Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2023 18:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
252KB
-
MD5
57a97f8ec8b8a6efc1f4db6aac6c5169
-
SHA1
f75ea3862f7dc27710c1034771e23a439ddc0780
-
SHA256
4cf59b40ea20ed9a21d5a44d8cba91143803f0f4757f2dfcf1b017e6a4475c41
-
SHA512
3d1a51ef3209987d15f2dff53ccfbe33649f406c7815f4ced7caf5d97f099fc1b92d2f358e1ef486c3220b05c4c454cdb65cd861de0aece6e4406d7c9b955958
-
SSDEEP
3072:aBv0hQt7JFiZ5KKrbWe6CQiymCp6XQudz7i7r:aWCt7JP7CQiymw2dd/8
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/raud/get.php
http://zexeq.com/lancer/get.php
-
extension
.ooza
-
offline_id
dhL6XvokZotUzL67Na5WfNIBufODsob7eYc3mzt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-XA1LckrLRP Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0785Okhu
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
smokeloader
pub1
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3880-166-0x0000000003570000-0x00000000036A1000-memory.dmp family_fabookie behavioral2/memory/3880-210-0x0000000003570000-0x00000000036A1000-memory.dmp family_fabookie -
Detected Djvu ransomware 26 IoCs
resource yara_rule behavioral2/memory/4628-17-0x00000000024F0000-0x000000000260B000-memory.dmp family_djvu behavioral2/memory/4312-21-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4312-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4312-25-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4312-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4312-62-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3804-68-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3804-69-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3804-71-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1856-129-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2860-127-0x00000000024B0000-0x00000000025CB000-memory.dmp family_djvu behavioral2/memory/1856-126-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1856-133-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1856-142-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/740-159-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/740-161-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/740-167-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1856-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4660-180-0x0000000002280000-0x0000000002317000-memory.dmp family_djvu behavioral2/memory/2904-190-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2904-194-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2904-187-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/740-197-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3936-206-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3936-207-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3936-209-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/4628-174-0x0000000002C00000-0x0000000002C0D000-memory.dmp family_lgoogloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 4 IoCs
resource yara_rule behavioral2/memory/3536-131-0x0000000002DA0000-0x000000000368B000-memory.dmp family_glupteba behavioral2/memory/3536-132-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3536-202-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3536-184-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1116 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation C6AB.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation D9E8.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation E1AB.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation EBC0.exe -
Executes dropped EXE 29 IoCs
pid Process 4628 C6AB.exe 3380 C881.exe 4312 C6AB.exe 4492 C9F9.exe 2144 C6AB.exe 3804 C6AB.exe 800 D9E8.exe 3880 aafg31.exe 3252 DC6A.exe 1224 toolspub2.exe 3536 31839b57a4f11171d6abc8bbc4451ee4.exe 2860 E1AB.exe 5100 E575.exe 1856 E1AB.exe 2172 EBC0.exe 3500 F0A3.exe 740 EBC0.exe 4660 E1AB.exe 2904 E1AB.exe 3916 EBC0.exe 3936 EBC0.exe 4396 toolspub2.exe 3864 31839b57a4f11171d6abc8bbc4451ee4.exe 3772 csrss.exe 112 injector.exe 1156 wehfuta 1680 vehfuta 3148 thhfuta 2380 thhfuta -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2448 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a1298600-1224-4480-aa4b-992224f35c0c\\C6AB.exe\" --AutoStart" C6AB.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 api.2ip.ua 67 api.2ip.ua 23 api.2ip.ua 24 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 4628 set thread context of 4312 4628 C6AB.exe 86 PID 2144 set thread context of 3804 2144 C6AB.exe 94 PID 2860 set thread context of 1856 2860 E1AB.exe 107 PID 2172 set thread context of 740 2172 EBC0.exe 113 PID 3500 set thread context of 4628 3500 F0A3.exe 111 PID 4660 set thread context of 2904 4660 E1AB.exe 115 PID 3252 set thread context of 1316 3252 DC6A.exe 116 PID 3916 set thread context of 3936 3916 EBC0.exe 120 PID 1224 set thread context of 4396 1224 toolspub2.exe 123 PID 3148 set thread context of 2380 3148 thhfuta 159 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1156 3804 WerFault.exe 94 3732 2904 WerFault.exe 115 2224 3936 WerFault.exe 120 1532 1680 WerFault.exe 154 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E575.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wehfuta Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wehfuta Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E575.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wehfuta -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 schtasks.exe 4228 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4308 file.exe 4308 file.exe 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found 2812 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4308 file.exe 5100 E575.exe 4396 toolspub2.exe 1156 wehfuta -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeDebugPrivilege 3380 C881.exe Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeDebugPrivilege 4492 C9F9.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 1316 AppLaunch.exe Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeShutdownPrivilege 2812 Process not Found Token: SeCreatePagefilePrivilege 2812 Process not Found Token: SeDebugPrivilege 3536 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 3536 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4628 2812 Process not Found 83 PID 2812 wrote to memory of 4628 2812 Process not Found 83 PID 2812 wrote to memory of 4628 2812 Process not Found 83 PID 2812 wrote to memory of 3380 2812 Process not Found 84 PID 2812 wrote to memory of 3380 2812 Process not Found 84 PID 2812 wrote to memory of 3380 2812 Process not Found 84 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 4628 wrote to memory of 4312 4628 C6AB.exe 86 PID 2812 wrote to memory of 4492 2812 Process not Found 88 PID 2812 wrote to memory of 4492 2812 Process not Found 88 PID 2812 wrote to memory of 4492 2812 Process not Found 88 PID 4312 wrote to memory of 2448 4312 C6AB.exe 89 PID 4312 wrote to memory of 2448 4312 C6AB.exe 89 PID 4312 wrote to memory of 2448 4312 C6AB.exe 89 PID 4312 wrote to memory of 2144 4312 C6AB.exe 92 PID 4312 wrote to memory of 2144 4312 C6AB.exe 92 PID 4312 wrote to memory of 2144 4312 C6AB.exe 92 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2144 wrote to memory of 3804 2144 C6AB.exe 94 PID 2812 wrote to memory of 800 2812 Process not Found 95 PID 2812 wrote to memory of 800 2812 Process not Found 95 PID 2812 wrote to memory of 800 2812 Process not Found 95 PID 800 wrote to memory of 3880 800 D9E8.exe 97 PID 800 wrote to memory of 3880 800 D9E8.exe 97 PID 2812 wrote to memory of 3252 2812 Process not Found 102 PID 2812 wrote to memory of 3252 2812 Process not Found 102 PID 2812 wrote to memory of 3252 2812 Process not Found 102 PID 800 wrote to memory of 1224 800 D9E8.exe 101 PID 800 wrote to memory of 1224 800 D9E8.exe 101 PID 800 wrote to memory of 1224 800 D9E8.exe 101 PID 800 wrote to memory of 3536 800 D9E8.exe 103 PID 800 wrote to memory of 3536 800 D9E8.exe 103 PID 800 wrote to memory of 3536 800 D9E8.exe 103 PID 2812 wrote to memory of 2860 2812 Process not Found 104 PID 2812 wrote to memory of 2860 2812 Process not Found 104 PID 2812 wrote to memory of 2860 2812 Process not Found 104 PID 2812 wrote to memory of 5100 2812 Process not Found 106 PID 2812 wrote to memory of 5100 2812 Process not Found 106 PID 2812 wrote to memory of 5100 2812 Process not Found 106 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 PID 2860 wrote to memory of 1856 2860 E1AB.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4308
-
C:\Users\Admin\AppData\Local\Temp\C6AB.exeC:\Users\Admin\AppData\Local\Temp\C6AB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\C6AB.exeC:\Users\Admin\AppData\Local\Temp\C6AB.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a1298600-1224-4480-aa4b-992224f35c0c" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\C6AB.exe"C:\Users\Admin\AppData\Local\Temp\C6AB.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\C6AB.exe"C:\Users\Admin\AppData\Local\Temp\C6AB.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 5685⤵
- Program crash
PID:1156
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C881.exeC:\Users\Admin\AppData\Local\Temp\C881.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
C:\Users\Admin\AppData\Local\Temp\C9F9.exeC:\Users\Admin\AppData\Local\Temp\C9F9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Users\Admin\AppData\Local\Temp\D9E8.exeC:\Users\Admin\AppData\Local\Temp\D9E8.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2000
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:2884
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1116
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5112
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:3772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4424
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:112
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4228
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3804 -ip 38041⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\DC6A.exeC:\Users\Admin\AppData\Local\Temp\DC6A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\E1AB.exeC:\Users\Admin\AppData\Local\Temp\E1AB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\E1AB.exeC:\Users\Admin\AppData\Local\Temp\E1AB.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\E1AB.exe"C:\Users\Admin\AppData\Local\Temp\E1AB.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\E1AB.exe"C:\Users\Admin\AppData\Local\Temp\E1AB.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5685⤵
- Program crash
PID:3732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E575.exeC:\Users\Admin\AppData\Local\Temp\E575.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5100
-
C:\Users\Admin\AppData\Local\Temp\EBC0.exeC:\Users\Admin\AppData\Local\Temp\EBC0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\EBC0.exeC:\Users\Admin\AppData\Local\Temp\EBC0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\Temp\EBC0.exe"C:\Users\Admin\AppData\Local\Temp\EBC0.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\EBC0.exe"C:\Users\Admin\AppData\Local\Temp\EBC0.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 5685⤵
- Program crash
PID:2224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F0A3.exeC:\Users\Admin\AppData\Local\Temp\F0A3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:3760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2904 -ip 29041⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3936 -ip 39361⤵PID:1896
-
C:\Users\Admin\AppData\Roaming\vehfutaC:\Users\Admin\AppData\Roaming\vehfuta1⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 3442⤵
- Program crash
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\wehfutaC:\Users\Admin\AppData\Roaming\wehfuta1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1156
-
C:\Users\Admin\AppData\Roaming\thhfutaC:\Users\Admin\AppData\Roaming\thhfuta1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3148 -
C:\Users\Admin\AppData\Roaming\thhfutaC:\Users\Admin\AppData\Roaming\thhfuta2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1680 -ip 16801⤵PID:1060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5bcf9c82a8e06cd4dbc7c6f8166b03d62
SHA1aa072fd0adc30bc7d45952443a137972eaea0499
SHA25632b64ccb43add6147056e3f68bd46c762c8b38dea72735355fc422160a0f417d
SHA5127a26e9797da034f01a08a1b62e4e7e39de67526257d015a0ef7590968af690fecb1852a0f3ee05f64bbf571344eb74ef4d404d2f145f7e7dd36f6a21816ba4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5fa4ae5fcb44bfaf845b845961180d250
SHA18257ee68bdd2bc3ea2723eda7aeba404195d46bf
SHA256574c66c19561773196a88f115168cf5d73b71fd26f9034606fe38a5535d4df96
SHA512ad1de0c1d0f5a4a7e3615b48537f75250779368b388520b001d96367d5aa19fa88a9f471d1212e679ab9eaae854374445807877891bf1b803fa6c7886877d253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD56c74d107aa8449c0b0c0e7720e61fccf
SHA15ceee5695023e66ef76b86188588ac1ef9c378bf
SHA256d48df5b54485a5fb74700324a4a06ad2c855ef7d88d4cf3f904dc584fea90caf
SHA512a0189106a693310d79427c58dc9f842fb469d1b3f55c8041b7287f07e0712b41c66c67e9f2ed2f064fd588e19721caf49aa0c5a1332cae07c4937bf715af3547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD54a87853c2cfe8227c5afde79317ce940
SHA13f47b2add10c45cda16cea07cf6574b40c94efba
SHA256acfa4d6204c3cfbb2987898ca0a21ca2686e44ded725df1d850e8fbbf5a9dda4
SHA51246a15fb6ab00c416501ed57bc2e52142ad0164d426ebd43e7ae1b2f8fda2555f5db0d32efb72e1ef072135d27cb5b407e6c57511dcb2f1f4c89b71955b6e2df9
-
Filesize
2KB
MD50eab9cbc81b630365ed87e70a3bcf348
SHA1d6ce2097af6c58fe41f98e1b0f9c264aa552d253
SHA256e8f1178d92ce896b5f45c707050c3e84527db102bc3687e1e7208dbd34cd7685
SHA5121417409eee83f2c8d4a15f843374c826cc2250e23dc4d46648643d02bfbf8c463d6aa8b43274bf68be1e780f81d506948bf84903a7a1044b46b12813d67c9498
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
261KB
MD5eda1b6f6e01f038267413b3ae9d3eb23
SHA16e71d68c3496b513ba4f1b924fd46ddfdfb2c305
SHA2567c34d3d22db889dfe3f1ab7e5810a04436330824da5a8fdecc03a987876d66da
SHA512420b4cda1ab0ce3293a4954283cb12c53882f50b5aa5f0921b1bd915257694508d79420cb680ba36ef88636bc479e98e054549ca67d17f0e63d8f38d384b0c30
-
Filesize
261KB
MD5eda1b6f6e01f038267413b3ae9d3eb23
SHA16e71d68c3496b513ba4f1b924fd46ddfdfb2c305
SHA2567c34d3d22db889dfe3f1ab7e5810a04436330824da5a8fdecc03a987876d66da
SHA512420b4cda1ab0ce3293a4954283cb12c53882f50b5aa5f0921b1bd915257694508d79420cb680ba36ef88636bc479e98e054549ca67d17f0e63d8f38d384b0c30
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
392KB
MD59b8f98a82c25b45bd760c346bab24bae
SHA1dc3f1171835599109ecf4d30acbe6bb987defa25
SHA25669324d05eecba291e456afdabe4c9030bc2aa54049ead553bb57664dd6fed0fd
SHA5125557e3b237c03165caa9dccba7aecc2029263b5736f33027e07fbff95cee4b93c508e12388398acd7b750637108ee63cbcb4a794ba6f6c9f88af9c850dd4c69b
-
Filesize
392KB
MD59b8f98a82c25b45bd760c346bab24bae
SHA1dc3f1171835599109ecf4d30acbe6bb987defa25
SHA25669324d05eecba291e456afdabe4c9030bc2aa54049ead553bb57664dd6fed0fd
SHA5125557e3b237c03165caa9dccba7aecc2029263b5736f33027e07fbff95cee4b93c508e12388398acd7b750637108ee63cbcb4a794ba6f6c9f88af9c850dd4c69b
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
785KB
MD53072823dbaed000b576999825ff648cf
SHA1ed56a4e46dbd0f07e9552c573eb6a59b40059574
SHA256745fa5b4fefcaa8f992d5f518a267dd2b2777fe60d727df48ef7b3502a17bbce
SHA512619a2ba810f269ff069a5362163bdfd52f12a2aaaf455d9834c5ca778477645d6b221c2b26c01f1be90fa03f2bc7cec70d45b3a26b2a4e7546070334d8452d47
-
Filesize
252KB
MD541ee253aa9a7a797263d778b794a5c0f
SHA1b8c52c18951ebcc5649db31d28da85df05adade9
SHA25604a9d3c56fcdf0ab534f7db5e5083b57d1cbc9dfa7fe0c1d5cdc1e0e08513749
SHA5123ead0118cc00de363e86220293018065a726ec1ef8ee2901aa7998fd7184fc89fe1d98b973f2df37f2150231d5bcff8ebbb89e15e4ed80f3a8b0192f20be79de
-
Filesize
252KB
MD541ee253aa9a7a797263d778b794a5c0f
SHA1b8c52c18951ebcc5649db31d28da85df05adade9
SHA25604a9d3c56fcdf0ab534f7db5e5083b57d1cbc9dfa7fe0c1d5cdc1e0e08513749
SHA5123ead0118cc00de363e86220293018065a726ec1ef8ee2901aa7998fd7184fc89fe1d98b973f2df37f2150231d5bcff8ebbb89e15e4ed80f3a8b0192f20be79de
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
2.0MB
MD5ff7712b5d2dcafd6b9c775eecc8266a1
SHA1a11c9bd80f1c80f057517fc555fcf9b53c327302
SHA25651d0be1366d229621051abb5df81316256c997c46265be8c9fb6b6b01fd1ccb1
SHA512a8dbf46d54d80dd206c61007c668bd93a00a4d8b35937cfdf1b723d69484bc6230763a0cd73b602e58392a0b6814c8143877b479709fd6ab03ea98eda61c0edf
-
Filesize
2.0MB
MD5ff7712b5d2dcafd6b9c775eecc8266a1
SHA1a11c9bd80f1c80f057517fc555fcf9b53c327302
SHA25651d0be1366d229621051abb5df81316256c997c46265be8c9fb6b6b01fd1ccb1
SHA512a8dbf46d54d80dd206c61007c668bd93a00a4d8b35937cfdf1b723d69484bc6230763a0cd73b602e58392a0b6814c8143877b479709fd6ab03ea98eda61c0edf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
760KB
MD5a4ab98730148ed05195e73e26243d25d
SHA13d4bfebe6fa40c04e10e131f7110121f9ab03b2b
SHA25636e9734b0d2d0e971934fd73801615472cabf3d6a3a80f36cacf0ef0c24bffeb
SHA512c0c22be3957ae9b00cf2ecca6085a18d03bbd7a2f1b262c60dbad8886acae5d0143831712569613ad48e8ac64f1035653ed1bf591b9510a8232691353b1a0b92
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
252KB
MD541ee253aa9a7a797263d778b794a5c0f
SHA1b8c52c18951ebcc5649db31d28da85df05adade9
SHA25604a9d3c56fcdf0ab534f7db5e5083b57d1cbc9dfa7fe0c1d5cdc1e0e08513749
SHA5123ead0118cc00de363e86220293018065a726ec1ef8ee2901aa7998fd7184fc89fe1d98b973f2df37f2150231d5bcff8ebbb89e15e4ed80f3a8b0192f20be79de
-
Filesize
252KB
MD541ee253aa9a7a797263d778b794a5c0f
SHA1b8c52c18951ebcc5649db31d28da85df05adade9
SHA25604a9d3c56fcdf0ab534f7db5e5083b57d1cbc9dfa7fe0c1d5cdc1e0e08513749
SHA5123ead0118cc00de363e86220293018065a726ec1ef8ee2901aa7998fd7184fc89fe1d98b973f2df37f2150231d5bcff8ebbb89e15e4ed80f3a8b0192f20be79de
-
Filesize
252KB
MD541ee253aa9a7a797263d778b794a5c0f
SHA1b8c52c18951ebcc5649db31d28da85df05adade9
SHA25604a9d3c56fcdf0ab534f7db5e5083b57d1cbc9dfa7fe0c1d5cdc1e0e08513749
SHA5123ead0118cc00de363e86220293018065a726ec1ef8ee2901aa7998fd7184fc89fe1d98b973f2df37f2150231d5bcff8ebbb89e15e4ed80f3a8b0192f20be79de
-
Filesize
252KB
MD557a97f8ec8b8a6efc1f4db6aac6c5169
SHA1f75ea3862f7dc27710c1034771e23a439ddc0780
SHA2564cf59b40ea20ed9a21d5a44d8cba91143803f0f4757f2dfcf1b017e6a4475c41
SHA5123d1a51ef3209987d15f2dff53ccfbe33649f406c7815f4ced7caf5d97f099fc1b92d2f358e1ef486c3220b05c4c454cdb65cd861de0aece6e4406d7c9b955958
-
Filesize
252KB
MD557a97f8ec8b8a6efc1f4db6aac6c5169
SHA1f75ea3862f7dc27710c1034771e23a439ddc0780
SHA2564cf59b40ea20ed9a21d5a44d8cba91143803f0f4757f2dfcf1b017e6a4475c41
SHA5123d1a51ef3209987d15f2dff53ccfbe33649f406c7815f4ced7caf5d97f099fc1b92d2f358e1ef486c3220b05c4c454cdb65cd861de0aece6e4406d7c9b955958
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51eca454058d5c1f2e26bc5aedb1694b4
SHA175d4eec324e00360e6ed519cb8400092cdca2269
SHA25680e3b063eadc4d42c0f23737401f870ba2e330a8bd9a52880dcad8b185cd8918
SHA5124654d3549daecf22e6f34306579469b531ecce30f7874b262e285c4063f8d9512483a51df33d7416cb241dcddb8a55cae415e00e484ae78c6191409652484e7a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD561007ce9464720831873b41f65fbdb71
SHA1ac81ec28ce7e375cc44bc8e42e3db1895be8c7af
SHA2561ca3145a7d9aa0cdf9d30fc8421d249f60fac10b7cef8d1ae651f1c679534e6b
SHA5127f9b6da67385cf973262b0181db189d49b6bdbfdb5a289fdadfb59e99b11c4125aab2bdf84f410b52b8d680e8f955aacd91ba43f8e4bd390551f8eb39704e486
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5adc938c492012f56115379dac44b0ab3
SHA150a39f29beda7b6aef19ab4f0c89b190ffdea43c
SHA25610d68d5bf50594adb42d730506e54ef0dba96ba2fac0edbd1accd533ba7b5849
SHA5125e62bfaf8b2d83ff05ac029ea05a16f2cc75af83d519abd928524b0bf6234592aa25df5b9b3e858039bb3c491b4b46e6e2d7ba4228fa87bc8d6767da3a753124
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f9ae6dc7fbaeea4fda71d8a8b1f5100f
SHA1bb390dd49a33cee494e47b7f3897b4319bae7bf2
SHA256ccff798c0972b483c8ef6a381e7f30215d34d62cdac4f9e9a34fc9d2cad39f8f
SHA5124159420e3fb96c5702d06ad054bf030507c775d70a6c37ef8afd95257ac94018ec7a16c952fd5d9f212745d63fecb543f77fc8071233f33d9a6b902c88d40dda
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a6a4c66f50ceb72d0904fb2dd32b28fb
SHA1fa9fa515f0f33f0c6ca7b6cca44404728a4697ef
SHA25676550a018505c44b6d7b7fd70f808bb69e5cee4713af285a4a45a3026496c81c
SHA512d504f225a76119bf73589403274139e6ccbdf15dd37ec8f6742d0bd81eff0c8cafffd6a250c6d6795c8f49f178d0ac09b0318aec02b9f3fb8ad3801dad55b609
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80