Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-04-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe
Resource
win11-20240426-en
General
-
Target
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe
-
Size
1.8MB
-
MD5
73d73c48859fc7aa4fd78d9a57f859d6
-
SHA1
c1f71ea0692d97c653ff5a5ecbc03fd02173fe05
-
SHA256
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876
-
SHA512
f0634be539582016c03e83f3ca58d613fc16abcc0a9c320321f455234a8f2dc1c199fc52187abac5e4cbbe7b7907afdaa89813f50cbecd611f7e870ee7f8e979
-
SSDEEP
24576:Snk5YKXHSuRlxqOd8pF2h99TqJWVs/ae2c01R/QTS5I0aQrnnuls5py6sDya:0YNxd7h9hqJ2s/ae10e0aiCKrsu
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
redline
@CLOUDYTTEAM
185.172.128.33:8970
Extracted
redline
Test1234
185.215.113.67:26260
Extracted
stealc
http://52.143.157.84
http://185.172.128.62
-
url_path
/c73eed764cc59dcb.php
Signatures
-
Detect ZGRat V1 6 IoCs
Processes:
resource yara_rule behavioral2/memory/232-73-0x0000000000400000-0x0000000000592000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe family_zgrat_v1 behavioral2/memory/3240-100-0x00000000005B0000-0x0000000000670000-memory.dmp family_zgrat_v1 behavioral2/memory/2076-638-0x000001F7228D0000-0x000001F7261C8000-memory.dmp family_zgrat_v1 behavioral2/memory/2076-639-0x000001F740AA0000-0x000001F740BB0000-memory.dmp family_zgrat_v1 behavioral2/memory/2076-643-0x000001F728070000-0x000001F728094000-memory.dmp family_zgrat_v1 -
Glupteba payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3084-519-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/3084-618-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe family_redline behavioral2/memory/4976-95-0x0000000000010000-0x0000000000062000-memory.dmp family_redline behavioral2/memory/3240-100-0x00000000005B0000-0x0000000000670000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe family_redline behavioral2/memory/4064-193-0x0000000000C40000-0x0000000000C92000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2744-708-0x0000000000D00000-0x0000000000DC6000-memory.dmp family_sectoprat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exechrosha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 39 3892 rundll32.exe 44 1288 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4124 netsh.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exechrosha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe -
Executes dropped EXE 19 IoCs
Processes:
chrosha.exeswiiiii.exealexxxxxxxx.exekeks.exetrf.exegold.exeNewB.exejok.exeswiiii.exelie.exeuog.0.exerun.exeuog.3.exeNewB.execsrss.exeinjector.exewindefender.exewindefender.exeNewB.exepid process 4896 chrosha.exe 2452 swiiiii.exe 4596 alexxxxxxxx.exe 4976 keks.exe 3240 trf.exe 2408 gold.exe 1552 NewB.exe 4064 jok.exe 4672 swiiii.exe 4720 lie.exe 980 uog.0.exe 3012 run.exe 4536 uog.3.exe 1148 NewB.exe 1152 csrss.exe 1828 injector.exe 2028 windefender.exe 5108 windefender.exe 3384 NewB.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exechrosha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine chrosha.exe -
Loads dropped DLL 8 IoCs
Processes:
rundll32.exerundll32.exerun.exeRegAsm.exerundll32.exeuog.0.exepid process 1948 rundll32.exe 3892 rundll32.exe 3012 run.exe 2072 RegAsm.exe 2072 RegAsm.exe 1288 rundll32.exe 980 uog.0.exe 980 uog.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4767d2e713f2021e8fe856e3ea638b58.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exechrosha.exepid process 2932 d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe 4896 chrosha.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
swiiiii.exealexxxxxxxx.exegold.exeswiiii.exerun.execmd.exedescription pid process target process PID 2452 set thread context of 912 2452 swiiiii.exe RegAsm.exe PID 4596 set thread context of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 2408 set thread context of 4604 2408 gold.exe RegAsm.exe PID 4672 set thread context of 2072 4672 swiiii.exe RegAsm.exe PID 3012 set thread context of 1892 3012 run.exe cmd.exe PID 1892 set thread context of 2744 1892 cmd.exe MSBuild.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
4767d2e713f2021e8fe856e3ea638b58.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 5 IoCs
Processes:
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe4767d2e713f2021e8fe856e3ea638b58.execsrss.exedescription ioc process File created C:\Windows\Tasks\chrosha.job d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4592 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 668 2452 WerFault.exe swiiiii.exe 3948 4596 WerFault.exe alexxxxxxxx.exe 3200 2408 WerFault.exe gold.exe 4352 3680 WerFault.exe toolspub1.exe 984 880 WerFault.exe ISetup8.exe 2260 980 WerFault.exe uog.0.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
uog.3.exetoolspub1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uog.3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uog.3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uog.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exeuog.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 uog.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString uog.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1036 schtasks.exe 2260 schtasks.exe 408 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
4767d2e713f2021e8fe856e3ea638b58.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe -
Processes:
keks.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 keks.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 keks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exechrosha.exeRegAsm.exekeks.exerundll32.exerun.exepowershell.exejok.exeuog.0.exelie.exepowershell.execmd.exe4767d2e713f2021e8fe856e3ea638b58.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepid process 2932 d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe 2932 d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe 4896 chrosha.exe 4896 chrosha.exe 2072 RegAsm.exe 2072 RegAsm.exe 4976 keks.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3012 run.exe 3012 run.exe 3012 run.exe 1832 powershell.exe 1832 powershell.exe 2072 RegAsm.exe 2072 RegAsm.exe 4976 keks.exe 4976 keks.exe 4976 keks.exe 4976 keks.exe 1832 powershell.exe 4064 jok.exe 4064 jok.exe 4064 jok.exe 4064 jok.exe 980 uog.0.exe 980 uog.0.exe 4720 lie.exe 4720 lie.exe 2276 powershell.exe 2276 powershell.exe 2276 powershell.exe 1892 cmd.exe 1892 cmd.exe 1892 cmd.exe 1892 cmd.exe 4064 jok.exe 4064 jok.exe 3084 4767d2e713f2021e8fe856e3ea638b58.exe 3084 4767d2e713f2021e8fe856e3ea638b58.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
run.execmd.exepid process 3012 run.exe 1892 cmd.exe 1892 cmd.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
trf.exekeks.exepowershell.exepowershell.exejok.exeRegAsm.exe4767d2e713f2021e8fe856e3ea638b58.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeMSBuild.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 3240 trf.exe Token: SeBackupPrivilege 3240 trf.exe Token: SeSecurityPrivilege 3240 trf.exe Token: SeSecurityPrivilege 3240 trf.exe Token: SeSecurityPrivilege 3240 trf.exe Token: SeSecurityPrivilege 3240 trf.exe Token: SeDebugPrivilege 4976 keks.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 4064 jok.exe Token: SeDebugPrivilege 232 RegAsm.exe Token: SeDebugPrivilege 3084 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeImpersonatePrivilege 3084 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeDebugPrivilege 2076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 2744 MSBuild.exe Token: SeDebugPrivilege 576 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeSystemEnvironmentPrivilege 1152 csrss.exe Token: SeSecurityPrivilege 4592 sc.exe Token: SeSecurityPrivilege 4592 sc.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
uog.3.exepid process 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
uog.3.exepid process 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe 4536 uog.3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
run.exepid process 3012 run.exe 3012 run.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrosha.exeswiiiii.exealexxxxxxxx.exeRegAsm.exegold.exeswiiii.exedescription pid process target process PID 4896 wrote to memory of 2452 4896 chrosha.exe swiiiii.exe PID 4896 wrote to memory of 2452 4896 chrosha.exe swiiiii.exe PID 4896 wrote to memory of 2452 4896 chrosha.exe swiiiii.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 2452 wrote to memory of 912 2452 swiiiii.exe RegAsm.exe PID 4896 wrote to memory of 4596 4896 chrosha.exe alexxxxxxxx.exe PID 4896 wrote to memory of 4596 4896 chrosha.exe alexxxxxxxx.exe PID 4896 wrote to memory of 4596 4896 chrosha.exe alexxxxxxxx.exe PID 4596 wrote to memory of 968 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 968 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 968 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 384 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 384 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 384 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 4596 wrote to memory of 232 4596 alexxxxxxxx.exe RegAsm.exe PID 232 wrote to memory of 4976 232 RegAsm.exe keks.exe PID 232 wrote to memory of 4976 232 RegAsm.exe keks.exe PID 232 wrote to memory of 4976 232 RegAsm.exe keks.exe PID 232 wrote to memory of 3240 232 RegAsm.exe trf.exe PID 232 wrote to memory of 3240 232 RegAsm.exe trf.exe PID 4896 wrote to memory of 2408 4896 chrosha.exe gold.exe PID 4896 wrote to memory of 2408 4896 chrosha.exe gold.exe PID 4896 wrote to memory of 2408 4896 chrosha.exe gold.exe PID 2408 wrote to memory of 5100 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 5100 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 5100 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 2408 wrote to memory of 4604 2408 gold.exe RegAsm.exe PID 4896 wrote to memory of 1552 4896 chrosha.exe NewB.exe PID 4896 wrote to memory of 1552 4896 chrosha.exe NewB.exe PID 4896 wrote to memory of 1552 4896 chrosha.exe NewB.exe PID 4896 wrote to memory of 4064 4896 chrosha.exe jok.exe PID 4896 wrote to memory of 4064 4896 chrosha.exe jok.exe PID 4896 wrote to memory of 4064 4896 chrosha.exe jok.exe PID 4896 wrote to memory of 4672 4896 chrosha.exe swiiii.exe PID 4896 wrote to memory of 4672 4896 chrosha.exe swiiii.exe PID 4896 wrote to memory of 4672 4896 chrosha.exe swiiii.exe PID 4672 wrote to memory of 2072 4672 swiiii.exe RegAsm.exe PID 4672 wrote to memory of 2072 4672 swiiii.exe RegAsm.exe PID 4672 wrote to memory of 2072 4672 swiiii.exe RegAsm.exe PID 4672 wrote to memory of 2072 4672 swiiii.exe RegAsm.exe PID 4672 wrote to memory of 2072 4672 swiiii.exe RegAsm.exe PID 4672 wrote to memory of 2072 4672 swiiii.exe RegAsm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe"C:\Users\Admin\AppData\Local\Temp\d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 8843⤵
- Program crash
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:3636
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 4043⤵
- Program crash
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 3963⤵
- Program crash
PID:3200
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"2⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\1000228001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000228001\ISetup8.exe"3⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\uog.0.exe"C:\Users\Admin\AppData\Local\Temp\uog.0.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 20965⤵
- Program crash
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\uog.2\run.exe"C:\Users\Admin\AppData\Local\Temp\uog.2\run.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uog.3.exe"C:\Users\Admin\AppData\Local\Temp\uog.3.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 14964⤵
- Program crash
PID:984
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000229001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000229001\toolspub1.exe"3⤵
- Checks SCSI registry key(s)
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 3844⤵
- Program crash
PID:4352
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000230001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000230001\4767d2e713f2021e8fe856e3ea638b58.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\1000230001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000230001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3516
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4124
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2260
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:1828
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:408
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2852
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000231001\lie.exe"C:\Users\Admin\AppData\Local\Temp\1000231001\lie.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
PID:1948 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3892 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:1668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\230210488309_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2452 -ip 24521⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4596 -ip 45961⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2408 -ip 24081⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3680 -ip 36801⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 880 -ip 8801⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 980 -ip 9801⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵
- Executes dropped EXE
PID:1148
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5108
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵
- Executes dropped EXE
PID:3384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
100KB
MD5658cb566f062f009c3a83549a6a035d5
SHA1482ed689d99cda2e4276c0bac404ec7cab9e0aec
SHA256ace73c9e991f0d223954a1ebec43a526b5f0fcf674188eaaa8af29d989bf21e4
SHA512cc424f8c3478af5f146d0df31a2e705c357f3ca59c0d767aabac7ab0badbaf4cfa73f73934a2e9be358a588333860812d3c914fc054f740cf12e430fd35bcc0a
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
33KB
MD5f278257dc9b8268669cad8a1b2ba79c2
SHA1709d62da0fcb4aa347f4faf7874d61a0d1e819b1
SHA25648f36b97edb7dc30bcbd9d08d665bccd975490f39a2f38e9d5e3a3f754abb500
SHA512453d1e2564e462eadc50e292f4bbfbd8a79bee6a657dfa0b0e4a4c0a34eda08ed8e3c00439a40738513e1ec12b2231e7c476fe382f03389dc58294c6ad88114b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
11KB
MD53016af45a4c7045b394c9a131197754e
SHA104ddb46a00ec97a965f199fdc80bb5eb1088a5c0
SHA256077707610bbfd5f1e371e5eebbf263de599863ae3fe3c3ca93bbe8a70eb3aedc
SHA5121bae6407a7870c2e0720b548b4e9b5855d2a1b155ad13be48173fb3625abe4141b94d1fbbbc32f177b5646dfe929de863e9bd68794c344cda5b304e927b01244
-
Filesize
35KB
MD52f99217812fea1bec79417dabaec35ec
SHA10fb53f126b6b6c3ca330f1e8111d68398784a82c
SHA256960d0511de26778f49988300b169cae2d76cda3a7df89d775ade3c4a1c7264ac
SHA512f261f4ce412179937e75058ff176959589503d0ba3b43f9a1cf299e69a3cc3779134defe8648eba9e3af5e970ffed600dc4c93c5bdb49395d451fcd7f3d774f7
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
7KB
MD5850a06b0f2ba21d0bb154aed00b69db3
SHA182f4e4921aa97d3af4323ccc9ef4049210aff984
SHA25684ea62cb868eba53bb43953bf623676db958cc15a3c26c4d63a9f1e483d3fd89
SHA5129615408879787672393d5e205f596cb800217150679c76cb1fe4b37bd0d6be61057e9b4502a376e8bb253a2eea5e647c5655316543b9954b56aa4f581bbda391
-
Filesize
11KB
MD527eb36fa1707297feff5ea7b4ef57eb3
SHA1b92923a04fe709b0a988a28599fb0b8c22fc7a4d
SHA25689b223f9095a6f018b05499e1fde07275d567462d720aa3c454ddc5d6325c2d9
SHA51201950eb1d4e5bef997f9d72b4552839bc9e9413a7ae9e2bf2bbf8b6b479e4ad853da27c18c0f5da909a91ace842e04848c42659d05231591b6f4cdf5e89a8957
-
Filesize
11KB
MD524a1064c29865c39c55cbf9dc9b4f322
SHA11368e2a81f7595683d628bf4c5241847acac3417
SHA2564095f5926b3296aff4af06c9b6787250f912da05f4d589d35924038c0e3fa7ef
SHA512244a112641f8e0ccff1c7ff342a76b0aaca8c2cc133eab29dc8941a812fca84dc6418d5f15569a00ffc023402dbcc8cdf2fe2a0c5fb288d50d862ceb2669df99
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
2.7MB
MD531841361be1f3dc6c2ce7756b490bf0f
SHA1ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA51253d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019
-
Filesize
460KB
MD5b22521fb370921bb5d69bf8deecce59e
SHA13d4486b206e8aaac14a3cf201c5ac152a2a7d4ea
SHA256b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158
SHA5121f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
1.7MB
MD524dd75b0a7bb9a0e0918ee0dd84a581a
SHA1de796b237488df3d26a99aa8a78098c010aeb2c9
SHA256878966291372a9633242af15570a8bbe31699b5e0b650e806af4742da1f6b35d
SHA51253f951d795fbf760dd593619bb3f96fd604bc15adb4f637457d28fbd78ae3764afd4e9c9a755a6241431ad4664dd30e4a2df84e33fe59954f7c55da0e4038557
-
Filesize
1.8MB
MD573d73c48859fc7aa4fd78d9a57f859d6
SHA1c1f71ea0692d97c653ff5a5ecbc03fd02173fe05
SHA256d46a8fa545385ab42ca58f6175b13f4b9989d88322ab624f646623b4a52a4876
SHA512f0634be539582016c03e83f3ca58d613fc16abcc0a9c320321f455234a8f2dc1c199fc52187abac5e4cbbe7b7907afdaa89813f50cbecd611f7e870ee7f8e979
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.4MB
MD563ff730e73638ad456fbd15d232c9baa
SHA14d71ede2c65562c1ad141458431ab370ce33ad0f
SHA256fe21f44a1ce27c31f43c9823dff12140b567d691dc64520ead802a0df8f81130
SHA512aa7b105aa8d5e459c514f1a9030e5d8e3e0dc37b79bf0ca5c2ffb3fd4db204a7baa1374d126f08ad072cb0e67bda3b8fb608a4a6edcb067ec0c81e995a520cfb
-
Filesize
2KB
MD5bdb49604ad7146981d2ff5c13e565442
SHA1e52c12f4caf47c84207705253708fa3aed08ae8c
SHA256c832ceb6e7812ca9a8b4347919ac844cc682b28117cb05c2e724bd4ef31c617e
SHA512e0a1841405c7f2edcef7e60d33697fe7ac39eef3493e933aeec2c12351a775d0516abd1bc04d6801f00676528a82f2f003331c14e98234cc1e14ad16d9d601f8
-
Filesize
3KB
MD5072cc7e3f755ae9108251e7fddbd00fa
SHA1d9511ce691c8660b9dfa5df6c41a81bbba2c5be2
SHA256720733ee10bc743643f54e6302bb9b2ba45e20c5af57f462cc5101a98437943c
SHA5126a25c6c008cdee556cfe0a87d1979ba7ae5495e1eec7d08b5f6b6f72d8cd927df3ac4254ef40569becbe3e5681fd679cd6ecd19ec355029187889ba9b25eec42
-
Filesize
242KB
MD53b577ad55734b8ab5e8362c15fdcb327
SHA15ce0b10cc6ad018ff59a28da1ca2b43608742ee6
SHA2562c1f6bfc7bd1e82f941ca19a108bc7bc455b1d140becddd151d6f9c119104ad6
SHA512ec2178ba7b47b7be8bc41f4f46aca4fd5259631c89084b3f1ef56d7564fe0a42c48fb774b8ad22ee6c95bb01bea0a010460d5effa6d3635d3b94b7f780eb1791
-
Filesize
3.7MB
MD578d3ca6355c93c72b494bb6a498bf639
SHA12fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e
SHA256a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001
SHA5121b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea
-
Filesize
1.6MB
MD5d1ba9412e78bfc98074c5d724a1a87d6
SHA10572f98d78fb0b366b5a086c2a74cc68b771d368
SHA256cbcea8f28d8916219d1e8b0a8ca2db17e338eb812431bc4ad0cb36c06fd67f15
SHA5128765de36d3824b12c0a4478c31b985878d4811bd0e5b6fba4ea07f8c76340bd66a2da3490d4871b95d9a12f96efc25507dfd87f431de211664dbe9a9c914af6f
-
Filesize
1.3MB
MD51e8237d3028ab52821d69099e0954f97
SHA130a6ae353adda0c471c6ed5b7a2458b07185abf2
SHA2569387488f9d338e211be2cb45109bf590a5070180bc0d4a703f70d3cb3c4e1742
SHA512a6406d7c18694ee014d59df581f1f76e980b68e3361ae680dc979606a423eba48d35e37f143154dd97fe5f066baf0ea51a2e9f8bc822d593e1cba70ead6559f3
-
Filesize
1.5MB
MD510d51becd0bbce0fab147ff9658c565e
SHA14689a18112ff876d3c066bc8c14a08fd6b7b7a4a
SHA2567b2db9c88f60ed6dd24b1dec321a304564780fdb191a96ec35c051856128f1ed
SHA51229faf493bb28f7842c905adc5312f31741effb09f841059b53d73b22aea2c4d41d73db10bbf37703d6aeb936ffacbc756a3cc85ba3c0b6a6863ef4d27fefcd29
-
Filesize
2.4MB
MD59fb4770ced09aae3b437c1c6eb6d7334
SHA1fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256
-
Filesize
85KB
MD5a723bf46048e0bfb15b8d77d7a648c3e
SHA18952d3c34e9341e4425571e10f22b782695bb915
SHA256b440170853bdb43b66497f701aee2901080326975140b095a1669cb9dee13422
SHA512ca8ea2f7f3c7af21b5673a0a3f2611b6580a7ed02efa2cfd8b343eb644ff09682bde43b25ef7aab68530d5ce31dcbd252c382dd336ecb610d4c4ebde78347273
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1230210488-3096403634-4129516247-1000\76b53b3ec448f7ccdda2063b15d2bfc3_bb42cecb-ddb7-43e2-9d9f-40e8c5d10e5c
Filesize2KB
MD51b047ade2debacee150044b85bdda4f0
SHA18ba55334fda81664264268031bd751b01010b5e5
SHA25669f41a4030c8fe8734a72aa35aa692edd7c3a567a65f2ad3aa733156a79751af
SHA5120fb334f5ce7dec91ff32c223abafe45ab3f7fda6bfd7f9eaa65328ec9e2091861496c96f7a9ab7ea38f9fdbfc0613de65754d8900c2b6932b1523a3b119cf174
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
304KB
MD50c582da789c91878ab2f1b12d7461496
SHA1238bd2408f484dd13113889792d6e46d6b41c5ba
SHA256a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67
SHA512a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a
-
Filesize
750KB
MD520ae0bb07ba77cb3748aa63b6eb51afb
SHA187c468dc8f3d90a63833d36e4c900fa88d505c6d
SHA256daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d
SHA512db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2
-
Filesize
2KB
MD5ed101832ceaee42ec4357f5bdc136bc3
SHA1555976e70e434e3946b3c824eabaa6ecba896346
SHA256d5e0a74939b5130bc370b13e2f8b51086af2638ed4ec5b8fb37a297247ebdaa3
SHA5124e7d9a9deb3354f2db760ce70b108e0e7da055d8fc7a873d5c4ef3d290f1d419c278e2d2ea57e8ab7863bbfb8e85387bb28a178f2db0a16014e0578039b928d8
-
Filesize
2KB
MD546c5fd7e6f97d996ca441da4ff2b127e
SHA17b18e87c53085b9def72be6a5d9cc00ecfd770f1
SHA25626c0dd07b4d069a3432174449fb5600a37f94badfbcdd10e08616f9916df2215
SHA512249ccd60e9c92c8391f1a12fd120d8651c7030aa6e8d5536d08f9043f297632be9e1bb9ce0cbebb489527c68264b87186ee65c4b529260d4a051ecaac309d80a
-
Filesize
2KB
MD5efa296fc2eb40f11a5597c7c7b4d0189
SHA1cc94acc5b60e2539935f09e6381bf3eaa2f4852c
SHA256f4ae3573adfadd441ea2a348f9a4a5be5aaef593aa174940e6f9490cbadddfaa
SHA512fe2511752a43f99ca4604130edf0bc4bd5e68a79fac5d358b1db1e395271e2ea409b3c01ce0c677bbce52b1e6c8a0f61e4e50afee8b614e42a56475bac1bd7e3
-
Filesize
2KB
MD5fdc1fe71cbd265a6de2fc295744206ce
SHA10e2b36738af978a24e72c4e26bca818dd4197394
SHA256d6832062e6c0c8310bc6c85b42e49e6ccb6130c175767ad447c7111d4e18bff7
SHA51222d4ab52a0136a8ed868452ef0adaed012a6eb0e6717bcac1af7361520b4ee675ecf1d4ddfb4f513ecad4682c087d57a2b608b4e2b784f1fedb388b9b2fa902f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD522d3b7ccf40a90b8ccfb60e745f0ce76
SHA17aa9400dcbace0b37b46cf040407da89660fda17
SHA25669e223cf3860cdd0729edc203d68d08f9b2cc66fd1588eb55c3fa54129ccbebc
SHA512203e064046732bbeede2e3c02f7a687b447f2dabdc78d7056806bd58b3cac27b843a2c795f782533e81ebf203c58e2b251ee9586dc68abbf364f4f552987550d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58b7bb1d9ac956973a89bec8c7d5ff9f2
SHA1e612776460a9e5f312e9de87474fb74574ff1697
SHA256882d038092eaed60c1e90fb06ac22a97c94f89e99d75e537d54380beb11f6bf1
SHA5126126ea698a245d145120ba742edaa69bea96b2ffc03e73617a5337aec7f9ef954d44707a8faf7f3613ccbae6f6f54a006a691ac3a97363037606db3e3801b3ff
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56262d970cc32d5f715d6991c364cd1c8
SHA1582ef81870ec9c35b378124bb029a41e8aa5bdbd
SHA256fdcfe945a2b5f9758956f247354149181dff7e6b0e46ad71760ace7e308242b5
SHA5126f661a1af550c9107a3d09bc0af8010896f6a45f8060eb319b1e664d3855ce1770b0396d3a6406cc7a598ec9e5c3ad19b63410f8af2c1a12a5e864a3930b8234
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD564820a560a6be7675c9422d944cb0e15
SHA170e245698449da934c3be72b8d65bb7678b824a8
SHA256cc69478606a89ca89ac0d2c620aabc32db60f5f64976d9c0a2d01bc653e14c34
SHA51213e68591b4dbcb090a7687760804e61d47ef542044db0eb7a3ee50f55d3a571911f6eb628af9c194a6c01cd93899181749b863937d4789890a3bea5cbdd911cc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bc2d8ee9f052a27dc5a93a8883375962
SHA1f8c29cbd6b44b834021bbf4edadc098d3d891c4c
SHA25636202a0c445dbb2d1ea01e7932bbfb00b8dfe9151d7ba06580f5e2ffa7c3395c
SHA51289f928b114fec5b8fbb3986063cbf920809bda4b8f2be7ef92e0c0e364558472b827890f65adca77986c04c9315c9a8c73baf50aad29c416c64ac7e41dcdc604
-
Filesize
4.1MB
MD56ed714c1a56743f32ed097b0b79e1be2
SHA1dc6cd1493016221d853ba8cb84623aee5fc7fde1
SHA25618cbd445ca637b452e9ca89911ab9b30f0adf60a35c2569a42ae13dcd5a44bf9
SHA512a1a6a1abda4504859b0a0c21bf2e41485c608a01038f207c6636bf191cc824cbe9ce2fd02e247737e32904e5b89b2b88830af3daf024d8da8d5fbf7521e1005c
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec