Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2023 12:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
253KB
-
MD5
37b7c3c0796772c2c2508d6c32f8b9bc
-
SHA1
2a2d25935fcec3e6d08a12c37a3aaedbee60ed27
-
SHA256
a475d7934b941e9a1c857556eb17e8863c5fb82bdda00e237ac68cdf655a56c9
-
SHA512
78eb9347d08d67da817742608a03ff673eeee2b0810364458a246201fe44814dd11b7280cb2426f0fa1d7e715bbc797b7d7a4dfbd81468633aacb5a44a212c02
-
SSDEEP
3072:telmM1M8FvnSBNe9Lw3sHv1VcbgYeNW0kRSLhv0:3Mm8FH9LwE1VcUMr0
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/raud/get.php
http://zexeq.com/lancer/get.php
-
extension
.wwza
-
offline_id
LtYnlJvK0hICyOCeum6Tv4pbia9jcIGHVgA3Xht1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xoUXGr6cqT Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0789JOsie
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
smokeloader
pub1
Signatures
-
Detected Djvu ransomware 23 IoCs
resource yara_rule behavioral2/memory/5012-17-0x00000000024B0000-0x00000000025CB000-memory.dmp family_djvu behavioral2/memory/2964-18-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2964-20-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2964-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2964-26-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2964-65-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3212-72-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3212-73-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3212-75-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2840-87-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2840-88-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2840-89-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2840-102-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4104-116-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4104-117-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2240-123-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4104-120-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2240-127-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2500-134-0x00000000024C0000-0x00000000025DB000-memory.dmp family_djvu behavioral2/memory/4916-141-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4916-138-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4916-142-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4916-144-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/760-201-0x00000000013F0000-0x00000000013FD000-memory.dmp family_lgoogloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 3 IoCs
resource yara_rule behavioral2/memory/3772-199-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3772-197-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral2/memory/3772-229-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 456 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 25C.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 1A4D.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 2471.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 3E53.exe -
Executes dropped EXE 26 IoCs
pid Process 5012 25C.exe 2964 25C.exe 5024 56B.exe 4444 760.exe 4848 A10.exe 2264 25C.exe 3212 25C.exe 1464 1A4D.exe 2840 1A4D.exe 3684 1A4D.exe 944 2471.exe 4104 1A4D.exe 2240 2471.exe 2500 2471.exe 4916 2471.exe 2892 3E53.exe 4316 aafg31.exe 1252 toolspub2.exe 3772 31839b57a4f11171d6abc8bbc4451ee4.exe 3824 4430.exe 2960 4CCC.exe 3760 4FDB.exe 4088 toolspub2.exe 3308 31839b57a4f11171d6abc8bbc4451ee4.exe 976 csrss.exe 1764 injector.exe -
Loads dropped DLL 3 IoCs
pid Process 916 regsvr32.exe 496 InstallUtil.exe 496 InstallUtil.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3108 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\cbc5a726-e8f2-4102-965c-214338bcfe57\\25C.exe\" --AutoStart" 25C.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 api.2ip.ua 42 api.2ip.ua 63 api.2ip.ua 72 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 5012 set thread context of 2964 5012 25C.exe 88 PID 2264 set thread context of 3212 2264 25C.exe 99 PID 1464 set thread context of 2840 1464 1A4D.exe 104 PID 4848 set thread context of 3320 4848 A10.exe 106 PID 3684 set thread context of 4104 3684 1A4D.exe 111 PID 2500 set thread context of 4916 2500 2471.exe 116 PID 3824 set thread context of 760 3824 4430.exe 125 PID 1252 set thread context of 4088 1252 toolspub2.exe 132 PID 3760 set thread context of 496 3760 4FDB.exe 134 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3588 3212 WerFault.exe 99 3840 4104 WerFault.exe 111 3252 4916 WerFault.exe 116 3612 496 WerFault.exe 134 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4CCC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4CCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4CCC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InstallUtil.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4312 schtasks.exe 3048 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 file.exe 4376 file.exe 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4376 file.exe 2960 4CCC.exe 4088 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 4444 760.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 3320 AppLaunch.exe Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 3760 4FDB.exe Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 376 powershell.exe Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeShutdownPrivilege 3120 Process not Found Token: SeCreatePagefilePrivilege 3120 Process not Found Token: SeDebugPrivilege 3772 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 5012 3120 Process not Found 87 PID 3120 wrote to memory of 5012 3120 Process not Found 87 PID 3120 wrote to memory of 5012 3120 Process not Found 87 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 5012 wrote to memory of 2964 5012 25C.exe 88 PID 3120 wrote to memory of 5024 3120 Process not Found 89 PID 3120 wrote to memory of 5024 3120 Process not Found 89 PID 3120 wrote to memory of 5024 3120 Process not Found 89 PID 3120 wrote to memory of 4444 3120 Process not Found 91 PID 3120 wrote to memory of 4444 3120 Process not Found 91 PID 3120 wrote to memory of 4444 3120 Process not Found 91 PID 3120 wrote to memory of 4848 3120 Process not Found 93 PID 3120 wrote to memory of 4848 3120 Process not Found 93 PID 3120 wrote to memory of 4848 3120 Process not Found 93 PID 2964 wrote to memory of 3108 2964 25C.exe 95 PID 2964 wrote to memory of 3108 2964 25C.exe 95 PID 2964 wrote to memory of 3108 2964 25C.exe 95 PID 2964 wrote to memory of 2264 2964 25C.exe 96 PID 2964 wrote to memory of 2264 2964 25C.exe 96 PID 2964 wrote to memory of 2264 2964 25C.exe 96 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 2264 wrote to memory of 3212 2264 25C.exe 99 PID 3120 wrote to memory of 1464 3120 Process not Found 103 PID 3120 wrote to memory of 1464 3120 Process not Found 103 PID 3120 wrote to memory of 1464 3120 Process not Found 103 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 1464 wrote to memory of 2840 1464 1A4D.exe 104 PID 4848 wrote to memory of 2380 4848 A10.exe 105 PID 4848 wrote to memory of 2380 4848 A10.exe 105 PID 4848 wrote to memory of 2380 4848 A10.exe 105 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 4848 wrote to memory of 3320 4848 A10.exe 106 PID 3120 wrote to memory of 1088 3120 Process not Found 107 PID 3120 wrote to memory of 1088 3120 Process not Found 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4376
-
C:\Users\Admin\AppData\Local\Temp\25C.exeC:\Users\Admin\AppData\Local\Temp\25C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\25C.exeC:\Users\Admin\AppData\Local\Temp\25C.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\cbc5a726-e8f2-4102-965c-214338bcfe57" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\25C.exe"C:\Users\Admin\AppData\Local\Temp\25C.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\25C.exe"C:\Users\Admin\AppData\Local\Temp\25C.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 5685⤵
- Program crash
PID:3588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\56B.exeC:\Users\Admin\AppData\Local\Temp\56B.exe1⤵
- Executes dropped EXE
PID:5024
-
C:\Users\Admin\AppData\Local\Temp\760.exeC:\Users\Admin\AppData\Local\Temp\760.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
C:\Users\Admin\AppData\Local\Temp\A10.exeC:\Users\Admin\AppData\Local\Temp\A10.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3212 -ip 32121⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\1A4D.exeC:\Users\Admin\AppData\Local\Temp\1A4D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\1A4D.exeC:\Users\Admin\AppData\Local\Temp\1A4D.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\1A4D.exe"C:\Users\Admin\AppData\Local\Temp\1A4D.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\1A4D.exe"C:\Users\Admin\AppData\Local\Temp\1A4D.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 5685⤵
- Program crash
PID:3840
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\228C.dll1⤵PID:1088
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\228C.dll2⤵
- Loads dropped DLL
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\2471.exeC:\Users\Admin\AppData\Local\Temp\2471.exe1⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\2471.exeC:\Users\Admin\AppData\Local\Temp\2471.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\2471.exe"C:\Users\Admin\AppData\Local\Temp\2471.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\2471.exe"C:\Users\Admin\AppData\Local\Temp\2471.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 5685⤵
- Program crash
PID:3252
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4104 -ip 41041⤵PID:416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4916 -ip 49161⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\3E53.exeC:\Users\Admin\AppData\Local\Temp\3E53.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1032
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:456
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1440
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1768
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3320
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4312
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:3748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1764
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4430.exeC:\Users\Admin\AppData\Local\Temp\4430.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\4CCC.exeC:\Users\Admin\AppData\Local\Temp\4CCC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2960
-
C:\Users\Admin\AppData\Local\Temp\4FDB.exeC:\Users\Admin\AppData\Local\Temp\4FDB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 18043⤵
- Program crash
PID:3612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 496 -ip 4961⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5bcf9c82a8e06cd4dbc7c6f8166b03d62
SHA1aa072fd0adc30bc7d45952443a137972eaea0499
SHA25632b64ccb43add6147056e3f68bd46c762c8b38dea72735355fc422160a0f417d
SHA5127a26e9797da034f01a08a1b62e4e7e39de67526257d015a0ef7590968af690fecb1852a0f3ee05f64bbf571344eb74ef4d404d2f145f7e7dd36f6a21816ba4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5fa4ae5fcb44bfaf845b845961180d250
SHA18257ee68bdd2bc3ea2723eda7aeba404195d46bf
SHA256574c66c19561773196a88f115168cf5d73b71fd26f9034606fe38a5535d4df96
SHA512ad1de0c1d0f5a4a7e3615b48537f75250779368b388520b001d96367d5aa19fa88a9f471d1212e679ab9eaae854374445807877891bf1b803fa6c7886877d253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD56aacb1a749c192544d22866aac194e1a
SHA126e7bdb9086bef96e9efbcc2db4446e14d9ec776
SHA2560eb651146a1d9bbcce336d99e3be3695cf71153dcea4fd222cdc603d09523115
SHA51271ede999f737ccd78e087a6aa79f19db57863accf7bc0efda65d25f06dde9989d34a5e146a9d829c69e1ea826225f4b2f6f32e680a4723d383d6e7f24c309d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5ac140936509ebcff335ba7955364acfa
SHA161708071a29fb1703f1f56259b74fe9b4e5dfdde
SHA25690ab4380aeda607168e67a147a7a5947a09cbb46fda3542c1ff5fc98ec4bb573
SHA512f1d7b4d3d470b272015aae0ff4efe960d17f89cd96ef20359cb58832c4d1536237a319f0e8cce558c3a446f643b1d2e4255a5e996520627d473d3d3691bd5d3c
-
Filesize
2KB
MD50eab9cbc81b630365ed87e70a3bcf348
SHA1d6ce2097af6c58fe41f98e1b0f9c264aa552d253
SHA256e8f1178d92ce896b5f45c707050c3e84527db102bc3687e1e7208dbd34cd7685
SHA5121417409eee83f2c8d4a15f843374c826cc2250e23dc4d46648643d02bfbf8c463d6aa8b43274bf68be1e780f81d506948bf84903a7a1044b46b12813d67c9498
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
2.7MB
MD5e32b5d582a1ab3e2c26694b1c4012919
SHA137a66b1061dcc206b18d5e13a56432e718d76467
SHA256a65b0d905b0b9185bb2c10685b9b8c5c6adef91e5bc9b67c2e8ca48586181ee6
SHA512d017818aba5fa8c221b93648ef670ac3a32a543a9b7382cedffe4f8fae1cb230a6cffb410d51aa56f174ca49a4f1839ba05792d6e9c4104503295efc91a61aab
-
Filesize
2.7MB
MD5e32b5d582a1ab3e2c26694b1c4012919
SHA137a66b1061dcc206b18d5e13a56432e718d76467
SHA256a65b0d905b0b9185bb2c10685b9b8c5c6adef91e5bc9b67c2e8ca48586181ee6
SHA512d017818aba5fa8c221b93648ef670ac3a32a543a9b7382cedffe4f8fae1cb230a6cffb410d51aa56f174ca49a4f1839ba05792d6e9c4104503295efc91a61aab
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
761KB
MD52dc46e86c4fba31288ded71520eac377
SHA16420a18c952a6a62e87a6b4d1adb03d42bd55f54
SHA2567d5ce841b0228b2fce09d8c9bc258bdea20c637c67a92c89a4f14dae5f9d64b7
SHA512c3815ea5078befe37383573875a170fe6eacde8c945396e031745552b8ab78018812b7094357a35d694deec8e0004417602e7e552e7db39804873d19ef48fcb7
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
5.2MB
MD53bffffda1e470fede020d005d03929da
SHA142bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
SHA2564c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
SHA512efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
Filesize
3.4MB
MD5bba7cf3a70a424ea0626bb9a8bb9295b
SHA1a001759346c5a9f799fac6b1d6b35d286131d4df
SHA256f5a6cabc167d6ae3999dc047e6d45076468446f334cbb334e3f5220365acec63
SHA51298f766637cf46baa26e9490363148edd7b15d15eb57a3ba81626c409d3dc509d74ded40a1acdc1df14875b3e509dc8cce0fed0cd61286e6cd0be2b8a1f7e51c4
-
Filesize
3.4MB
MD5bba7cf3a70a424ea0626bb9a8bb9295b
SHA1a001759346c5a9f799fac6b1d6b35d286131d4df
SHA256f5a6cabc167d6ae3999dc047e6d45076468446f334cbb334e3f5220365acec63
SHA51298f766637cf46baa26e9490363148edd7b15d15eb57a3ba81626c409d3dc509d74ded40a1acdc1df14875b3e509dc8cce0fed0cd61286e6cd0be2b8a1f7e51c4
-
Filesize
254KB
MD5f6cd2a672bbc78c467fa9d203c5cf38d
SHA1ae7411092aea14816406a4aa7faf6900dd590533
SHA256d4f5836763e6cc16a2019daab61444ca9cce8a105ea6c480d628cee741b311a4
SHA51212c492b0c59cabe348bb79901b27ee17473aa1d88e419fab6eec7330a83529ce77c3c13984f3457f40e850fad1a422a2397863b0c40047e18667636c8dc81bdd
-
Filesize
254KB
MD5f6cd2a672bbc78c467fa9d203c5cf38d
SHA1ae7411092aea14816406a4aa7faf6900dd590533
SHA256d4f5836763e6cc16a2019daab61444ca9cce8a105ea6c480d628cee741b311a4
SHA51212c492b0c59cabe348bb79901b27ee17473aa1d88e419fab6eec7330a83529ce77c3c13984f3457f40e850fad1a422a2397863b0c40047e18667636c8dc81bdd
-
Filesize
1.3MB
MD56ed26ec1d8a9d3ed42d80185987b1009
SHA1954ab6cfff1eda72177bba3d6ae69a977d29d47a
SHA256ca41ebaca85e65918a21ea5a2c2d3a7e72772484578b21019037dc4acb9c53cb
SHA5120230c3c38fb682fc7a107287e12c71cff730bf3a03c11ab58fc8772eeb57d91b54b199a8f1c802f7523832e71a1d913b821b023abce256333a85fc0cefceec35
-
Filesize
1.3MB
MD56ed26ec1d8a9d3ed42d80185987b1009
SHA1954ab6cfff1eda72177bba3d6ae69a977d29d47a
SHA256ca41ebaca85e65918a21ea5a2c2d3a7e72772484578b21019037dc4acb9c53cb
SHA5120230c3c38fb682fc7a107287e12c71cff730bf3a03c11ab58fc8772eeb57d91b54b199a8f1c802f7523832e71a1d913b821b023abce256333a85fc0cefceec35
-
Filesize
260KB
MD55c3fb3056febbd1d66ed2d047e5299ec
SHA1855edd8f8cfc76559902b45c35ecdba4cc7fe362
SHA25610030a6ccb489c4a47894b75c3b979c32f49fcba4c379d288224c50d38ee6422
SHA51214a2154f4349be5773380fb242541bab8a4bd76d8b6e4d459fa7146b7239dcb45995edaf5de3a92caf118b23afe9d2e1b4431340ae409fcedac95b0ddff4773e
-
Filesize
260KB
MD55c3fb3056febbd1d66ed2d047e5299ec
SHA1855edd8f8cfc76559902b45c35ecdba4cc7fe362
SHA25610030a6ccb489c4a47894b75c3b979c32f49fcba4c379d288224c50d38ee6422
SHA51214a2154f4349be5773380fb242541bab8a4bd76d8b6e4d459fa7146b7239dcb45995edaf5de3a92caf118b23afe9d2e1b4431340ae409fcedac95b0ddff4773e
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
393KB
MD5556da5275de73a738b146b51fea5a4ec
SHA1da32df559ab4da0348c51cc4126fe2a105e0062d
SHA256ef13668ac68ff21d2e3c7e4d00cbc953a82702042b7562d04ddbb9a25e4e8edd
SHA512ee9395e8a5b2c24dea7cd6a414e206f55321c3cba4cb13fa2e3a88ada5d618701263b34a9f5b468b6ad5034554c36a07409d56da561c589bb3e2ebe67f49ec69
-
Filesize
393KB
MD5556da5275de73a738b146b51fea5a4ec
SHA1da32df559ab4da0348c51cc4126fe2a105e0062d
SHA256ef13668ac68ff21d2e3c7e4d00cbc953a82702042b7562d04ddbb9a25e4e8edd
SHA512ee9395e8a5b2c24dea7cd6a414e206f55321c3cba4cb13fa2e3a88ada5d618701263b34a9f5b468b6ad5034554c36a07409d56da561c589bb3e2ebe67f49ec69
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
762KB
MD530258031f3b48750850512a93c4dd2e1
SHA14fcb4baa2271870a3fad7de2da500712476b4be6
SHA25630cc81a5dc2b8b71ac41bba2d45254b51df0f58e3a09c9006d8b7662f546f0bf
SHA512e1c798aa7fb5aa4da9276adece6c56e9a99b728b167e090fe95477cf50050d825ac3104ff0cde1fe1036db9baccabc5c297f19c271fffa1340d7a8a31923f911
-
Filesize
254KB
MD5f6cd2a672bbc78c467fa9d203c5cf38d
SHA1ae7411092aea14816406a4aa7faf6900dd590533
SHA256d4f5836763e6cc16a2019daab61444ca9cce8a105ea6c480d628cee741b311a4
SHA51212c492b0c59cabe348bb79901b27ee17473aa1d88e419fab6eec7330a83529ce77c3c13984f3457f40e850fad1a422a2397863b0c40047e18667636c8dc81bdd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD573b4b217558d3b82d521941473391332
SHA184d83d1f08ecb093a23e69e79632485189811eee
SHA256b32f6e126edcecbae7c0913909cdd49b2d5a46dfa7c726adf54c21713be6269a
SHA512dd754cb7c299734a77ecd8f75779879061dffa4c05226e38b23c140ac900636097da9286597842198f481f4020205d248b4fc278fb36e58a20f8cdde284f77e9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51155aad460ea706dfa140554c5da9497
SHA187a1daae901d4f59f32f34efed476746492cedd3
SHA2566277924fe5876c3a363822129e1781e13d27fe82447cedb3f37d848aae18a79e
SHA512122b1b6b97d1b2e6a62594507d090d450bd5fa575a61da151af8599e1396b631180c16c5bad5d6c8630f46fd70815444c75725541ae3ea738b02ea4a17c0f1be
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ea979851eef41b87748d1b008f1965d0
SHA15f9f4bc9cd4af4b59c4b38f613b6bbfde1108dca
SHA256b344b143ae46a3e8954fca2c79a180522cebb242db49d31dc8b842bea4b21237
SHA5129b8f4fc299e1995e7bddf21c1e5aa07caed0e0a7498f018361908364560d17402f4ca2f3fdc126993131c30586eba4d2da9702850f3b0672f02328f165732c04
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50b54726b8a97fae141411f4a7576c1b0
SHA144195369b31200d1c05f13d2be68bd1ea97362f2
SHA2568d58f1ee470bded4159b54c3b43188bc54030e5299bd4b596f9dde12d99e0223
SHA51249441aaea95b7b298b2deea5a6349e9a32bd6eead4aa4f44e5ee187caa3ebb2db8563fd7c11a51a9a0ca2b0c0a7bd9587ea923e9b20744706ae9ad74ad64188b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5642ab56c973d7341ea2fc13477b836f2
SHA1481b22d3ff78bdb31acc7ed4a94b483aaa8a14e3
SHA256c86f58b3ee867c6256a2824139a09a2c60061f28ac496f16d93d394a7f184b49
SHA5126616a5bab7ae26d82a85ebbbd674cd1409ea7c5eb5a775910decdae478678df5ab1f4bcdfdef67280f6cb535c0a40724123f5cb2366da9af774d460ba6e28322
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80