Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 01:23
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp.exe
-
Size
413KB
-
MD5
d467222c3bd563cb72fa49302f80b079
-
SHA1
9335e2a36abb8309d8a2075faf78d66b968b2a91
-
SHA256
fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
-
SHA512
484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
SSDEEP
6144:0UorLrzMYSnDyTtDOYtf3J7+YZIPcrPJruPWeX2/e1Cw+GOpumhauZef6P5rwmx:0vcYZD17DMPWev1Cb3umhauZef6a
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Glupteba payload 23 IoCs
resource yara_rule behavioral2/memory/212-59-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/212-62-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral2/memory/2436-75-0x0000000002DB0000-0x000000000369B000-memory.dmp family_glupteba behavioral2/memory/2436-77-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3796-91-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/212-178-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2436-205-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3796-207-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/212-277-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2436-299-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3796-308-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3796-328-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/212-439-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2436-450-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5820-489-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5952-499-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2136-583-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2136-724-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5820-729-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5952-737-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2692-799-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2692-815-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2692-826-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ wD2RUxX6MD7QXPGNkZWrYw7j.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 126 528 rundll32.exe 126 528 rundll32.exe 135 5308 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 5444 netsh.exe 5632 netsh.exe 5756 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wD2RUxX6MD7QXPGNkZWrYw7j.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion wD2RUxX6MD7QXPGNkZWrYw7j.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation chrosha.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7lyC3OajMqETouuHkHZA5bGe.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BdksdpkVunlXsai0Sv5sUFLQ.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sG9pzDs5o8VGOq73x1sXrBI9.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vfwSobkAFS9GkkGafQSXXTBJ.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5TvqmDuJrB6j0l3yPFYAAtFV.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kd9jj97rLkMagDeJZjzQElRH.bat CasPol.exe -
Executes dropped EXE 21 IoCs
pid Process 852 chrosha.exe 1352 un300un.exe 212 wZ19rY9w78Hl2smNcBrDqNNL.exe 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe 3796 Xc90dhXVQswAqCCztpQHibxA.exe 1460 wD2RUxX6MD7QXPGNkZWrYw7j.exe 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 3512 xfG82x0lroBU9PDhZ1q2beQA.exe 4420 xfG82x0lroBU9PDhZ1q2beQA.exe 5000 xfG82x0lroBU9PDhZ1q2beQA.exe 4476 xfG82x0lroBU9PDhZ1q2beQA.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe 5652 Assistant_108.0.5067.20_Setup.exe_sfx.exe 4248 assistant_installer.exe 4896 assistant_installer.exe 2692 csrss.exe 5924 injector.exe 1732 windefender.exe 3204 windefender.exe -
Loads dropped DLL 12 IoCs
pid Process 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 3512 xfG82x0lroBU9PDhZ1q2beQA.exe 4176 rundll32.exe 528 rundll32.exe 4420 xfG82x0lroBU9PDhZ1q2beQA.exe 5000 xfG82x0lroBU9PDhZ1q2beQA.exe 4476 xfG82x0lroBU9PDhZ1q2beQA.exe 5308 rundll32.exe 4248 assistant_installer.exe 4248 assistant_installer.exe 4896 assistant_installer.exe 4896 assistant_installer.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0007000000023266-85.dat themida behavioral2/files/0x0007000000023266-92.dat themida behavioral2/memory/1460-95-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-102-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-103-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-104-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-105-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-112-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-113-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-98-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida behavioral2/memory/1460-211-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp themida -
resource yara_rule behavioral2/files/0x0007000000023270-134.dat upx behavioral2/files/0x0007000000023270-141.dat upx behavioral2/files/0x0007000000023270-158.dat upx behavioral2/memory/2796-157-0x0000000000B50000-0x0000000001088000-memory.dmp upx behavioral2/memory/3512-167-0x0000000000B50000-0x0000000001088000-memory.dmp upx behavioral2/files/0x0007000000023270-170.dat upx behavioral2/files/0x000700000002327a-173.dat upx behavioral2/memory/4420-179-0x0000000000DA0000-0x00000000012D8000-memory.dmp upx behavioral2/files/0x0007000000023270-182.dat upx behavioral2/memory/5000-189-0x0000000000B50000-0x0000000001088000-memory.dmp upx behavioral2/files/0x0007000000023270-190.dat upx behavioral2/memory/4476-206-0x0000000000B50000-0x0000000001088000-memory.dmp upx behavioral2/files/0x00080000000232b2-809.dat upx behavioral2/memory/1732-814-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3204-825-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" wZ19rY9w78Hl2smNcBrDqNNL.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" Xc90dhXVQswAqCCztpQHibxA.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" B3dRtpPBGDRaCVG6aN8a3pJz.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wD2RUxX6MD7QXPGNkZWrYw7j.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: xfG82x0lroBU9PDhZ1q2beQA.exe File opened (read-only) \??\F: xfG82x0lroBU9PDhZ1q2beQA.exe File opened (read-only) \??\D: xfG82x0lroBU9PDhZ1q2beQA.exe File opened (read-only) \??\F: xfG82x0lroBU9PDhZ1q2beQA.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 59 pastebin.com 61 pastebin.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 100 api.myip.com 102 api.myip.com 103 ipinfo.io 104 ipinfo.io -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI wD2RUxX6MD7QXPGNkZWrYw7j.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy wD2RUxX6MD7QXPGNkZWrYw7j.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol wD2RUxX6MD7QXPGNkZWrYw7j.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini wD2RUxX6MD7QXPGNkZWrYw7j.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1460 wD2RUxX6MD7QXPGNkZWrYw7j.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1352 set thread context of 4868 1352 un300un.exe 106 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN wZ19rY9w78Hl2smNcBrDqNNL.exe File opened (read-only) \??\VBoxMiniRdrDN Xc90dhXVQswAqCCztpQHibxA.exe File opened (read-only) \??\VBoxMiniRdrDN B3dRtpPBGDRaCVG6aN8a3pJz.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe B3dRtpPBGDRaCVG6aN8a3pJz.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss wZ19rY9w78Hl2smNcBrDqNNL.exe File created C:\Windows\rss\csrss.exe Xc90dhXVQswAqCCztpQHibxA.exe File opened for modification C:\Windows\rss Xc90dhXVQswAqCCztpQHibxA.exe File opened for modification C:\Windows\rss B3dRtpPBGDRaCVG6aN8a3pJz.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\chrosha.job tmp.exe File created C:\Windows\rss\csrss.exe wZ19rY9w78Hl2smNcBrDqNNL.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2412 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4084 schtasks.exe 2580 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" wZ19rY9w78Hl2smNcBrDqNNL.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" wZ19rY9w78Hl2smNcBrDqNNL.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 xfG82x0lroBU9PDhZ1q2beQA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 xfG82x0lroBU9PDhZ1q2beQA.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 xfG82x0lroBU9PDhZ1q2beQA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 powershell.exe 1704 powershell.exe 1704 powershell.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 2920 powershell.exe 2920 powershell.exe 4964 powershell.exe 4964 powershell.exe 2920 powershell.exe 4964 powershell.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 5396 powershell.exe 5396 powershell.exe 5396 powershell.exe 212 wZ19rY9w78Hl2smNcBrDqNNL.exe 212 wZ19rY9w78Hl2smNcBrDqNNL.exe 3796 Xc90dhXVQswAqCCztpQHibxA.exe 3796 Xc90dhXVQswAqCCztpQHibxA.exe 5944 powershell.exe 5944 powershell.exe 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe 5944 powershell.exe 116 powershell.exe 116 powershell.exe 116 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5952 Xc90dhXVQswAqCCztpQHibxA.exe 5504 powershell.exe 5504 powershell.exe 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 4868 CasPol.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 5396 powershell.exe Token: SeDebugPrivilege 212 wZ19rY9w78Hl2smNcBrDqNNL.exe Token: SeImpersonatePrivilege 212 wZ19rY9w78Hl2smNcBrDqNNL.exe Token: SeDebugPrivilege 3796 Xc90dhXVQswAqCCztpQHibxA.exe Token: SeImpersonatePrivilege 3796 Xc90dhXVQswAqCCztpQHibxA.exe Token: SeDebugPrivilege 5944 powershell.exe Token: SeDebugPrivilege 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe Token: SeImpersonatePrivilege 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe Token: SeDebugPrivilege 116 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 5504 powershell.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 5960 powershell.exe Token: SeDebugPrivilege 336 powershell.exe Token: SeDebugPrivilege 5272 powershell.exe Token: SeDebugPrivilege 6032 powershell.exe Token: SeDebugPrivilege 5664 powershell.exe Token: SeSystemEnvironmentPrivilege 2692 csrss.exe Token: SeSecurityPrivilege 2412 sc.exe Token: SeSecurityPrivilege 2412 sc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 1352 852 chrosha.exe 105 PID 852 wrote to memory of 1352 852 chrosha.exe 105 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 1352 wrote to memory of 4868 1352 un300un.exe 106 PID 4868 wrote to memory of 212 4868 CasPol.exe 107 PID 4868 wrote to memory of 212 4868 CasPol.exe 107 PID 4868 wrote to memory of 212 4868 CasPol.exe 107 PID 4868 wrote to memory of 2436 4868 CasPol.exe 108 PID 4868 wrote to memory of 2436 4868 CasPol.exe 108 PID 4868 wrote to memory of 2436 4868 CasPol.exe 108 PID 4868 wrote to memory of 3796 4868 CasPol.exe 109 PID 4868 wrote to memory of 3796 4868 CasPol.exe 109 PID 4868 wrote to memory of 3796 4868 CasPol.exe 109 PID 212 wrote to memory of 1704 212 wZ19rY9w78Hl2smNcBrDqNNL.exe 110 PID 212 wrote to memory of 1704 212 wZ19rY9w78Hl2smNcBrDqNNL.exe 110 PID 212 wrote to memory of 1704 212 wZ19rY9w78Hl2smNcBrDqNNL.exe 110 PID 4868 wrote to memory of 1460 4868 CasPol.exe 112 PID 4868 wrote to memory of 1460 4868 CasPol.exe 112 PID 4868 wrote to memory of 2796 4868 CasPol.exe 113 PID 4868 wrote to memory of 2796 4868 CasPol.exe 113 PID 4868 wrote to memory of 2796 4868 CasPol.exe 113 PID 2436 wrote to memory of 2920 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe 114 PID 2436 wrote to memory of 2920 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe 114 PID 2436 wrote to memory of 2920 2436 B3dRtpPBGDRaCVG6aN8a3pJz.exe 114 PID 2796 wrote to memory of 3512 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 116 PID 2796 wrote to memory of 3512 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 116 PID 2796 wrote to memory of 3512 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 116 PID 852 wrote to memory of 4176 852 chrosha.exe 117 PID 852 wrote to memory of 4176 852 chrosha.exe 117 PID 852 wrote to memory of 4176 852 chrosha.exe 117 PID 4176 wrote to memory of 528 4176 rundll32.exe 120 PID 4176 wrote to memory of 528 4176 rundll32.exe 120 PID 2796 wrote to memory of 4420 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 121 PID 2796 wrote to memory of 4420 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 121 PID 2796 wrote to memory of 4420 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 121 PID 528 wrote to memory of 4512 528 rundll32.exe 122 PID 528 wrote to memory of 4512 528 rundll32.exe 122 PID 2796 wrote to memory of 5000 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 124 PID 2796 wrote to memory of 5000 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 124 PID 2796 wrote to memory of 5000 2796 xfG82x0lroBU9PDhZ1q2beQA.exe 124 PID 3796 wrote to memory of 4964 3796 Xc90dhXVQswAqCCztpQHibxA.exe 125 PID 3796 wrote to memory of 4964 3796 Xc90dhXVQswAqCCztpQHibxA.exe 125 PID 3796 wrote to memory of 4964 3796 Xc90dhXVQswAqCCztpQHibxA.exe 125 PID 5000 wrote to memory of 4476 5000 xfG82x0lroBU9PDhZ1q2beQA.exe 127 PID 5000 wrote to memory of 4476 5000 xfG82x0lroBU9PDhZ1q2beQA.exe 127 PID 5000 wrote to memory of 4476 5000 xfG82x0lroBU9PDhZ1q2beQA.exe 127 PID 528 wrote to memory of 5396 528 rundll32.exe 128 PID 528 wrote to memory of 5396 528 rundll32.exe 128 PID 5820 wrote to memory of 5944 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 133 PID 5820 wrote to memory of 5944 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 133 PID 5820 wrote to memory of 5944 5820 wZ19rY9w78Hl2smNcBrDqNNL.exe 133 PID 5952 wrote to memory of 116 5952 Xc90dhXVQswAqCCztpQHibxA.exe 137 PID 5952 wrote to memory of 116 5952 Xc90dhXVQswAqCCztpQHibxA.exe 137 PID 5952 wrote to memory of 116 5952 Xc90dhXVQswAqCCztpQHibxA.exe 137 PID 852 wrote to memory of 5308 852 chrosha.exe 139 PID 852 wrote to memory of 5308 852 chrosha.exe 139 PID 852 wrote to memory of 5308 852 chrosha.exe 139 PID 2136 wrote to memory of 3696 2136 B3dRtpPBGDRaCVG6aN8a3pJz.exe 140 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops file in Windows directory
PID:3332
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe"C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe"C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe"C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5944
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:4604
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5632
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5272
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:4084
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:5436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
PID:5924
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:2580
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:1616
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe"C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe"C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:2204
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5444
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
-
C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe"C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe"C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5860
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5756
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
-
-
-
C:\Users\Admin\Pictures\wD2RUxX6MD7QXPGNkZWrYw7j.exe"C:\Users\Admin\Pictures\wD2RUxX6MD7QXPGNkZWrYw7j.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1460
-
-
C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe"C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exeC:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2c8,0x2f8,0x6f4021f8,0x6f402204,0x6f4022105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\xfG82x0lroBU9PDhZ1q2beQA.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\xfG82x0lroBU9PDhZ1q2beQA.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4420
-
-
C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe"C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2796 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240326012414" --session-guid=88cdef3a-67a5-45b1-9aa9-8efd6870aee6 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=FC040000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exeC:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2f8,0x6e3e21f8,0x6e3e2204,0x6e3e22106⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4476
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7d0040,0x7d004c,0x7d00586⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4896
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5396
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5308
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2400
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5504
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
19KB
MD59cb3d8d83f158587c6ec37dc8b4d23c1
SHA1574666f877474eee329a84403f651c1d808cc6bf
SHA256e56474f3787fc781065c9debde4543aa9e3d1c2dd23bfbb66367e879022ab881
SHA512d73f81fa03b3028f052c8dc6a7033702c08fd41873c1d7af3a79f4ce2d958a52abf48b69a80470873d5a0be2634e230ddcfd947b82e4fceddfc02c52baa05db4
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe
Filesize1.9MB
MD5b3f05009b53af6435e86cfd939717e82
SHA1770877e7c5f03e8d684984fe430bdfcc2cf41b26
SHA2563ea8d40fcede1fc03e5603246d75d13e8d44d7229d4c390c39a55534053027f7
SHA512d2dee80aaa79b19f1eb1db85079a05f621780e06bfea9e838b62d757ba29399f9090ec7c6ff553377c9b712f3ba8dd812cdff39f3e28829928e86746a8ac6b27
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\dbgcore.dll
Filesize166KB
MD58b6f64e5d3a608b434079e50a1277913
SHA103f431fabf1c99a48b449099455c1575893d9f32
SHA256926d444ffca166e006920412677c4ed2ef159cf0efc0578cb45b824f428f5eb2
SHA512c9aeac62ece564ac64a894300fb9d41d13f22951ead73421854c23c506760d984dff0af92bef2d80f3a66e782f0075832e9c24a50ae6110d27a25c14e065b41c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\dbghelp.dll
Filesize1.7MB
MD5925ea07f594d3fce3f73ede370d92ef7
SHA1f67ea921368c288a9d3728158c3f80213d89d7c2
SHA2566d02ebd4ec9a6093f21cd8ccefb9445fa0ab7b1f69ac868a5cfc5d28ed8d2de9
SHA512a809851da820d9fdd8fb860a8f549311dcc2579df2c6f6fba74f50d5d8bf94baa834b09fb5476ac248f18d1deb6b47d4fdd6d658889d5d45ca8774a9264483d2
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\opera_package
Filesize2.4MB
MD5f11d89056bf6c226c5df153ebfe29f50
SHA1709d6441291cf407dfb904a7bd4bece1d81a5281
SHA25637af59056d5275e76cf09996305d8fb3d3e6f080eff37dfa45c33485e47f02e0
SHA51232ee537f447a75299edb8205520e3d21b2ddcee62eaf86eee0ce35f38c2da477b7d245df88b1bd3c25faa14c45cd9a5c2ddf78a88b429588590710c64a37ece9
-
Filesize
74KB
MD5e3a28b57502667d307a568a8773151da
SHA144d4208e02193bbd56a4536aa33af1f57b1e815f
SHA256c1b91beb9d69ddf42f22853f3304a9b271cb431dfe3fa53f4e4ddd7ff4cba6c8
SHA512c0074ffd592d4f0349fbaf33704544b560e99765557f18653a94adecfb411edde0bd9fb91c13eea4c6ff61563e19585494277b20be7085cc2fff62073d6fb037
-
Filesize
4.1MB
MD58803d74d52bcda67e9b889bd6cc5823e
SHA1884a1fa1ae3d53bc435d34f912c0068e789a8b25
SHA256627e36dea92cbdd49fcee34c18a29884010a72b5b004c89df90c19a50303a2b3
SHA512c190ca373875789477a755f6246565bc7cb5744f1d5f62037e71d3595c1023f587f34a2437d9691ad96cde789026b7c2896110935e58cc2f1498cfea5d0d9564
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
1.5MB
MD56e955e77535a4e3bf6c5176033e8bdd2
SHA15d2626b438ca9298ef5e33d9ba696241ec8666ff
SHA2565570a7d8113978ec69073550f478f4b092023de1dfc4cbc1bf86c24a81de7b4c
SHA51262eff301d672dd604a226194849cecb567fa150f4a007eb456b7d8fbf634293cbe9a2ea73e57cae36368ce2b174b2833b35b9387ccbb4c8faf03b5575c9cebdd
-
Filesize
1.1MB
MD5a91787e30ae7e3c5febb142a55f1a32a
SHA12390e2e8aa63d5fc5c1d99b178ebdee3655bd4bf
SHA2568c16a0e43f6d7d56c22377420d6975ebc2152b964009121dfa63a7cd0253b0c8
SHA51248977d290c064a3c094248dc663aef482c252583b9b0f564ffdd2baf99ea2b23c73d52dd5ccbfb0fe48b63399036255002035bd1c02d17f05eaa77fc118eb6b1
-
Filesize
66KB
MD59ba82b798aa916d7d7a1862593358152
SHA10f14cd437badb5ab0a5f2ce8bd24d563cb1707f3
SHA25646d4f110f8d2f1e275dfa7792fe3568b2cb319d82c47ecbd57e79c793a289f57
SHA512ad1c41c3b2ec26553409aeccf39bc24dad2d20fb1bcd465860a0870025238324342564fcd74041e6a1bdbcdaafd45eb8f7b7a0d81002d8be04a34007b8eef7c9
-
Filesize
57KB
MD52be8c2587c13e3a2accee6cb2ce30ed4
SHA15b6993d8c5a95afe4009327341474aaa85bd3bfd
SHA256b2292898b84cb13f1061421b05922f52825b14b310f61a227928c965d0f1947a
SHA51284ca71961557b816f8f8386608c78ca6a0dafc7a0171b91e077a0351c6723e66fd2fa26d0942e32a0054c8af1be5fbe60c36292120967aa824dc79be9818c772
-
Filesize
1.2MB
MD545ed2f58df091d03257f2a2ea5cd41af
SHA133d7fa5f3744321885ac3f1fc3f28a7d40191daf
SHA256996fb9d1f26971d869c7f5030db73f823bac4f90e82762ad699d6d07a23b52be
SHA512bf55f0105c5f1bc20c0defe2d508fbb5ba54175371918806e493369e6de15e24cff65d7e417d5ba6d14453b9c98f93abd339f285c662ea186f98716046d866dc
-
Filesize
1.2MB
MD5d287b8e14e6bcc480f40aa9309076624
SHA10ddb9e08d1e350aecc351d26d08ef83a086f5495
SHA2564f4c0fb0603dfe7a317b76a76e0990a57cb5c2c28d1c0b01e2cd4b42dedf1da3
SHA5129514591844bf349abe280fd1daeaaba4c7b462ce80953c812b741d70524dd819b173257975eaac8e0c236cfe537205d33417160ef4a265a3b3edbe44e08aa4fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
40B
MD5fd61f1cc37a8c1188797c1a0dc07871d
SHA120451aa4d4f99839fc0ce0d0d0c4f1d9eaeaa3e7
SHA25659d09ce96328fcbd559e14950f949b09eb5c984b1468441c011804519ebdf1aa
SHA51266c9bd4f9efd93314a53430ec30dfe7e0c8f5897370d204ab8e51344bf3b8068221aa8e12abf701b717921a034416bd2e1d476306a5b87051d4c39b28680b2d0
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
897KB
MD543b0e96d6262cb2861081089827f0e58
SHA189b6d623ebce3d77716d05de1ad5942ab601cf2b
SHA2568b01bc8ef1470afc516cac4995493cf162ff7cedca481d1f7dd062d3cf48bc9e
SHA512d06f5ffd562a0120030c5b5c1df35e6251ff1917aba9593085279cb39d2bc00501ad2556f9b83b4582c8f3468b760eb73c36e6db7b12fae90a2da13e9f50d13a
-
Filesize
802KB
MD511172acb048c708ea510632fcb166e61
SHA14a052bd64b670e06cbf1973cf63e8c684ec1bf63
SHA2562a7ee3c068ce56e96d47f10abde0cc85aafdb5e43d7f64ed54988f8a4c3fd625
SHA512f9bc8f0053f8b3f0fc0a408a4124f867bb86bea7b5706ada8896ed660585a60f64d3dda626fba3622e378844bf6ffddb36448b07c66b21e94653fc3aa8e53950
-
Filesize
839KB
MD576ec1e9a6676a09c256301695d106944
SHA1d56ff3400faae1e9af1316df97daf4229a3b69a4
SHA256967fdf6c1da118b0834d6f792ecd1d54d763dd5664cff1da419cc57cd3b69de4
SHA512be3e7b0509f0b964c0743407baaf67de967871f142feb8ecc394d01691768ed137dd042efc3ea3bf4df2ea077ef20eb7fea950a7ecdd4797949f870493a6474e
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2.2MB
MD5926d90bb95158ef51853408f27b2d74f
SHA110cd9c4923f55cd35d3094f0f5bca9e99866a0ca
SHA256b95edc7a86d08044bd24001e7a27d7229df83dd7cde683756c4fa7de2e0475e4
SHA512e8f7eb0363752b161f8b447297068f4785309b190f8f730b6aa46e0af132686d3af0da8332aaf6be20e4e32d28e8d0133c673529493ed4eb39cf8e98e1fd5657
-
Filesize
3.9MB
MD5d8bd41d32d617bdb1569119d57380de2
SHA170e3eaf334fbc721d091b0c42b291fac46d2b485
SHA2567afa8c82bcc6dd08b00431e4c0de694c4f3ce91cfffe3742ab1a6539580eba75
SHA5124533d6a6e246c562a49e8a383bfe02c9d4577e9e0e88ee83559f690e945ec03fbfc4a1417ff165e4e0518dedc24b7df7174d7cd3a22641cb10a9631eb50472ee
-
Filesize
1.2MB
MD57c358ffa5eec3685abb86214b3eaefbc
SHA1b7871f8e62b0fa7e026f9bf0e7fc27826ea44d35
SHA2562da66febbd915a1bf7c0763d199d51dd6f9c030c1983a641ac6b4465a7b3b45a
SHA512eb81cbf37158a790eee44c8c9c8624a78698669304bdd08e810c987d92eafc4b17a2ad7dbc43d1db50884dbb09b91680a6c1e1a9c5bd23c0504ba083e66baeb9
-
Filesize
1.4MB
MD5cc1c0012f4505f8781e8c563502acdee
SHA15cb9df29f2d26e66793b19e4e5608cf07977ed37
SHA25677daa0e352924d90564e543bb8b780b46c8aad9f2763b1049d7923aab45017b1
SHA512c724a2c3fb0ffc05888845dfa6e83ce1f029d412ef161b0730ff543e08b74a9ebcb1388bccae850fe9841412a70e3bfa3c5fb39b6680e3282aa6c786ceb90d7a
-
Filesize
2.3MB
MD51dacd9a836b4ecd35c129c778379951a
SHA164d4f7567e9aafad32f191a5a21d44b0380765f3
SHA256e9ddcb65c65f186dabdd4ff6f6cc515114c1c30bc82d53c36f176b9e00287114
SHA5125769dc2053c0b6e9618fc6636175621efea35bf6ed1f960476c1a4a242913af1cd2271c04cf0d93e836961011585f861ececa11d1aaf216645b93c4fea3a073a
-
Filesize
2.5MB
MD50c265c49e4b2d57c1a6a29b5977966ac
SHA16d4d2df1c22e7af90a43d04cb4a260888786ae45
SHA2561aac98dc5ddbc418d2e417154c9223fbb3f092f37c0dd9cfc6d59613109cf54c
SHA512e926dd1dd2447291721247ca49dde6d586d34c689c16a4ec14f516501528fb39b5f8617f68f2014a358fd6b3574b10cd9b9b8d2039425d4bc2bef68fb2398e3c
-
Filesize
128KB
MD50528c3ba471402467e6177c5d85aaa11
SHA151cec45a3cb42e604ab2b2c60b2c77a5fc58da5d
SHA256f3b46c66fdd167657d351d66ed886f9146dd3c86e3adb349b8495375fa7e5650
SHA512f8503b88d1dbf59945ac47f0bf01f1c00ae3d25bcbedffd59beff84c850bc83b3068b5ca840a4990576903eed648c149f7efc4e21b00cba3bbcf53f0acb09fa6
-
Filesize
1.2MB
MD5e0b90cd0103e77c92b5c8c05c7184afb
SHA1c07181a3d6cc0b6fab2b4b782a1a9d77beb741db
SHA2560647347144ccfdc0cd34bffbb68b1815909fb67c1c1a60dd26232fa77680adc2
SHA512847ae726cc6be8315900f9a199dc3618d53ca811adff7bfda2a52bcbae50752c4cb0604f68580dc20fbc793588da57596a8723bb8bf71abbf8e1600fd7d8486e
-
Filesize
3.2MB
MD5e0eaa0a913312ae838f2e2d4e0b5371a
SHA1a9e73483b559aebe1a3e31cd15350a0b2ff1c04e
SHA256cc9485c2fa785a7238667318f64d57fc96bb9a839c2aa625bdbdeb1c21f45b18
SHA5120f0b089929f437e2ad9793ac9121a74524ffc2a21c337b976f3f3093c2fb62ffeb6a08b052c809eee9396a7e5ad61d4f56978c8c741ea6b7db49e6e3d27a0586
-
Filesize
4.2MB
MD516ba0152d22360d4e1c2b782cde6dc52
SHA126a0cbce35fbd6ed02ff8d59e59656ecfd799da1
SHA25628048e60571fa0ae2c5703a500f9b83d7427c376a6d44b13bf2d13df26c6a9e5
SHA5127b3fb5c0065ae788a86f5ae439f6ad1f6bbb38b1f9039077f73fed84d57282bf331118a88eed5750c44a781a7ff231d2297e333d22b8e03353987513d0bb56e5
-
Filesize
64KB
MD54315dab50894bc4a5990730491538d7a
SHA1d7fe8c11ed988b4e9ac23c52bffd0388de2ecc9a
SHA256a2225a0dde6ce4a16a0d5f2a653d4b14de7a4930e09b25d48ca41720160b1b95
SHA512a7c83562bd313647c34298a56abaa69c62101f02fce61565c8bd1a372a657dd5715a7606c6873754816cf705e83a0fcfacccacc45e2a0fc92a54e0c28d80b910
-
Filesize
1.5MB
MD503209b90c8c2a1a973f999b9c1f756f1
SHA130f1013b64c6a8abad3bca6ad0db669e9fd1278a
SHA2566ea023b49e8fdc4e933276ddce0449402f0d9ddf65137fc4999d1866a59a9535
SHA5124c4b0940af3f959942de0eac0d8c471e74eabd918bf0531e59b91110f07542aecd787f8b50c2a7b61efd9e6daa92b798db5c5e9ed854c4adabf14a0740debb85
-
Filesize
1.1MB
MD59f92f846e2a01da2e179e7458fc4907c
SHA14f25ee772a6e55ccb29851bf6136f468c8717e07
SHA256aeabbddbfc23c375f65b6eca081aa261ec2861a6fffb489dbbf0301e4345af27
SHA51268e6079d01c6af1ed91ac1a6cbc244e0efc4835217e4d3b2c117b04af797195c351077435816aa97f7598d9517fc05ae6f5de37967f8d4564da5db3846a33fd6
-
Filesize
128KB
MD5716b935f22d55139a4e614e96029e2b3
SHA1e30efd601ad701e8e87228e9a19d6b92548516fb
SHA256c931aaef7e4f4f1393b1d28698a5cb0a69aff90a831b97a510b3c3fe5ce53c19
SHA51252f47ff533465c1eadd31421313b53c713793ec0224e31a9255f3fb2499487ee278203a857e3a3d55771813571a5b84bf7bab0cbd26cb22fc8b6b6b372b8804f
-
Filesize
1.3MB
MD5623b1aa60cad12ba9efab06b5c7fd6dc
SHA1db73901700a47e92307bc4c31e43fb5a817826e1
SHA256cdbf8c382a4014d90d977909610e16ae5c4ae3c54bc8e9e07b6239e2ef051bd4
SHA512c36c02eb3ef2745d072b939d9301386d01f71931ed6fa6be55b68e9eeb3fdef2b969730027e7a62989e2ed167725e3fcd70d4e6238be5e3cf3121e425dbe57e0
-
Filesize
1.2MB
MD5121d7cecd0ddb3619186452add75002a
SHA15d6718d3d727ccbb62c38dca85b88e11fbb0d9d9
SHA2562fdbfaac7401f18e33a2f32ad51d3329cde852280ec14e01f0551892e3086da4
SHA5123547bce6f4ea18b21096351d48c3712dcc1ae8c0620a45877a8bffa6d1ac617568f33cb181361f9239a57b9aa1f85c49eb10b4d3253a6453f7c0dc2421e67f5b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5283bdf7cac5f25578b9443aaf224b6ea
SHA1c2240b8c3e2cf96d22cb748ef297ac0cc312320a
SHA256efb7d303a91539478ea4ff387901e9cca4e11778cbcb71940ade707df3fcddaf
SHA512d3bd9b32d1a93d7d7574c3e3069101a57f9a06952ceac526963ccbcee4b7684f1868ab2e8f9004e992530c21c2d1c1fdad955d94c061739804484f8f88fe4e7f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD537b74ca7e962300ead3fc2b903fa1d88
SHA1b2f43c7b5189ea8663034966ff8b7bc0b742ff3c
SHA256e54320a1702723aafc3e82c26a0dbb74a2d3c7cedd6aa11104d3078f06d7d195
SHA51227a0820d5d3f446eea31bd22db7c1b424bce5ad21458abcc7645d3bffd969b00d8e997a50600ad83c4749c83bd2803b799799232a94204fb2f4c7a3642d22b5c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bc4c83c22457c3e226a694e82f64e4b0
SHA19f341f816d43344a41c3609095738bcb4eaf42f7
SHA25663b94f72bf271d2ed4aabf94259248e983a2937d484eb35019af2840f40b63f9
SHA5122cc7e4e03f7769a63d057b9745debcefdb41a5f8aa5536d8f271cc24b5c69bfe47ad896f3b617624dcfd0776bfe2f66daf430622280e9e6491df6e857fdf437c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ece8c2175c54de91c0d96c5eb6dddcc6
SHA12bceea0c653bc9d294cb62e7b15101dc57e484a1
SHA2564c54384b6bbbe32f6b2c85a789e8e67c9bb39e6db7d5f5d0858c15525797c904
SHA512e4b4024994a06451a44277e0872905658fdc782e9dd35b0c04682f01f0cb7ddc415d761758b7a06c9cc2a2de836e17d137492e9c0126a01c5ec232bbafef09bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bcb383afe61732570736d82fef2e2be0
SHA1bf6e9badc842e263c33c22587727b283c747524b
SHA25684e8e9f6af577506ab96cd3be406ccaba7f0857e48fff2e5988c9ba9a8249826
SHA512429cad3baa3c8090c54022aeaef64a919cb1d197ac1050fb47b004557df39fd18caf9302727cae31546d132ad4ee9f79344a65c6542db0cfaae996a46a54f080
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD596c08f587adc2ec58906de71c89f1721
SHA11bd92a07875845d080ec14ba91abdc3e3a7b2f0e
SHA256cac3f28031a67271116a5d24523b6517317f14b734ae19b237e16bd6eecf0688
SHA512ebbebda42a5181d5fe52ebee594204f42166c0f70990b231d17aaa672db3eea9be5c30c855b8b6dcbdf1a4333e621376da212bb5ae86d5d9badbcdc3ce3b1583
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5068a53c97e6620617c44dd14f53e291e
SHA1c8847343ab58bea10d388b86a629145eaed539e5
SHA25648aa7efb397f46434e1237004eda6b9d018e3ce8646f799348a5ea7f67aded3b
SHA512956f79d7ddb3e36b9f32313ef7e1909ed65e398397dcc94c4ccbf5106b7d3b2e38e391601130a6ed1e6b730418160defed4e39d2b2255f0b2099aa11b1c2006f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e0b988b56749e9eee44ed06c0a1694b0
SHA13bbcd84ad03b2cd906c6178c0110dfb68d4cd7cd
SHA256afbc7f0038325b04dd4aa23ea43df798946a574eac8ab683a54634f25ab2f922
SHA5122ff786324dc7c6d95c4011de0261d5039359e90c6c2efe6670e3a8bd00b13220c303bf3ad1c7d88dafd7ef6fe925874b974ef8a648b783e4f0f88ae1349dfa86
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
3.8MB
MD50cf8e0dcdf294995341fbc24098eb987
SHA1461150a3621600151ecbb4e412b4d31908474acd
SHA25679bf9fd8f576b8ed0da795cce0f92864c02d21e8ab79f59d93894b0ee9e7dc4b
SHA5124955301ca1d477dcc4593dfbbf4a65bbe4f8292b3b0ff1ba60be81afd5b71f5244aa494939ce11fbcdb3de2847eec210747e868d6698d8f35d39837427f6317f
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec