Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 17:39
General
-
Target
b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe
-
Size
1.8MB
-
MD5
9d7e95b132835b099f4b00cae7863e2d
-
SHA1
9e59088cfaa673241a49dbdfbb7f1b0462cb5da7
-
SHA256
b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca
-
SHA512
ddfe237647bf44ef7a925de439eb55385696fdb5b15dde539f3cfe18122305149f9dc2b6a463f5948934e0d852c29706b74fac5781d125e0ccba30a3b1b490fe
-
SSDEEP
24576:fU0Hb8WCzvwyS2LzpLQNUbz/xkTbl37a5qFXM5s4GplYx2uqYVKEsX/B/q:fVQwyS2L+NUfJUGqVM542xC/q
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
risepro
147.45.47.93:58709
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/5476-498-0x000001FEA4460000-0x000001FEA7D58000-memory.dmp family_zgrat_v1 behavioral1/memory/5476-499-0x000001FEC2600000-0x000001FEC2710000-memory.dmp family_zgrat_v1 behavioral1/memory/5476-504-0x000001FEC2540000-0x000001FEC2564000-memory.dmp family_zgrat_v1 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b8d2068480.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 103 3612 rundll32.exe 107 5900 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1064 netsh.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b8d2068480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b8d2068480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 04daae2ed3.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation ISetup8.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation u3mc.1.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation explorta.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation amert.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation explorha.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation NewB.exe -
Executes dropped EXE 21 IoCs
pid Process 3156 explorta.exe 2956 explorta.exe 3536 amert.exe 3436 explorha.exe 3564 b8d2068480.exe 4020 NewB.exe 1880 04daae2ed3.exe 4692 ISetup8.exe 3032 toolspub1.exe 4656 4767d2e713f2021e8fe856e3ea638b58.exe 5284 explorha.exe 5276 explorta.exe 5556 NewB.exe 5260 u3mc.0.exe 5816 u3mc.1.exe 5312 4767d2e713f2021e8fe856e3ea638b58.exe 5412 explorta.exe 5336 explorha.exe 5608 NewB.exe 5508 csrss.exe 4472 injector.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Software\Wine explorta.exe -
Loads dropped DLL 5 IoCs
pid Process 4712 rundll32.exe 3612 rundll32.exe 5900 rundll32.exe 5260 u3mc.0.exe 5260 u3mc.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2912-1-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-2-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-0-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-4-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-6-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-8-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-7-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-5-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/2912-3-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/files/0x000a000000023bb3-14.dat themida behavioral1/memory/3156-22-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/2912-21-0x0000000000B00000-0x0000000001058000-memory.dmp themida behavioral1/memory/3156-25-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-28-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-30-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-29-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-27-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-26-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-24-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-23-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/2956-37-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3156-75-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/files/0x000d000000023a7b-103.dat themida behavioral1/memory/3156-118-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3564-117-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-127-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-128-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-133-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-134-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-132-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-131-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-130-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3564-129-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/3156-273-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/3564-274-0x00000000000F0000-0x000000000077A000-memory.dmp themida behavioral1/memory/5276-284-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/5276-283-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/5276-287-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/5276-303-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/5412-532-0x0000000000E00000-0x0000000001358000-memory.dmp themida behavioral1/memory/5412-546-0x0000000000E00000-0x0000000001358000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b8d2068480.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\b8d2068480.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\04daae2ed3.exe = "C:\\Users\\Admin\\1000021002\\04daae2ed3.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b8d2068480.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023bbc-146.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2956 explorta.exe 3536 amert.exe 3436 explorha.exe 5284 explorha.exe 5336 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3156 set thread context of 2956 3156 explorta.exe 95 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe File created C:\Windows\Tasks\explorha.job amert.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe -
pid Process 5812 powershell.exe 5992 powershell.exe 3228 powershell.exe 3220 powershell.exe 5232 powershell.exe 5488 powershell.exe 5724 powershell.exe 3312 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5624 3032 WerFault.exe 116 5948 4692 WerFault.exe 106 4180 5260 WerFault.exe 139 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3mc.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3mc.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3mc.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3mc.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3mc.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4892 schtasks.exe 5212 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2956 explorta.exe 2956 explorta.exe 3536 amert.exe 3536 amert.exe 3436 explorha.exe 3436 explorha.exe 1868 chrome.exe 1868 chrome.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 5232 powershell.exe 5232 powershell.exe 5284 explorha.exe 5284 explorha.exe 5232 powershell.exe 5488 powershell.exe 5488 powershell.exe 5488 powershell.exe 4656 4767d2e713f2021e8fe856e3ea638b58.exe 4656 4767d2e713f2021e8fe856e3ea638b58.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5476 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 5336 explorha.exe 5336 explorha.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe 5260 u3mc.0.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeDebugPrivilege 5232 powershell.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1868 chrome.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 5816 u3mc.1.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 1880 04daae2ed3.exe 5816 u3mc.1.exe 5816 u3mc.1.exe 5816 u3mc.1.exe 5816 u3mc.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3156 2912 b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe 84 PID 2912 wrote to memory of 3156 2912 b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe 84 PID 2912 wrote to memory of 3156 2912 b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe 84 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 2956 3156 explorta.exe 95 PID 3156 wrote to memory of 3536 3156 explorta.exe 99 PID 3156 wrote to memory of 3536 3156 explorta.exe 99 PID 3156 wrote to memory of 3536 3156 explorta.exe 99 PID 3536 wrote to memory of 3436 3536 amert.exe 100 PID 3536 wrote to memory of 3436 3536 amert.exe 100 PID 3536 wrote to memory of 3436 3536 amert.exe 100 PID 3156 wrote to memory of 3564 3156 explorta.exe 101 PID 3156 wrote to memory of 3564 3156 explorta.exe 101 PID 3156 wrote to memory of 3564 3156 explorta.exe 101 PID 3436 wrote to memory of 4020 3436 explorha.exe 102 PID 3436 wrote to memory of 4020 3436 explorha.exe 102 PID 3436 wrote to memory of 4020 3436 explorha.exe 102 PID 4020 wrote to memory of 4892 4020 NewB.exe 103 PID 4020 wrote to memory of 4892 4020 NewB.exe 103 PID 4020 wrote to memory of 4892 4020 NewB.exe 103 PID 3156 wrote to memory of 1880 3156 explorta.exe 105 PID 3156 wrote to memory of 1880 3156 explorta.exe 105 PID 3156 wrote to memory of 1880 3156 explorta.exe 105 PID 4020 wrote to memory of 4692 4020 NewB.exe 106 PID 4020 wrote to memory of 4692 4020 NewB.exe 106 PID 4020 wrote to memory of 4692 4020 NewB.exe 106 PID 1880 wrote to memory of 1868 1880 04daae2ed3.exe 107 PID 1880 wrote to memory of 1868 1880 04daae2ed3.exe 107 PID 1868 wrote to memory of 920 1868 chrome.exe 109 PID 1868 wrote to memory of 920 1868 chrome.exe 109 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 PID 1868 wrote to memory of 2632 1868 chrome.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe"C:\Users\Admin\AppData\Local\Temp\b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe" /F6⤵
- Creates scheduled task(s)
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\1000238001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000238001\ISetup8.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\u3mc.0.exe"C:\Users\Admin\AppData\Local\Temp\u3mc.0.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5260 -s 20168⤵
- Program crash
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3mc.1.exe"C:\Users\Admin\AppData\Local\Temp\u3mc.1.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5816 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD18⤵
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 12367⤵
- Program crash
PID:5948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000239001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000239001\toolspub1.exe"6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 3527⤵
- Program crash
PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:5724
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:4108
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵
- Modifies Windows Firewall
PID:1064
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:3312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:5812
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe8⤵
- Executes dropped EXE
PID:5508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:5992
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F9⤵
- Creates scheduled task(s)
PID:5212
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f9⤵PID:5484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:3228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll9⤵
- Executes dropped EXE
PID:4472
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Loads dropped DLL
PID:4712 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:3220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\775195409080_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5232
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\b8d2068480.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\b8d2068480.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3564
-
-
C:\Users\Admin\1000021002\04daae2ed3.exe"C:\Users\Admin\1000021002\04daae2ed3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff895eccc40,0x7ff895eccc4c,0x7ff895eccc585⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1848 /prefetch:25⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2236 /prefetch:35⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2452 /prefetch:85⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3176 /prefetch:15⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3220 /prefetch:15⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4516,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4704 /prefetch:85⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4716,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4548 /prefetch:85⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3744,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3772 /prefetch:35⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4668,i,6074276590802268951,18268907277608425798,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4896 /prefetch:85⤵
- Drops file in System32 directory
PID:3292
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5276
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5284
-
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe1⤵
- Executes dropped EXE
PID:5556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3032 -ip 30321⤵PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4692 -ip 46921⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5412
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5336
-
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe1⤵
- Executes dropped EXE
PID:5608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5260 -ip 52601⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD532ab440296dc6cf4c1fb3225455193b5
SHA13303070666889e955de30fdf1dd87dff635fbada
SHA256f3581a978c12debc01d7afc4601e2a3c82171896c893da133eb19d75c74cba06
SHA51213fd4db1269c37c0d2b5614d75ac82ecd4316123e73c6306ccca36748c010539042987cd0650bcbe0f56e5f953deb0c628514b5430cd09c05d03b4bb4859ba4b
-
Filesize
649B
MD589c9a90177de6cf3c16fe68b1f51ec66
SHA102e0f7b7904ade330632db0cd51df7ca672c477b
SHA256540bf18738268aa2562a274efd28c06b34f2c193b329bf5f7c856aec712f174e
SHA512b1464a3b9e68979c07c094065a9e4ed995f17de1acfde6fa5476f0f9f0ff07aad538837add289e8f18b0379e84c95b1ee6c78e0bb21b7366c568971f97df5c03
-
Filesize
44KB
MD5c1d24d8841afa38aabf38180f5e0fb12
SHA1911364a4a5a87a0e3ec20b207d846de7c807d92c
SHA2563ca988522f48cf863c709d141ad96694a5d8a6c45c319352b94c4eb9740028f4
SHA5129f2454b1e03f84b7d543fd75a229de8a8d35564d33f9746693777f37fee7184da12b376956d4114d5bce5ccff6c0e7fb4a3971c32912caf472a13c78984dc16e
-
Filesize
264KB
MD5653ed06e0ca2c7cedc698b57e3770312
SHA11b857913f2bcdf9c6f5d07d2fed8cd348bbdce34
SHA256da87fd66acc1e57bed28bf195c28fc4ea06a067a4a549a413ada254d8f7afe05
SHA512d353c55550f5f6c67fd0d76d19c3d70c7b23929b29d5d3831123506898f9671588449a2057bbacf9f59a905dd7fd1e9ba7179021ea3ed64e9147ebd3cd9bb91e
-
Filesize
1.0MB
MD5d8f2703f6942e0a3dfcb990826530c47
SHA10b813635e0d697d2da004463a09a6feaccc5e7d6
SHA256de2d8cb7f1f587ef76c7d18000e330f591cfe48e7e48b890b5c58ac7e1a3d579
SHA5128fe51f299e33e2cb955dd25fad304e523bef8b71562c3669c56e5a4619f67b9ca0027f88b8e4e0d20912a5349b9717130fdc280655b340ced287c7f58f4e8931
-
Filesize
4.0MB
MD5ebb62a712f670f830696563d1b9c93a5
SHA1333f20f18e7d60e6f0a5cc76258e77a0f3b238d2
SHA256625e369e2db168bdd5597434263da06fdc670e45edabe1df0c90ff89d434ecc6
SHA512cada0ad1c4e050ab918b804759184f7777a0d4bdc820ba44d13927ba520133a2b0bd0054cbb4cb1100e250b4c356d44348610d9d787a7bbf4f2ee7cf97f80b5a
-
Filesize
64KB
MD5dce76c24cfcf00027fef60583b84bd94
SHA19ecc2c5bf2df35ba4544d6da247ca3a99561352a
SHA2567f4439b335f44ac0fcff2b97596196260a6f7eda4e404d2c6f397c04737119db
SHA512273b48c28ab0b6127798402cb5c568047eb9c89536ff8c9c2896f695a41e4553efa757d0229f0cfa8e3d947ea76bfd57193dcf9c12bd4a1a65fdf408ace2ecd9
-
Filesize
32KB
MD517af549fe361b2cd9601d41055e860c0
SHA170722c8a36ef707dccbb1883556c3bcd9a0d0856
SHA256a99b0281b3ac482c043b91077caaf54b92fa6a993e01843611c4c8bd2d2983a0
SHA5122c9a2a6d99e6676c84e266c525dbe60d7b6c5e6c0879698883fbf71f114bdcb71e3f4be7e08d2be10a9ff776267ed51c141741e4e7f0e09ea3676ef188d8d6e3
-
Filesize
85KB
MD5738012a772d2365a3bce7e26fc89d0b5
SHA1b22ca0a5b9bdeab4728ce4e2f5cd0f97f8e0872e
SHA25665e2e699ac2cb73aa8cc66dddd0460a38f16eed473e4ce3a487c828b1cae6d43
SHA51247b7554071c4e80974ceb2b44ab9ee2e5dd520e0449bdc526f759a2f73f7c2dbc9317acb1241d6d59a81f3cd012095f818726a5cca245f2ab79802083ac1190d
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
36KB
MD5cbbb5585439fb87a279a9bd5e725f089
SHA176dd9614fc2a2fee100aae142335f3fa755fc034
SHA25608255d8744f3aa6f653286ba6071b83b9bcaf0f11c2386bf7a1ece7ee49195cb
SHA512367c9a05e6bf82ec8045460c55572a81ceace69c075e05818691644331f3adcd114cd194c242ccbcc3ca15a85aaf6fae955162ad016a2c32fe69e3a3c4bdf0e3
-
Filesize
264B
MD531cc070e26cdf867d7c2f030b4822f23
SHA1507f2736baf02952a64ef684fc1e1564ca1608cb
SHA256c1201aff17001a93048a50f61735eb93eb83981dfc32ec8f4bf8d39bec28914d
SHA5127d351071ff56a399680b0c78a907b5e849825dbbb9522940ab87227c12e98181458919844da243969ac78265ce5be1f385a37b8f1db8ad2d40aa5bb195ec5908
-
Filesize
160KB
MD515c9d01048a711e95a6ba2861575f492
SHA1d28227224fad9273c93b5dbbaf3919428c0a2676
SHA2564db5b6d52d9ac0c28790f0d0c554a2f8f1b12e41ff5fd74f6d5ba524fe5224db
SHA51200e72f84de8fc9fc871e73b832e1036da7852c49a48596302b9ebba8c997b7149d6e9471d2f2b138a463562dcf18854e76fcc9cba4cf5a880dca2c4be2afbf95
-
Filesize
20KB
MD5e81338a4a84a1bb051e7e262149e0a54
SHA1dd198866c5cc5c7091caf60d441c6320d47f6c3a
SHA2562f38692fb478854182892dfee6f414087c0eee8e8255fc0f35589390a75b655a
SHA51286ec810aeed62232022a581ac868b12b2e77c0d8ab94b0dd6bbfafa5b9be7958c396c09f7458547c1fa2f02e5c95e6e7ea61d5d86fe610ce07eda1fec210ba0b
-
Filesize
3KB
MD5069e076a56227aff8f694e65ca69076f
SHA14e42be0ed64abfa3929af0546dc1610cfacd473d
SHA2560f7f7ccb0d34edd89f08de0d85bb196a91eaa8c3b1a87b03d369ecfb9408eeb1
SHA51247210b80715f6a0278fce24c41a5ba3bd7b749d8853683303f24650242ec8e0434a473011f3d3258a88bf2697efea4f10baee35ec65e6e9894b89f9c3a1f2d42
-
Filesize
36KB
MD5ee6c1455054d0618a5146e66253a2fca
SHA16e3a9e50ff144d1cb5f29a5b293a36a21c491d9c
SHA256dfc91bf49b7b492757f0af01e4838277865aa12c7c809886606f907331528259
SHA512fd8e9d059bfd4e49098666de218349f4a7506455cdd964832dd2d7897c396ec1b1c659d58cf3c629bc1084a4282b31df3e98bdf591eac793c03fe2debd58b38a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD53fe6ba60f529f542b3b423164e86f78f
SHA14c3c4fdc6ef6d65185f95597d28b12c4516baf5e
SHA25638a7b998015e470be98c27bbfb6266fcb416cf9a4a0a2bc55e9335a36600e7a4
SHA512198cf38a5526440037b7cc27d3aae505bfc4d76f83601e747b4f0344a3eb9028fbbb6bef834632d46a7e7c18c0216b5ae62f764b6bf1367cb8c54b0551049ec7
-
Filesize
9KB
MD5520280e3831edd6cbca130904d61ea34
SHA14b10e3ee9f6b69b9f5b5cd5e043683c692d93f36
SHA256475319792d8610378135fa82daaf43c7b9710c59feed4b92fe16f730991478b2
SHA512e0cc1bd1b4a12354109addd6988bef90aed46e9140cc7179b127bb12812c678759d12c5e16226d405858020872246b1d4838ef816e7787d4a2a1bce5bcb00576
-
Filesize
9KB
MD5406e953aaa4540bab34cc9251de73372
SHA18b955c9ecd68cbd2974e51aeded5d152c36f87dd
SHA256b8e232ea001b2dbc52750b39179ecd15735e3eb5095895e87d7d1c8379937ff4
SHA512442d302df9f4565202ced8b64014e6f754f66dfe545b1a6b76a115c659aea3cf6af593f19afcd5b4217145d5326b39b3b06e952ea10a2dc794152f45e7819b7a
-
Filesize
9KB
MD568c6c8eb0b35aae8dc52fae3c65123d9
SHA112c7712dacfb84a468c315e92361d0c0b9852232
SHA256fa81fd41b910b5fe561581d4ab8eeaf57fedc9b8796268e3f1cd12ef31e425ce
SHA512c6f0e4a4d897c98008bf05aa5c244bd5c67c791a47a70859a99283b1c59da7cf50df51d0e95b29b14e4241b458d1ac400c167db37ac1a11a46c8aefa7e58720e
-
Filesize
9KB
MD57b731422e8b2558ee5fe1c2df39b6a02
SHA12b52f0e03f8018c7f80e054f994e5d3d98eebbab
SHA2563b2d57381b4defd0e1a00f5207b6769ab356ffee45fc96ebfbb87bd6c13c919d
SHA5127d4d37d7e74b346c5c5176c84fe93949a521244f97a81d990262e493993533b57a280ab2023f288d88583c1b9164d6e3dced785c46f94ddb07ad8ce234db9ad2
-
Filesize
9KB
MD52dc2e6dd618502ecf3b3d9b70cfbffb1
SHA1aa70142407f066c2cda2d93e3c1b55f9429bb05b
SHA2562795f884f927b06ce1c8b19215d361982cb7d6fef7019e3d3f73d0a63c70f78e
SHA51275c43140b1992ffa22eef6687bf20dee73222c6930b9b5a7ffb403852d077fd2d1699b6e679c0f2201f9852e2b1009e4167c5fbf9973ad7956b48163adbe0456
-
Filesize
9KB
MD5d6a83c4baa6e83d2f4b93c28ebb853e7
SHA1594bfe28de930379f3b9e8d343a26fffc5949f6c
SHA256b898d9aa3e4b7733690a7bea646fea70a885368f06c4abb6a6340df55c9fba83
SHA512ec3e5b884ac8b6abb146d0ccdb1484520f12ce480ed4d5f16f311bc2c666a66f8006c26ca8db5488e4ed52ac93943989b44569b9a8003015d7eff2f287887820
-
Filesize
9KB
MD5b8e55f0d088b8db08f777b89fe5fd9d4
SHA1aa79c149681a9055b3df38c75547aba02631b9cc
SHA25659431001719334b630104f0f7e0c3419ad8c8d3d44e4c6bd5e7b30a39958d1fe
SHA5125ec69edbf1f71e1afd9dce6fc71ff179fa826cb7222b2f6bab9ed4f196cdc48183f6026cec46256624d356f6f23c21f2284e2a2edb038f3012264c1dcdb0a281
-
Filesize
15KB
MD55d3137a586c4f18589c6b38c8ccafd3f
SHA1778bb10591a818ff53b8d6f1fb1f489b740373de
SHA25664de5a8e4f0ca80b2e87920d2d4ac6572236a2ec4f370ca8bff830b3defc75e1
SHA512add9fdc2b4c202d183e690bad5b3fcd8724eab2a1057d8cec19da282e4b72bc8d02491e781ac45053cb3a277c612bc94e3a3eb4bb68139444e22673b5e1e2462
-
Filesize
152KB
MD5b77ddaef740aba3326c45b0f984be679
SHA19297daff62f607002f1b61bc1e5ba14c0d3b6eb5
SHA25603965734d3d24d2fdb16ca0f28b28f360a62eacb7277116deda1b5de84d46c2b
SHA5128e5b241e4fcca5e69506cecc41189be325f71bfe087a8776d726b02b27e62c28ee68fdc483687723fc0c395b6c8995ea1ded5366ae08d0153fe1ebdd287537cb
-
Filesize
152KB
MD54826e969afcc4bda2d68f3c256007f24
SHA1fc52f078702709a9aecfd17964d7aef3150b13ee
SHA25687e96cecd274251535da6a81457d19bab005bc8c6b8dc0d9963cf28631ec8f8f
SHA512daf71dc7df98329b26db9c3b732f20475abfa7fdb86b6e8d3041797a6aee00d0e647746860cc2ee6ffdcb614818002cdfb284b3d4cae33f4a8472e60d795a3ae
-
Filesize
1.8MB
MD51b4beb207b9755c5ccd02b6d90e5dc43
SHA1d3d79d432e40c5863f1a3f0369ee03a76f0d5b1e
SHA256db6d324db3cab13f7325d7e64de470b2b10a6932ee0e75b35fab279ea042ed08
SHA51213df414d3e078562393b65e3b9dc56e533ea4067f81a12d6fcbd4321269973e84c14c2d67e6ad6a0ea38e990c765aa1c35916047658ddcecb3a1f4216b207dd1
-
Filesize
2.2MB
MD5a3fbdcd77e5f53ce812e36b5c180f50b
SHA16658412ff76c6ecbbf410780c778364f16245e00
SHA2565374c5fed1ccff19c612321900c6b3723f5497b5ec6d62478bd4b814fe2cd0be
SHA51286b873b8158e736abee42ac1edefd37419e9de71118e7514087e2993c0e899b21e70b742603fe4481279a72b10f2ff775bf099c7d72f27913bfcadb1ba856079
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
406KB
MD58c119343e6bf0180eebef7023c6dd30a
SHA1edd4dbb9fe569cdf6bd427c4397005876ccca575
SHA256f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d
SHA5124e890229827cf489b0fbc917a688bba239e635e6a53f05b3c55186bd564f06d0e71bde53311be312056fb4382c7c623cc0eb0326aa66f579a68aecf46c2c6c8d
-
Filesize
245KB
MD5eab8a9b818ef4e23bd92d7420ee33b77
SHA1f4751ca6ff4d24c3bfada9ad043835a27f04d2f5
SHA256130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75
SHA512ce77e817741e460aa813d4efe1750f24f149bb4f7df23a06b7986c4ef09dc5303d0e0585928b78bf2b12dfa76a93f5bc8873fa03c8febe82b9c960ad41d1ff9f
-
Filesize
4.2MB
MD57ed0b5eeaf34416b080419f50f9bdf72
SHA1734fe1331117f6ffa209e82b54eaa6e56f98594c
SHA256f795392cec75639bd25fc5a9b536e837a056dd68ab476c664208cd2cd1b93f38
SHA512ac573ebf859d70a075b91ecf863275dc18f15aeb2d75b20d6ec33ff070fe612215647cbe96c527b2a3c054a23bbde206fb57e786c64ff799a00dc6319049ac96
-
Filesize
1.8MB
MD59d7e95b132835b099f4b00cae7863e2d
SHA19e59088cfaa673241a49dbdfbb7f1b0462cb5da7
SHA256b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca
SHA512ddfe237647bf44ef7a925de439eb55385696fdb5b15dde539f3cfe18122305149f9dc2b6a463f5948934e0d852c29706b74fac5781d125e0ccba30a3b1b490fe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
275KB
MD5741f4fea03733d88a053a34f5f99f85f
SHA1e7bece4b05fcd0df660ba0a043c3bd57dde078a3
SHA256d1b502639e81960fb96040c544be3f66fa19f0a7ff4cfff874f7375ab851f6bc
SHA512371070b856d0377c8d09eef20166376b9ac6bdd58b976882ed81e2d84609fa54f896e896b8dfe7434eba399af0a8a32d6290523e466d55eb2651517049dcc298
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58bb6bef9d71d06d0fd5e60a293ca832e
SHA125a3ac37c111eea89e02a3c9af7c1eb965b7f74d
SHA256c4599c1097f76b700e9f9e8082ea18b9a5971b5fec60565654f76920baedd8f0
SHA5122f7aa3fa33dfd78aa81c0f1a3bbdcd5cbf109e76aa1ea625109d6b03095e9c212668cde37ec4e4d8625bea0ab8d5f89d11ebbb529b6751eab0de46d81d3bef30