Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-05-2024 17:39
General
-
Target
b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe
-
Size
1.8MB
-
MD5
9d7e95b132835b099f4b00cae7863e2d
-
SHA1
9e59088cfaa673241a49dbdfbb7f1b0462cb5da7
-
SHA256
b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca
-
SHA512
ddfe237647bf44ef7a925de439eb55385696fdb5b15dde539f3cfe18122305149f9dc2b6a463f5948934e0d852c29706b74fac5781d125e0ccba30a3b1b490fe
-
SSDEEP
24576:fU0Hb8WCzvwyS2LzpLQNUbz/xkTbl37a5qFXM5s4GplYx2uqYVKEsX/B/q:fVQwyS2L+NUfJUGqVM542xC/q
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
risepro
147.45.47.93:58709
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/3464-434-0x0000025CC0C50000-0x0000025CC4548000-memory.dmp family_zgrat_v1 behavioral2/memory/3464-444-0x0000025CDED40000-0x0000025CDEE50000-memory.dmp family_zgrat_v1 behavioral2/memory/3464-448-0x0000025CDEBB0000-0x0000025CDEBD4000-memory.dmp family_zgrat_v1 -
Glupteba payload 1 IoCs
resource yara_rule behavioral2/memory/2260-418-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 62fa75c398.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 36 3896 rundll32.exe 42 2928 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4660 netsh.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 62fa75c398.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 62fa75c398.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe -
Executes dropped EXE 22 IoCs
pid Process 4680 explorta.exe 4100 amert.exe 3832 explorha.exe 648 62fa75c398.exe 2492 NewB.exe 472 ISetup8.exe 3624 toolspub1.exe 2260 4767d2e713f2021e8fe856e3ea638b58.exe 3324 22806c8add.exe 1320 explorha.exe 888 explorta.exe 4888 NewB.exe 1704 ud4.0.exe 904 ud4.1.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 4996 csrss.exe 2416 explorha.exe 4960 explorta.exe 4940 NewB.exe 2816 injector.exe 2436 windefender.exe 900 windefender.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorha.exe -
Loads dropped DLL 5 IoCs
pid Process 3880 rundll32.exe 3896 rundll32.exe 2928 rundll32.exe 1704 ud4.0.exe 1704 ud4.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3200-1-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-2-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-0-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-6-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-7-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-8-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-4-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-5-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/3200-3-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/files/0x000100000002a9ed-18.dat themida behavioral2/memory/4680-22-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-23-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-28-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-30-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-29-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-27-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-26-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-24-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4680-25-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/3200-21-0x00000000001D0000-0x0000000000728000-memory.dmp themida behavioral2/memory/4680-49-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/files/0x000100000002a9f2-69.dat themida behavioral2/memory/648-83-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-86-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-87-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-85-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-84-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-90-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-91-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-89-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/648-88-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/4680-149-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/648-253-0x00000000008F0000-0x0000000000F7A000-memory.dmp themida behavioral2/memory/4680-266-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-288-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-289-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-290-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-294-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-292-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-293-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-291-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-287-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/888-308-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4960-657-0x00000000003F0000-0x0000000000948000-memory.dmp themida behavioral2/memory/4960-664-0x00000000003F0000-0x0000000000948000-memory.dmp themida -
resource yara_rule behavioral2/files/0x000400000002aa4d-743.dat upx behavioral2/memory/2436-745-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/900-748-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2436-750-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/900-763-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\62fa75c398.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\62fa75c398.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\22806c8add.exe = "C:\\Users\\Admin\\1000021002\\22806c8add.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 62fa75c398.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000100000002a9fc-172.dat autoit_exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4100 amert.exe 3832 explorha.exe 1320 explorha.exe 2416 explorha.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe File created C:\Windows\Tasks\explorha.job amert.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2180 sc.exe -
pid Process 1588 powershell.exe 904 powershell.exe 3400 powershell.exe 4056 powershell.exe 2728 powershell.exe 4712 powershell.exe 488 powershell.exe 3676 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3680 472 WerFault.exe 89 1976 3624 WerFault.exe 90 2972 1704 WerFault.exe 118 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ud4.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ud4.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ud4.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ud4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ud4.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1720 schtasks.exe 1524 schtasks.exe 664 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133594043953516224" chrome.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4100 amert.exe 4100 amert.exe 3832 explorha.exe 3832 explorha.exe 4176 chrome.exe 4176 chrome.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe 904 powershell.exe 904 powershell.exe 904 powershell.exe 1320 explorha.exe 1320 explorha.exe 3400 powershell.exe 3400 powershell.exe 3400 powershell.exe 2260 4767d2e713f2021e8fe856e3ea638b58.exe 2260 4767d2e713f2021e8fe856e3ea638b58.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1704 ud4.0.exe 1704 ud4.0.exe 4056 powershell.exe 4056 powershell.exe 4056 powershell.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 1788 4767d2e713f2021e8fe856e3ea638b58.exe 2728 powershell.exe 2728 powershell.exe 2728 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeDebugPrivilege 904 powershell.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeDebugPrivilege 3400 powershell.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 3324 22806c8add.exe 4176 chrome.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 904 ud4.1.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 3324 22806c8add.exe 904 ud4.1.exe 904 ud4.1.exe 904 ud4.1.exe 904 ud4.1.exe 904 ud4.1.exe 904 ud4.1.exe 904 ud4.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4680 3200 b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe 81 PID 3200 wrote to memory of 4680 3200 b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe 81 PID 3200 wrote to memory of 4680 3200 b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe 81 PID 4680 wrote to memory of 2672 4680 explorta.exe 82 PID 4680 wrote to memory of 2672 4680 explorta.exe 82 PID 4680 wrote to memory of 2672 4680 explorta.exe 82 PID 4680 wrote to memory of 4100 4680 explorta.exe 83 PID 4680 wrote to memory of 4100 4680 explorta.exe 83 PID 4680 wrote to memory of 4100 4680 explorta.exe 83 PID 4100 wrote to memory of 3832 4100 amert.exe 84 PID 4100 wrote to memory of 3832 4100 amert.exe 84 PID 4100 wrote to memory of 3832 4100 amert.exe 84 PID 4680 wrote to memory of 648 4680 explorta.exe 85 PID 4680 wrote to memory of 648 4680 explorta.exe 85 PID 4680 wrote to memory of 648 4680 explorta.exe 85 PID 3832 wrote to memory of 2492 3832 explorha.exe 86 PID 3832 wrote to memory of 2492 3832 explorha.exe 86 PID 3832 wrote to memory of 2492 3832 explorha.exe 86 PID 2492 wrote to memory of 1720 2492 NewB.exe 87 PID 2492 wrote to memory of 1720 2492 NewB.exe 87 PID 2492 wrote to memory of 1720 2492 NewB.exe 87 PID 2492 wrote to memory of 472 2492 NewB.exe 89 PID 2492 wrote to memory of 472 2492 NewB.exe 89 PID 2492 wrote to memory of 472 2492 NewB.exe 89 PID 2492 wrote to memory of 3624 2492 NewB.exe 90 PID 2492 wrote to memory of 3624 2492 NewB.exe 90 PID 2492 wrote to memory of 3624 2492 NewB.exe 90 PID 2492 wrote to memory of 2260 2492 NewB.exe 91 PID 2492 wrote to memory of 2260 2492 NewB.exe 91 PID 2492 wrote to memory of 2260 2492 NewB.exe 91 PID 4680 wrote to memory of 3324 4680 explorta.exe 92 PID 4680 wrote to memory of 3324 4680 explorta.exe 92 PID 4680 wrote to memory of 3324 4680 explorta.exe 92 PID 3324 wrote to memory of 4176 3324 22806c8add.exe 93 PID 3324 wrote to memory of 4176 3324 22806c8add.exe 93 PID 4176 wrote to memory of 684 4176 chrome.exe 96 PID 4176 wrote to memory of 684 4176 chrome.exe 96 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 PID 4176 wrote to memory of 1752 4176 chrome.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe"C:\Users\Admin\AppData\Local\Temp\b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe" /F6⤵
- Creates scheduled task(s)
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\1000238001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000238001\ISetup8.exe"6⤵
- Executes dropped EXE
PID:472 -
C:\Users\Admin\AppData\Local\Temp\ud4.0.exe"C:\Users\Admin\AppData\Local\Temp\ud4.0.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 22888⤵
- Program crash
PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\ud4.1.exe"C:\Users\Admin\AppData\Local\Temp\ud4.1.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:904 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD18⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 15127⤵
- Program crash
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000239001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000239001\toolspub1.exe"6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 3847⤵
- Program crash
PID:1976
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000240001\4767d2e713f2021e8fe856e3ea638b58.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"8⤵PID:240
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes9⤵
- Modifies Windows Firewall
PID:4660
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:4712
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:4996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:488
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F9⤵
- Creates scheduled task(s)
PID:1524
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f9⤵PID:340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:3676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile9⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll9⤵
- Executes dropped EXE
PID:2816
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F9⤵
- Creates scheduled task(s)
PID:664
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"9⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)10⤵PID:2260
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)11⤵
- Launches sc.exe
PID:2180
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Loads dropped DLL
PID:3880 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3896 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:1284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\230210488309_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\62fa75c398.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\62fa75c398.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:648
-
-
C:\Users\Admin\1000021002\22806c8add.exe"C:\Users\Admin\1000021002\22806c8add.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa9709ab58,0x7ffa9709ab68,0x7ffa9709ab785⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:25⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:85⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:85⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:15⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:15⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4228 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:15⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3300 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:85⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:85⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:85⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1752,i,13479157654934174423,6344033403058095006,131072 /prefetch:25⤵PID:920
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:888
-
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe1⤵
- Executes dropped EXE
PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 472 -ip 4721⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3624 -ip 36241⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1704 -ip 17041⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2416
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4960
-
C:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000088001\NewB.exe1⤵
- Executes dropped EXE
PID:4940
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD532ab440296dc6cf4c1fb3225455193b5
SHA13303070666889e955de30fdf1dd87dff635fbada
SHA256f3581a978c12debc01d7afc4601e2a3c82171896c893da133eb19d75c74cba06
SHA51213fd4db1269c37c0d2b5614d75ac82ecd4316123e73c6306ccca36748c010539042987cd0650bcbe0f56e5f953deb0c628514b5430cd09c05d03b4bb4859ba4b
-
Filesize
240B
MD570fdd7069c60df526a069cad83e1a0a1
SHA1957113fd2990bb6fed4f9bedb9f9a5763c62c21b
SHA256a8652c76717b04b42ed96071ef1c76ed25032ce89f2afcf5685c34838827262b
SHA512c169703da8c56d12c643fecc3397e3b67f07626221be64b8231081a0fdf122b926abb86f91c7d84471b6bc03d97ff3eb08478ca767342763ad02474910ff3088
-
Filesize
152KB
MD5222c50e321af234fed0246b9eb9c7bad
SHA12acee73a9d81e4851c0bda82b3bada5bb46c6fb5
SHA256c5fe7916103f478d546501339b8a9aba77fc32bcdd679fc01acbaa04c2af9d09
SHA512d4ea938922e3004e6a6eae6e99b8a0561446aa824e7a1fe0bff644b5f0842d170ebe9af42e5c906a7e1d0f453e6bee6811a9054b09d4fd111d70e484636132f0
-
Filesize
20KB
MD579e2c6bd3a036b20b0bcad89ea316b7e
SHA10ef35e704b5b6050366ee1f1f2d60db69979a064
SHA2565e0a380b87225b93cbc935de6d129e270ccf111a71f9f3f2baa0382dbf98ab3e
SHA5129863698230794b5ca2d3fe980973316d135d09d59c14140acbddaaea6f09b22052aa6350caf5883cbb96d8e6df6af2d1d686974dcd07a61497c4c68c3afe4209
-
Filesize
2KB
MD58dd8efc065765620261431a7eb1eea3d
SHA144267654da5f940c3ac571179a812a878dd12770
SHA25660a81bac1472d4b0e1ad8ffdbc46c60a13290985546b6ca0d58981df4415d31a
SHA51229de833e82f54bcb3efbd0e63bba138106c32ad4e0635a910221017d59ff8aee98a9e81611ca1b5fb1a1a2bf1082bc450f4de8bd52fe4a4a34baee2e125a2422
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5f1969df50b4534fde755bfb1208b1450
SHA15cc982753406da46aecd4c210dbcdc4bee969a56
SHA256d92774a5d090f5cf90b981730a9e8911dc9eb9012ebbf11180a7e1b88d3290e3
SHA51224f9cc9cb5ef622fb80d1c59346b8ba248d1b9732366dd859b77eaea50e6f87e9f317620e2bc7f4be299d76b0eb33a0bc82d9f2accddb2cabb9f574d532b7a21
-
Filesize
7KB
MD5a6a9561e6c1a185f5e10557e7183a2d1
SHA199c48104d073b684aa84c495ee5359c130607b99
SHA2568db28fbc44546b8040f1cd5c4767360daf9cea4c7606f15fbc1a2aaac077025b
SHA512c4e55dd52b9132c59ab1f24f6f69fe170cfff0c8e9499bd9eb7df1eb0058daa3d21340a4e3c7fc602b7a81e35e86de37e6c1960c5736bd0c99d8dcf83c208c1a
-
Filesize
16KB
MD5e7de056c45ced6a825e3103463a22074
SHA1f5ce4d4cab916315a1885c35618fcc1b8c5fca36
SHA2562d737834deaa6ced0e69338d277c2da954bdb4a5751bdb2d830c67ea3fde0044
SHA512f0ade7b3e66651a1c6396d934459309a745c1532794065e0ac1fceb901b8fdc2d5fa22115e6abe1e83b20c95a5435a2a620e520cdf2f8b9011c595f053a49647
-
Filesize
255KB
MD54c497bcf8ee1f111171504d919a56755
SHA11b9fc824b105dc3b5b6d6d57b673fcb0dcc764af
SHA256b8b03f510d5842b5d5c38ccc8d082666173125d54c4efb6c38cebfcb4e548d62
SHA5123b1c4c3612953394ab284192b334457519c8ff87db9fc4c990f99599330958194ce57196972732a51292bd54c64f84f85374a199f71d52a96f61c2fc7c80fa9e
-
Filesize
1.8MB
MD51b4beb207b9755c5ccd02b6d90e5dc43
SHA1d3d79d432e40c5863f1a3f0369ee03a76f0d5b1e
SHA256db6d324db3cab13f7325d7e64de470b2b10a6932ee0e75b35fab279ea042ed08
SHA51213df414d3e078562393b65e3b9dc56e533ea4067f81a12d6fcbd4321269973e84c14c2d67e6ad6a0ea38e990c765aa1c35916047658ddcecb3a1f4216b207dd1
-
Filesize
2.2MB
MD5a3fbdcd77e5f53ce812e36b5c180f50b
SHA16658412ff76c6ecbbf410780c778364f16245e00
SHA2565374c5fed1ccff19c612321900c6b3723f5497b5ec6d62478bd4b814fe2cd0be
SHA51286b873b8158e736abee42ac1edefd37419e9de71118e7514087e2993c0e899b21e70b742603fe4481279a72b10f2ff775bf099c7d72f27913bfcadb1ba856079
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
406KB
MD58c119343e6bf0180eebef7023c6dd30a
SHA1edd4dbb9fe569cdf6bd427c4397005876ccca575
SHA256f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d
SHA5124e890229827cf489b0fbc917a688bba239e635e6a53f05b3c55186bd564f06d0e71bde53311be312056fb4382c7c623cc0eb0326aa66f579a68aecf46c2c6c8d
-
Filesize
245KB
MD5eab8a9b818ef4e23bd92d7420ee33b77
SHA1f4751ca6ff4d24c3bfada9ad043835a27f04d2f5
SHA256130ef444d7e6cd446c98932ce64ec44b56653258965cea4180baba5b570e4b75
SHA512ce77e817741e460aa813d4efe1750f24f149bb4f7df23a06b7986c4ef09dc5303d0e0585928b78bf2b12dfa76a93f5bc8873fa03c8febe82b9c960ad41d1ff9f
-
Filesize
4.2MB
MD57ed0b5eeaf34416b080419f50f9bdf72
SHA1734fe1331117f6ffa209e82b54eaa6e56f98594c
SHA256f795392cec75639bd25fc5a9b536e837a056dd68ab476c664208cd2cd1b93f38
SHA512ac573ebf859d70a075b91ecf863275dc18f15aeb2d75b20d6ec33ff070fe612215647cbe96c527b2a3c054a23bbde206fb57e786c64ff799a00dc6319049ac96
-
Filesize
1.8MB
MD59d7e95b132835b099f4b00cae7863e2d
SHA19e59088cfaa673241a49dbdfbb7f1b0462cb5da7
SHA256b57f0f54d65712e116d7fdbd77a6c2bf1c6f871df16453571b8499c0312604ca
SHA512ddfe237647bf44ef7a925de439eb55385696fdb5b15dde539f3cfe18122305149f9dc2b6a463f5948934e0d852c29706b74fac5781d125e0ccba30a3b1b490fe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5f3c3d86da12da80641e09bc9af326b79
SHA1614b44fca3befdee321f2859a9ef652b7eb9606a
SHA2567211e8f3ae15fadf3bdf47798dc45327edfdd147e28020652278ffd50fb30205
SHA512bd54099e73e99136b6af7889a50853629486371bb705bb4f3f29c8fe982364c5ee68748181c175981e07b373591de79d3949fc83facc0be08f974116d03c4519
-
Filesize
275KB
MD5741f4fea03733d88a053a34f5f99f85f
SHA1e7bece4b05fcd0df660ba0a043c3bd57dde078a3
SHA256d1b502639e81960fb96040c544be3f66fa19f0a7ff4cfff874f7375ab851f6bc
SHA512371070b856d0377c8d09eef20166376b9ac6bdd58b976882ed81e2d84609fa54f896e896b8dfe7434eba399af0a8a32d6290523e466d55eb2651517049dcc298
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50c42220ccc0f6f2aca6f6a5285739011
SHA1ec2d299a4792c0fdf00669cdfced0cde011914c5
SHA256ce1764ea054fff9a12c0be5ac41e340fb9e0218ca55ccb78b81bd9dd43a59962
SHA5124bf8b3aabf52eb60e55d2fa7e97edac081e5e96de3a80e9c504529e994a5f74779141b318c267bc6bb195ce107d882c10094935f3f82cc2fd8c9bdeb41fe3f73
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e1c558388ccd1f5d5085a4c8b556febf
SHA1de3206f8de0531a51819f2f2137597ebddb27742
SHA25689692a52544cbc15021048861994a90ec060d8c419aab6c652c58b44d2fc0f5e
SHA5126eaa8991c996bc11e9b4bdbd27dc8b5d75135573fc9cb9cd3072bc38a975a9e14f6d05e7e7ef8b8a00e543c1aac348f8d7fd74f0a59033f6b62c4c9540126e4b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD514213df935c28e82634f7ffd5e5d8be3
SHA1b44d43d3013487012f710854d3c4f4f3b8b886e5
SHA25650fe522a5fa0a17f2f8921d46c0b92065378ec3880b260a754aea9d537ccc3c3
SHA512124392a235882d87bf1c4afdbfc66c2a713a77ec11c3c1116562b19058d09adbbd27ef8ccb424a1e6efa57f39bb7541e78a22bb7a4151424069352defbb2364e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a8fd4b30a0774c633ceb134c5291abfc
SHA10bc608eccd4f5ca075d543ddb9e35cb51ce1bb90
SHA2569186f46adf0191da0cbdfde9e8a819cf089166b68df2784a4b20027bb4ec2436
SHA5129c6a1aa2e39eea20efc90016b36033a2bbcbeb5d42efb084a7ae82bc75daea44c00852f049c8b361a62ab18b764216f9a7090b24fcea9c19e3172b87bda89160
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dca924e952a2fcd4c6166aeddf053673
SHA1db81e9a182a4238c9615c17309459d95f6527f22
SHA2569647fe60660c42837d6c7a788d06f4c963283cade94eda546945cd2fc95954bb
SHA5129981861236857dc9dc10d6eecabb44da21168a0263443450716009db017f80ccaebc05ce4191a7e75bee06d0f77b37f4550a769cbc6e42b8ada6b776aac42954
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec