Analysis
-
max time kernel
99s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 16:05
Static task
static1
General
-
Target
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe
-
Size
1.8MB
-
MD5
6dca2e803f570d076689d40d1de040c1
-
SHA1
0db4712005184022c7b9b61a9d58caffaf7b784b
-
SHA256
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0
-
SHA512
24669394b81cb57f40c28dfe72aef2983725341bba0433ad5a721bb7379ea1b3d361d4ba3ac05be96bce098d90efd56145df07d50bf6d9bf2add2274f0fa7cfb
-
SSDEEP
49152:LhNBaJExGIvaPQGFL2wHLs79l1TEGP11yC5+aWemYdLMMLhMM:LhfGExhaPQeeX1YGIVTY/LhJ
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
redline
@CLOUDYTTEAM
185.172.128.33:8970
Extracted
stealc
http://52.143.157.84
-
url_path
/c73eed764cc59dcb.php
Extracted
lumma
https://affordcharmcropwo.shop/api
https://cleartotalfisherwo.shop/api
https://worryfillvolcawoi.shop/api
https://enthusiasimtitleow.shop/api
https://dismissalcylinderhostw.shop/api
https://diskretainvigorousiw.shop/api
https://communicationgenerwo.shop/api
https://pillowbrocccolipe.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3660-125-0x0000000000400000-0x0000000000592000-memory.dmp family_zgrat_v1 behavioral1/memory/4988-126-0x0000000000280000-0x0000000000538000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe family_zgrat_v1 behavioral1/memory/3400-158-0x0000000000440000-0x0000000000500000-memory.dmp family_zgrat_v1 -
Glupteba payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/3620-541-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3620-578-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/4992-672-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/1520-679-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3032-718-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/5332-719-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/6096-778-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3032-812-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/5332-933-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/6096-1028-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/5332-1060-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3032-1067-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe family_redline behavioral1/memory/3576-151-0x0000000000C70000-0x0000000000CC2000-memory.dmp family_redline behavioral1/memory/3400-158-0x0000000000440000-0x0000000000500000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe family_redline -
Processes:
file300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Processes:
file300un.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe = "0" file300un.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exechrosha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 114 800 rundll32.exe 115 4444 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 5348 netsh.exe 5896 netsh.exe 6012 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exechrosha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
chrosha.exeRegAsm.exeNewB.exeISetup8.exefile300un.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation chrosha.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation NewB.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation ISetup8.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation file300un.exe -
Executes dropped EXE 17 IoCs
Processes:
chrosha.exeswiiiii.exealexxxxxxxx.exekeks.exetrf.exegold.exeNewB.exeISetup8.exejok.exetoolspub1.exeu3fk.0.exeswiiii.exe4767d2e713f2021e8fe856e3ea638b58.exefile300un.exeNewB.exeMjC3Ls3cFBX5dT6FLyA0D5HH.exeKOJjgsKnBGcarEFpfajKambQ.exepid process 3736 chrosha.exe 1620 swiiiii.exe 4988 alexxxxxxxx.exe 3576 keks.exe 3400 trf.exe 4816 gold.exe 1016 NewB.exe 4448 ISetup8.exe 5016 jok.exe 4552 toolspub1.exe 4300 u3fk.0.exe 3032 swiiii.exe 3620 4767d2e713f2021e8fe856e3ea638b58.exe 4072 file300un.exe 2780 NewB.exe 1520 MjC3Ls3cFBX5dT6FLyA0D5HH.exe 4992 KOJjgsKnBGcarEFpfajKambQ.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exechrosha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine chrosha.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4332 rundll32.exe 800 rundll32.exe 4444 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
file300un.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe = "0" file300un.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
file300un.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exechrosha.exepid process 740 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe 3736 chrosha.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
swiiiii.exealexxxxxxxx.exegold.exeswiiii.exefile300un.exedescription pid process target process PID 1620 set thread context of 2536 1620 swiiiii.exe RegAsm.exe PID 4988 set thread context of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4816 set thread context of 3548 4816 gold.exe RegAsm.exe PID 3032 set thread context of 4552 3032 swiiii.exe RegAsm.exe PID 4072 set thread context of 3816 4072 file300un.exe AddInProcess32.exe -
Drops file in Windows directory 1 IoCs
Processes:
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exedescription ioc process File created C:\Windows\Tasks\chrosha.job 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 4136 sc.exe 6080 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3980 1620 WerFault.exe swiiiii.exe 2748 4988 WerFault.exe alexxxxxxxx.exe 3996 4816 WerFault.exe gold.exe 4164 4552 WerFault.exe toolspub1.exe 4164 4300 WerFault.exe u3fk.0.exe 5420 3620 WerFault.exe 4767d2e713f2021e8fe856e3ea638b58.exe 5152 1520 WerFault.exe MjC3Ls3cFBX5dT6FLyA0D5HH.exe 3356 6096 WerFault.exe KOJjgsKnBGcarEFpfajKambQ.exe 5568 5232 WerFault.exe u4oo.0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 908 schtasks.exe 5396 schtasks.exe -
Processes:
keks.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 keks.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 keks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exechrosha.exerundll32.exepowershell.exekeks.exetrf.exepowershell.exepowershell.exejok.exeRegAsm.exepowershell.exepid process 740 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe 740 03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe 3736 chrosha.exe 3736 chrosha.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe 5028 powershell.exe 5028 powershell.exe 5028 powershell.exe 3576 keks.exe 3576 keks.exe 3400 trf.exe 3400 trf.exe 624 powershell.exe 624 powershell.exe 3288 powershell.exe 3288 powershell.exe 624 powershell.exe 3288 powershell.exe 5016 jok.exe 5016 jok.exe 5016 jok.exe 5016 jok.exe 4552 RegAsm.exe 4552 RegAsm.exe 5016 jok.exe 5016 jok.exe 3368 powershell.exe 3368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
powershell.exetrf.exekeks.exefile300un.exeAddInProcess32.exepowershell.exepowershell.exejok.exepowershell.exedescription pid process Token: SeDebugPrivilege 5028 powershell.exe Token: SeDebugPrivilege 3400 trf.exe Token: SeBackupPrivilege 3400 trf.exe Token: SeSecurityPrivilege 3400 trf.exe Token: SeSecurityPrivilege 3400 trf.exe Token: SeSecurityPrivilege 3400 trf.exe Token: SeSecurityPrivilege 3400 trf.exe Token: SeDebugPrivilege 3576 keks.exe Token: SeDebugPrivilege 4072 file300un.exe Token: SeDebugPrivilege 3816 AddInProcess32.exe Token: SeDebugPrivilege 624 powershell.exe Token: SeDebugPrivilege 3288 powershell.exe Token: SeDebugPrivilege 5016 jok.exe Token: SeDebugPrivilege 3368 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrosha.exeswiiiii.exerundll32.exerundll32.exealexxxxxxxx.exeRegAsm.exegold.exeNewB.exedescription pid process target process PID 3736 wrote to memory of 1620 3736 chrosha.exe swiiiii.exe PID 3736 wrote to memory of 1620 3736 chrosha.exe swiiiii.exe PID 3736 wrote to memory of 1620 3736 chrosha.exe swiiiii.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 1620 wrote to memory of 2536 1620 swiiiii.exe RegAsm.exe PID 3736 wrote to memory of 4332 3736 chrosha.exe rundll32.exe PID 3736 wrote to memory of 4332 3736 chrosha.exe rundll32.exe PID 3736 wrote to memory of 4332 3736 chrosha.exe rundll32.exe PID 4332 wrote to memory of 800 4332 rundll32.exe rundll32.exe PID 4332 wrote to memory of 800 4332 rundll32.exe rundll32.exe PID 800 wrote to memory of 1268 800 rundll32.exe netsh.exe PID 800 wrote to memory of 1268 800 rundll32.exe netsh.exe PID 800 wrote to memory of 5028 800 rundll32.exe powershell.exe PID 800 wrote to memory of 5028 800 rundll32.exe powershell.exe PID 3736 wrote to memory of 4444 3736 chrosha.exe rundll32.exe PID 3736 wrote to memory of 4444 3736 chrosha.exe rundll32.exe PID 3736 wrote to memory of 4444 3736 chrosha.exe rundll32.exe PID 3736 wrote to memory of 4988 3736 chrosha.exe alexxxxxxxx.exe PID 3736 wrote to memory of 4988 3736 chrosha.exe alexxxxxxxx.exe PID 3736 wrote to memory of 4988 3736 chrosha.exe alexxxxxxxx.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 4988 wrote to memory of 3660 4988 alexxxxxxxx.exe RegAsm.exe PID 3660 wrote to memory of 3576 3660 RegAsm.exe keks.exe PID 3660 wrote to memory of 3576 3660 RegAsm.exe keks.exe PID 3660 wrote to memory of 3576 3660 RegAsm.exe keks.exe PID 3660 wrote to memory of 3400 3660 RegAsm.exe trf.exe PID 3660 wrote to memory of 3400 3660 RegAsm.exe trf.exe PID 3736 wrote to memory of 4816 3736 chrosha.exe gold.exe PID 3736 wrote to memory of 4816 3736 chrosha.exe gold.exe PID 3736 wrote to memory of 4816 3736 chrosha.exe gold.exe PID 4816 wrote to memory of 4428 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 4428 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 4428 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 4816 wrote to memory of 3548 4816 gold.exe RegAsm.exe PID 3736 wrote to memory of 1016 3736 chrosha.exe NewB.exe PID 3736 wrote to memory of 1016 3736 chrosha.exe NewB.exe PID 3736 wrote to memory of 1016 3736 chrosha.exe NewB.exe PID 1016 wrote to memory of 908 1016 NewB.exe schtasks.exe PID 1016 wrote to memory of 908 1016 NewB.exe schtasks.exe PID 1016 wrote to memory of 908 1016 NewB.exe schtasks.exe PID 1016 wrote to memory of 4448 1016 NewB.exe ISetup8.exe PID 1016 wrote to memory of 4448 1016 NewB.exe ISetup8.exe PID 1016 wrote to memory of 4448 1016 NewB.exe ISetup8.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
file300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe"C:\Users\Admin\AppData\Local\Temp\03025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:740
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 8683⤵
- Program crash
PID:3980
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:1268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084619521222_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5612
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:5824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 3603⤵
- Program crash
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 3643⤵
- Program crash
PID:3996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000223001\ISetup8.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\u3fk.0.exe"C:\Users\Admin\AppData\Local\Temp\u3fk.0.exe"4⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 10165⤵
- Program crash
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3fk.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u3fk.2\run.exe"4⤵PID:5716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵PID:3404
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵PID:5840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000224001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000224001\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 3564⤵
- Program crash
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"3⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000225001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵PID:5332
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5872
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5792
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5348
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5176
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵PID:5944
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3668
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5396
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:4712
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 9364⤵
- Program crash
PID:5420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"2⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4072 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:3860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe"C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe"4⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe"C:\Users\Admin\Pictures\MjC3Ls3cFBX5dT6FLyA0D5HH.exe"5⤵PID:3032
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5524
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3288
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:6012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 8005⤵
- Program crash
PID:5152
-
-
-
C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe"C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe"4⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:752
-
-
C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe"C:\Users\Admin\Pictures\KOJjgsKnBGcarEFpfajKambQ.exe"5⤵PID:6096
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5428
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:1964
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5896
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3668
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:3368
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6096 -s 8926⤵
- Program crash
PID:3356
-
-
-
-
C:\Users\Admin\Pictures\pzbDlMTbZAB0Zds84duJ6QpA.exe"C:\Users\Admin\Pictures\pzbDlMTbZAB0Zds84duJ6QpA.exe"4⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\u4oo.0.exe"C:\Users\Admin\AppData\Local\Temp\u4oo.0.exe"5⤵PID:5232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 10166⤵
- Program crash
PID:5568
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4oo.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u4oo.2\run.exe"5⤵PID:5664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵PID:5212
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"2⤵PID:5288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "3⤵PID:5348
-
C:\Windows\SysWOW64\sc.exeSc delete GameServerClient4⤵
- Launches sc.exe
PID:4136
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClient confirm4⤵PID:3904
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"4⤵PID:4556
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClient4⤵PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "3⤵PID:3080
-
C:\Windows\SysWOW64\sc.exeSc delete GameServerClientC4⤵
- Launches sc.exe
PID:6080
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClientC confirm4⤵PID:5940
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"4⤵PID:1044
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClientC4⤵PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1620 -ip 16201⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4988 -ip 49881⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4816 -ip 48161⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4552 -ip 45521⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4300 -ip 43001⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵
- Executes dropped EXE
PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3620 -ip 36201⤵PID:5360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1520 -ip 15201⤵PID:2672
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵PID:5836
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:2628
-
C:\Windows\Temp\761347.exe"C:\Windows\Temp\761347.exe" --list-devices3⤵PID:2780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6096 -ip 60961⤵PID:5028
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵PID:5508
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:6020
-
C:\Windows\Temp\263715.exe"C:\Windows\Temp\263715.exe" --coin BTC -m ADDRESSES -t 0 --range 27764869860000000:27764869880000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin3⤵PID:6008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5232 -ip 52321⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:5416
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
19KB
MD5b74a5f26f9550a92dfbaca6ac0343d3d
SHA1dac471c6d505badc8d61517211c6615a049abefd
SHA2560d7d523c1157f131648d282fe0df1c4bc4a5d72b2eee0cede70c306f4c1d7bb1
SHA512c4ba3465827bce565b6b8a8c5b174f9f8b16984b537c1ff00801684950a695f1b9c601252de438f5faa4f5055a39a185f880c6da8ed3ad583d80e65c23041452
-
Filesize
19KB
MD5beec0c7b024f433338187bb1791f156e
SHA14319759323cc051b0f8b8c059f0ecf79418d7842
SHA256b8a98919426802693a769d668be633b591703d15b9885ca52ae2b85d2560287f
SHA512f1e2ab609fe7b9059942c697a2d0be5e141197ad2505a9365e12165b9b2a10df3b5c118730d6f4d2ad8271b529ce1efc8984e283f00e285e3af860123a5bceeb
-
Filesize
1KB
MD57f5130f8643f9c281b6384704d27b900
SHA1c384737918a1e492e8742800a251d31de1842de2
SHA256e5a21b6e080bd51ab39ae0aa91aa0573951a52aafd2f021263141d0755e1cf8f
SHA512ff471d00db8f4ec88cd0d52894e4f1a91ad32473cb173b7a5d431def9717cbe106c2ae431869651a3a9fc1801f9997a9d35d22a85cdb605ed98731e6dc129161
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
2.7MB
MD531841361be1f3dc6c2ce7756b490bf0f
SHA1ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA51253d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019
-
Filesize
460KB
MD5b22521fb370921bb5d69bf8deecce59e
SHA13d4486b206e8aaac14a3cf201c5ac152a2a7d4ea
SHA256b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158
SHA5121f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
768KB
MD596b291b8b678331caaa8910e6c5b5676
SHA1d5411828c36192751915493d99404dd84b7cd188
SHA25627b3a4cb988e416a260c7287b59fc72cd4d7cb4b94f25daa01daab2ea192da2b
SHA51221d4fbc3060a202f873a3d23f5956409070f5acb64d423070e97b1f909897619e6cf3be90b1574552494a7ce1ac12d4139e3626cd737ab1fffdde321cd30924e
-
Filesize
2.4MB
MD555f780ea4dc5a5401b80915d69a55481
SHA15ebdde7f87637493de0a5e7a4ffcd59839672c4e
SHA256c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70
SHA512680ca9d6f5aa4d53e7083858bfd4d3fc71f567993968edc83ddf262e15b2ed06f07c5a4c47e65f4874074213adf3cd978b8eaa658563694caf013fb126948697
-
Filesize
407KB
MD5b82a9fba1917da3b2fe0d2b1eb5d810c
SHA1d5eb2ffb02586987369ab69f419f6e3517a4a998
SHA25675fb2b9b7e61009e71a3a280c81187cc6e7af9821137ce2e942a987b9aa14784
SHA512e3bbaf074595ebeda6f902973a7556a7a1c9c90375f8a29a099dd54e5ad90535d45b2f14fe14016619c072e6d9e2c7efc9097dcb8aef6fc2dcf4ae01fa7cdf4b
-
Filesize
265KB
MD5d2d61371e2c16ed85a6cdca7931a9976
SHA14fa89990a7c2d0abc223056440b949a36754eb2d
SHA256eca62d3dfad6ae0eef6f384360749315a305139c6db17435754a44c2b30333ce
SHA512646839a1081de540ca9dc56dae22eec209a9f4bce709016983be6173c2a86eed8a9e76a58e0aeea8b86b2fb604ff98da3ffd4f3afe6465018adaee098f781d49
-
Filesize
4.1MB
MD552350cf7f8d03c016db75f5e31f3f587
SHA124367055bd2cd51ab7727f01f0b053f483388563
SHA256d5399893dcbdd8c313a6455d5edd68ad7dd242119423cb632c83818dea29e277
SHA5124b1e67e7d4bb40f65b26122df1a683ffa86a4cd815fef8e0d919b4a2d8fb2af8be31bee5cd434c7d65621f9ca6fee15411b63cb7ce9a68509a63d18310e29ef6
-
Filesize
1.8MB
MD56dca2e803f570d076689d40d1de040c1
SHA10db4712005184022c7b9b61a9d58caffaf7b784b
SHA25603025185db7ff2b3f7faeeb2f600274a8c87011ae7c2771f11df5be956a228e0
SHA51224669394b81cb57f40c28dfe72aef2983725341bba0433ad5a721bb7379ea1b3d361d4ba3ac05be96bce098d90efd56145df07d50bf6d9bf2add2274f0fa7cfb
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
264KB
MD54d4fdab28f0c4656ba04783316751b06
SHA1b3d4036203dad1cb05976c5c28f9d1af1ad50361
SHA256c1586e82cf889acfbe3d9ff17d9f76d49c513ef62ba79f15c613fb87881d71d5
SHA5124a36fcd18bf86deedf5e3759d0d996972031625ac62892e50097df321a71215ab8d1d2b03b51886fe0cc4eeb9f70c86a7b1961f3b422f8e416d27e0aac40f1c9
-
Filesize
3.7MB
MD578d3ca6355c93c72b494bb6a498bf639
SHA12fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e
SHA256a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001
SHA5121b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea
-
Filesize
1.3MB
MD51e8237d3028ab52821d69099e0954f97
SHA130a6ae353adda0c471c6ed5b7a2458b07185abf2
SHA2569387488f9d338e211be2cb45109bf590a5070180bc0d4a703f70d3cb3c4e1742
SHA512a6406d7c18694ee014d59df581f1f76e980b68e3361ae680dc979606a423eba48d35e37f143154dd97fe5f066baf0ea51a2e9f8bc822d593e1cba70ead6559f3
-
Filesize
1.5MB
MD510d51becd0bbce0fab147ff9658c565e
SHA14689a18112ff876d3c066bc8c14a08fd6b7b7a4a
SHA2567b2db9c88f60ed6dd24b1dec321a304564780fdb191a96ec35c051856128f1ed
SHA51229faf493bb28f7842c905adc5312f31741effb09f841059b53d73b22aea2c4d41d73db10bbf37703d6aeb936ffacbc756a3cc85ba3c0b6a6863ef4d27fefcd29
-
Filesize
2.4MB
MD59fb4770ced09aae3b437c1c6eb6d7334
SHA1fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256
-
Filesize
85KB
MD5a723bf46048e0bfb15b8d77d7a648c3e
SHA18952d3c34e9341e4425571e10f22b782695bb915
SHA256b440170853bdb43b66497f701aee2901080326975140b095a1669cb9dee13422
SHA512ca8ea2f7f3c7af21b5673a0a3f2611b6580a7ed02efa2cfd8b343eb644ff09682bde43b25ef7aab68530d5ce31dcbd252c382dd336ecb610d4c4ebde78347273
-
Filesize
1.6MB
MD5d1ba9412e78bfc98074c5d724a1a87d6
SHA10572f98d78fb0b366b5a086c2a74cc68b771d368
SHA256cbcea8f28d8916219d1e8b0a8ca2db17e338eb812431bc4ad0cb36c06fd67f15
SHA5128765de36d3824b12c0a4478c31b985878d4811bd0e5b6fba4ea07f8c76340bd66a2da3490d4871b95d9a12f96efc25507dfd87f431de211664dbe9a9c914af6f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4084619521-2220719027-1909462854-1000\76b53b3ec448f7ccdda2063b15d2bfc3_338e918a-08d3-477c-81e2-0f9a71d72db8
Filesize2KB
MD5738595215453f9d3532fa2aab0a49ddf
SHA11cf620b40c158f8416b4d3f936822eb3f8923ae0
SHA25640ce779af1fb97dd774217d669720a7a2e733001c2ee5014c5e850d9a56bb553
SHA5128b1ca2b12b0c17ad577b64ebf6ebc75577f3dd4e7c89a5d27f6a08ae7cf20d59dbcc90447ec60e861c0c88d48ed89f05d88389ecb7ca2a5a4e848177ab301f80
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
304KB
MD50c582da789c91878ab2f1b12d7461496
SHA1238bd2408f484dd13113889792d6e46d6b41c5ba
SHA256a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67
SHA512a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a
-
Filesize
750KB
MD520ae0bb07ba77cb3748aa63b6eb51afb
SHA187c468dc8f3d90a63833d36e4c900fa88d505c6d
SHA256daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d
SHA512db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2
-
Filesize
2KB
MD5e75d9fd25fcbf24bb9ceee28118c8f20
SHA14a2e563fbaa11f9163e7947645f0ff184a059469
SHA256dacb9948adb316e2f1691d5247fc0b18899d6dd8204cb3a48d83d712a4d1e0b6
SHA512e5ae736c428db50c5e8cff9b55a73b37754bcd887f09e09c2aacd3c24cfab4f2543822028a39b229c7130f92a63e82ace4bf40c98fa1c86fbc4e7ce54e105a13
-
Filesize
2KB
MD500dda58c068f292032fbd6be20f3421f
SHA1568eb06419f4fc67a6e3d333e834f54d4477ed0f
SHA256283c2afb4e7e4eda97563501b60331bfde8061024b3abdd51448ad9a82fa6ff4
SHA512cb3080413b064c17756cefe240caa4312d9c07550a89cf7ba146e79411b76fbde2e92117fb2b6ac82453c137ad879b118feac269f6422c65817e71fb0e25da43
-
Filesize
4.1MB
MD59d9a93a6f9e21b61bf9252005523c0f4
SHA174291f35a68d342c62aef9754fb7048986f96a0e
SHA2564c5f8e2835fafb62643afb08232a462b3f060787af9650ab0fa831a15460f838
SHA51200d19de9699025ec3341ff7921b320bbb22d2f861e81a290e2a4b4334136499c3ebe0d535442b94d9f05f486e7d394b315bbdc4749aae30fe8559efe280aadf4
-
Filesize
407KB
MD514098ff4315f5d2fa48d294044f56723
SHA1e57500af037cef93917b31808d139ae2a2d15357
SHA2560da645e22d4346b60004fe98ff5db921cc6ed51a64da653ca7c205a557adaf64
SHA512d072a75f5b492f84521eec2e7ee9f09637c6174aaeca6b058a016ea4644c27a7ee166894a7feaffb2ad499a7d809a0c04a998c47d0ff1ebc2f997ea2de3094ee
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2KB
MD5f5f7eaf36eaf49c04a6acda81c5a698d
SHA1fdf66e542f5619b972aa05c0519b0b44f9af0fb9
SHA256781e78cd6f664a585d187a4010d45d30213872207133f0bf87a2d201f45cffd3
SHA5128f0a3c70fcdc6194bc50a151dd8a61e7c0386e69ec45fe74fbf2c983249f8ca869bcb93dd2c79e99f58ccdd428d608131cb0fe5701a24f1ff755fcaf7b8d653b
-
Filesize
2KB
MD585deec65e16c4202676771c20a0c6822
SHA1e393d00707d69e39098f4eb054561566f068eebc
SHA256e166e39510a22a0bae4cff6bd42ba41508db86ab2fd7cbb57d62162b7fd9de04
SHA512356557c99494b4fa7faf0591fa6d7286e26573044f124d3522e6d0421f452b4210fda2d6ee8b2df64c3592c91104ef2ddaa864283b7b6ba9b7eed44cf06de313
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e22ba25e90b5ee936d47089ccc22d88c
SHA18f711525d915307a12efa3b27b977acf44acb584
SHA2565b85c2bbd90c089fdb1e4b0813b51f31b6a5b7b2131a85549067ed7b6617abc4
SHA512c37a71a795edc383c1bba5a5d0b7cd6d8f03fca2ec10065f6acce303a81bb1c07b8c91dfffd6312ed8609816bb4b929a355bbd13d191c59eb8fd65c1e78ac6c0