0c
SHA5124edfa9cb65da0cfb67b4062c0e99dd476ae88f3f5f6937cbaaa35fbd4f285f9c9319762a6db2496ceb5273494c8aaf0f3c8ad0a525a9e41e84a66ffd43f89f53
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD574ae6abb3742f27cc041b52e61597b21
SHA106b8aa5ec9f3e074c050cf9e880a903d27dad230
SHA256bd1f0f9aa46a569f3b3de01c87e3eada3adb7baa10dc491513c94de1db232998
SHA512aecc8f40ff7eae7f9b8bd15655ad156dceb5baba8bd7d43955ab0d7af3d99ed8b47ef5c95869325fa1033b0b13330878702da3f69f2d2aaa0651cf31e4f0ac09
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD564a964d3f96ecfc91fbf1a25815df19b
SHA1eae2197ef2bc6d18aa8675ec0ceee8e61ac54e3a
SHA2560f483ea16e1eec1409ae9523f182151a02c15d5f417d54bb06e2e3c7412f8ceb
SHA5123140b8d3eb60ec6fdb0ec483362ecabb5f2efce3aa231655f98d465404d941dca4cd5f0541b8623742dd864aceaa5775a78b000d83f5664f6f29ed0eebb6a85e
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec