Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
266KB
-
MD5
28d76bc20e00e083b7b1846e0e242ba4
-
SHA1
f0256c658fc8a72adc2b4f13b6268603479098e3
-
SHA256
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c
-
SHA512
dbcd5148437958d23171bc815776f5501509b6b24d7d081d44a536b9772de3780e1fd71f4f329d7e4ccc983204a44d8dc71d66ee1d9cd1ba51578a03189a5a23
-
SSDEEP
3072:y0XZRrpPgrVGUyt+2GlNedZTMOSi1AeWG+BZ3V7OX9BocL45mUspX:vTrWrEUy0Z7dOBAeN+p7nS45mUs
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/raud/get.php
http://zexeq.com/lancer/get.php
-
extension
.wwza
-
offline_id
LtYnlJvK0hICyOCeum6Tv4pbia9jcIGHVgA3Xht1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xoUXGr6cqT Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0789JOsie
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
smokeloader
pub1
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detected Djvu ransomware 15 IoCs
resource yara_rule behavioral2/memory/852-20-0x0000000002550000-0x000000000266B000-memory.dmp family_djvu behavioral2/memory/3464-21-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3464-23-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3464-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3464-30-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1980-61-0x00000000024C0000-0x00000000025DB000-memory.dmp family_djvu behavioral2/memory/1572-65-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1572-63-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1572-67-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1572-75-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3464-97-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1572-150-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2020-189-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2020-199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2020-193-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 3 IoCs
resource yara_rule behavioral2/memory/4664-206-0x0000000002980000-0x0000000002D7A000-memory.dmp family_glupteba behavioral2/memory/4664-209-0x0000000002D80000-0x000000000366B000-memory.dmp family_glupteba behavioral2/memory/4664-290-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5116 netsh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation D219.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation E594.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation kos1.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation kos.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation CBBC.exe -
Executes dropped EXE 26 IoCs
pid Process 852 CBBC.exe 4756 CCF6.exe 3464 CBBC.exe 3624 CDC2.exe 2548 D0C0.exe 1980 D219.exe 1572 D219.exe 4992 D9CC.exe 4152 E594.exe 5024 aafg31.exe 1732 toolspub2.exe 2224 D219.exe 4664 31839b57a4f11171d6abc8bbc4451ee4.exe 3380 kos1.exe 2020 D219.exe 2208 toolspub2.exe 3168 set16.exe 3064 kos.exe 5004 is-5VUUM.tmp 3856 previewer.exe 316 previewer.exe 2864 CBBC.exe 3572 CBBC.exe 1160 31839b57a4f11171d6abc8bbc4451ee4.exe 4984 csrss.exe 3496 injector.exe -
Loads dropped DLL 4 IoCs
pid Process 4296 regsvr32.exe 5004 is-5VUUM.tmp 5004 is-5VUUM.tmp 5004 is-5VUUM.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4900 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\147ba1f5-3ec2-427f-8667-b4acbd02d202\\CBBC.exe\" --AutoStart" CBBC.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 api.2ip.ua 40 api.2ip.ua 53 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Process not Found File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log Process not Found File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 852 set thread context of 3464 852 CBBC.exe 92 PID 1980 set thread context of 1572 1980 D219.exe 100 PID 2548 set thread context of 2924 2548 D0C0.exe 107 PID 2224 set thread context of 2020 2224 D219.exe 113 PID 1732 set thread context of 2208 1732 toolspub2.exe 117 PID 2864 set thread context of 3572 2864 CBBC.exe 129 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\PA Previewer\unins000.dat is-5VUUM.tmp File opened for modification C:\Program Files (x86)\PA Previewer\previewer.exe is-5VUUM.tmp File created C:\Program Files (x86)\PA Previewer\unins000.dat is-5VUUM.tmp File created C:\Program Files (x86)\PA Previewer\is-E1CM9.tmp is-5VUUM.tmp File created C:\Program Files (x86)\PA Previewer\is-IA50I.tmp is-5VUUM.tmp File created C:\Program Files (x86)\PA Previewer\is-3S118.tmp is-5VUUM.tmp File created C:\Program Files (x86)\PA Previewer\is-C916T.tmp is-5VUUM.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5108 2548 WerFault.exe 95 4012 2020 WerFault.exe 113 3516 3572 WerFault.exe 129 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D9CC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D9CC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D9CC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5100 schtasks.exe 4316 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4308 file.exe 4308 file.exe 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3216 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4308 file.exe 4992 D9CC.exe 2208 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeDebugPrivilege 3064 kos.exe Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeDebugPrivilege 4756 CCF6.exe Token: SeDebugPrivilege 3856 previewer.exe Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeDebugPrivilege 316 previewer.exe Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeShutdownPrivilege 3216 Process not Found Token: SeCreatePagefilePrivilege 3216 Process not Found Token: SeDebugPrivilege 3624 CDC2.exe Token: SeShutdownPrivilege 3216 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3216 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3216 wrote to memory of 852 3216 Process not Found 89 PID 3216 wrote to memory of 852 3216 Process not Found 89 PID 3216 wrote to memory of 852 3216 Process not Found 89 PID 3216 wrote to memory of 4756 3216 Process not Found 90 PID 3216 wrote to memory of 4756 3216 Process not Found 90 PID 3216 wrote to memory of 4756 3216 Process not Found 90 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 852 wrote to memory of 3464 852 CBBC.exe 92 PID 3216 wrote to memory of 3624 3216 Process not Found 94 PID 3216 wrote to memory of 3624 3216 Process not Found 94 PID 3216 wrote to memory of 3624 3216 Process not Found 94 PID 3216 wrote to memory of 2548 3216 Process not Found 95 PID 3216 wrote to memory of 2548 3216 Process not Found 95 PID 3216 wrote to memory of 2548 3216 Process not Found 95 PID 3216 wrote to memory of 1980 3216 Process not Found 97 PID 3216 wrote to memory of 1980 3216 Process not Found 97 PID 3216 wrote to memory of 1980 3216 Process not Found 97 PID 3216 wrote to memory of 2760 3216 Process not Found 98 PID 3216 wrote to memory of 2760 3216 Process not Found 98 PID 2760 wrote to memory of 4296 2760 regsvr32.exe 99 PID 2760 wrote to memory of 4296 2760 regsvr32.exe 99 PID 2760 wrote to memory of 4296 2760 regsvr32.exe 99 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 1980 wrote to memory of 1572 1980 D219.exe 100 PID 3216 wrote to memory of 4992 3216 Process not Found 101 PID 3216 wrote to memory of 4992 3216 Process not Found 101 PID 3216 wrote to memory of 4992 3216 Process not Found 101 PID 3464 wrote to memory of 4900 3464 CBBC.exe 102 PID 3464 wrote to memory of 4900 3464 CBBC.exe 102 PID 3464 wrote to memory of 4900 3464 CBBC.exe 102 PID 3216 wrote to memory of 4152 3216 Process not Found 103 PID 3216 wrote to memory of 4152 3216 Process not Found 103 PID 3216 wrote to memory of 4152 3216 Process not Found 103 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 2548 wrote to memory of 2924 2548 D0C0.exe 107 PID 1572 wrote to memory of 2224 1572 D219.exe 105 PID 1572 wrote to memory of 2224 1572 D219.exe 105 PID 1572 wrote to memory of 2224 1572 D219.exe 105 PID 4152 wrote to memory of 5024 4152 E594.exe 108 PID 4152 wrote to memory of 5024 4152 E594.exe 108 PID 4152 wrote to memory of 1732 4152 E594.exe 110 PID 4152 wrote to memory of 1732 4152 E594.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4308
-
C:\Users\Admin\AppData\Local\Temp\CBBC.exeC:\Users\Admin\AppData\Local\Temp\CBBC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\CBBC.exeC:\Users\Admin\AppData\Local\Temp\CBBC.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\147ba1f5-3ec2-427f-8667-b4acbd02d202" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\CBBC.exe"C:\Users\Admin\AppData\Local\Temp\CBBC.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\CBBC.exe"C:\Users\Admin\AppData\Local\Temp\CBBC.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 5725⤵
- Program crash
PID:3516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CCF6.exeC:\Users\Admin\AppData\Local\Temp\CCF6.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
C:\Users\Admin\AppData\Local\Temp\CDC2.exeC:\Users\Admin\AppData\Local\Temp\CDC2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
C:\Users\Admin\AppData\Local\Temp\D0C0.exeC:\Users\Admin\AppData\Local\Temp\D0C0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 1362⤵
- Program crash
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\D219.exeC:\Users\Admin\AppData\Local\Temp\D219.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\D219.exeC:\Users\Admin\AppData\Local\Temp\D219.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\D219.exe"C:\Users\Admin\AppData\Local\Temp\D219.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\D219.exe"C:\Users\Admin\AppData\Local\Temp\D219.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 5685⤵
- Program crash
PID:4012
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\D4AA.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\D4AA.dll2⤵
- Loads dropped DLL
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\D9CC.exeC:\Users\Admin\AppData\Local\Temp\D9CC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4992
-
C:\Users\Admin\AppData\Local\Temp\E594.exeC:\Users\Admin\AppData\Local\Temp\E594.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
PID:4664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
PID:4800
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1856
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5116
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:100
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:4984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5060
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5100
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1352
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos1.exe"C:\Users\Admin\AppData\Local\Temp\kos1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"3⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\is-GDR0L.tmp\is-5VUUM.tmp"C:\Users\Admin\AppData\Local\Temp\is-GDR0L.tmp\is-5VUUM.tmp" /SL4 $B00EC "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 522244⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5004 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 85⤵PID:4620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 86⤵PID:4780
-
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -i5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Program Files (x86)\PA Previewer\previewer.exe"C:\Program Files (x86)\PA Previewer\previewer.exe" -s5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\kos.exe"C:\Users\Admin\AppData\Local\Temp\kos.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2548 -ip 25481⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2020 -ip 20201⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3572 -ip 35721⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
Filesize
1.9MB
MD527b85a95804a760da4dbee7ca800c9b4
SHA1f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD59b667ecf8c64e80b6ba550371dc3149c
SHA1dd7dd3675307f72562b20d01e86baf619798accf
SHA25601376f194051bd65ab162ec35c24d005c179d01d28657eb1f339bb2ededfb886
SHA51260daf11cfac79900c5e7c988606570a45a9b170b500acc203c0a12c0683914b745442a177017acc3a4a7df3fd99847768a264e2f0fd4aec76c92b5ecd870fc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD55318d6a902beaba43fd3af656c2e3cb0
SHA10202ac2d3e3ad69f1456c6de198b462cdba0edda
SHA256bad155252d58babc8824eb5e5bc5efd49ba946a2d7f2aaf27dae16d157c7646e
SHA51214b17ce0850c83ade52982c2c3d3d65bc621c2c09dae2f84cd44890a560811d5c25627e582c7dfa544f2a05665562f48f3b2cc4941bac688242eb13ff0944cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5f5213611da3f2ecb2cfc66e7d03630e4
SHA19c8a008999804120554d56a433266aaa6b09676d
SHA2566163200cb64723f4d3dab1e870452cd0a00a0b09406f6d68261d85db45c721be
SHA512af5faeb2f26551f82333c96dca95c5b858bc3a2bb12952509e414e8b67639e30f8d8654111615ecba1dbbfd6d78df0c0fd5022ef62707bb25313dcbb2744cefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD57218ac046f31e0fb2c37628f51b52946
SHA1780dbbc74603569ff5dbfdbec942d30e4eadd155
SHA256853bd8a8da743326110fb9b53a4a0d9bd726e7352661a618a9c7d7cc6b4dabe9
SHA512af8a78aed62d03c9c187a0bd0ae329861c9449f5f8d87170427d6e33cb46add184cc4ec9c70a559104530edd25c88aecd7ac0a778691322030b098bf79789676
-
Filesize
774KB
MD5e56c98ba34e2520ea0bb08e643572ecf
SHA147b72b2f009c7bcb8846e3c006274c97cd7d720b
SHA256b2848fc273a249dd45a23e09ea2c9fb52f1e345cdd35ff8f09a34349270b96dc
SHA512408d28deeb7ec9417652a5d1c1869a168f1440beecb97c9721e61e5441bfa324be684e18acb827adb3a04dc79a5b1c292ce28e08b792e7793f3e34cd585b99b9
-
Filesize
2KB
MD59b756bc85e5324eb8f87a69e3f9959ab
SHA11778b2e2d6a00c421578a284db1e743931611d66
SHA256e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e
SHA512c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8
-
Filesize
4.2MB
MD5f2a6bcee6c6bb311325b1b41b5363622
SHA1587c5b9e0d6a6f50607e461667a09806e5866745
SHA256ae3d87edb3a831555bac3684482ac5f4f1d794b75d00809250ea8d4937e65e8a
SHA5129e7802dd50798bfb50553396fa9a45cf0ad16ca5937a33eeb731b4b9744dc0c0b837166675bf4a169c2fe1bc1ac5883b4791b4f2ac7dea4e42e43de77d053e5b
-
Filesize
4.2MB
MD5f2a6bcee6c6bb311325b1b41b5363622
SHA1587c5b9e0d6a6f50607e461667a09806e5866745
SHA256ae3d87edb3a831555bac3684482ac5f4f1d794b75d00809250ea8d4937e65e8a
SHA5129e7802dd50798bfb50553396fa9a45cf0ad16ca5937a33eeb731b4b9744dc0c0b837166675bf4a169c2fe1bc1ac5883b4791b4f2ac7dea4e42e43de77d053e5b
-
Filesize
4.2MB
MD5f2a6bcee6c6bb311325b1b41b5363622
SHA1587c5b9e0d6a6f50607e461667a09806e5866745
SHA256ae3d87edb3a831555bac3684482ac5f4f1d794b75d00809250ea8d4937e65e8a
SHA5129e7802dd50798bfb50553396fa9a45cf0ad16ca5937a33eeb731b4b9744dc0c0b837166675bf4a169c2fe1bc1ac5883b4791b4f2ac7dea4e42e43de77d053e5b
-
Filesize
4.2MB
MD5f2a6bcee6c6bb311325b1b41b5363622
SHA1587c5b9e0d6a6f50607e461667a09806e5866745
SHA256ae3d87edb3a831555bac3684482ac5f4f1d794b75d00809250ea8d4937e65e8a
SHA5129e7802dd50798bfb50553396fa9a45cf0ad16ca5937a33eeb731b4b9744dc0c0b837166675bf4a169c2fe1bc1ac5883b4791b4f2ac7dea4e42e43de77d053e5b
-
Filesize
774KB
MD5e56c98ba34e2520ea0bb08e643572ecf
SHA147b72b2f009c7bcb8846e3c006274c97cd7d720b
SHA256b2848fc273a249dd45a23e09ea2c9fb52f1e345cdd35ff8f09a34349270b96dc
SHA512408d28deeb7ec9417652a5d1c1869a168f1440beecb97c9721e61e5441bfa324be684e18acb827adb3a04dc79a5b1c292ce28e08b792e7793f3e34cd585b99b9
-
Filesize
774KB
MD5e56c98ba34e2520ea0bb08e643572ecf
SHA147b72b2f009c7bcb8846e3c006274c97cd7d720b
SHA256b2848fc273a249dd45a23e09ea2c9fb52f1e345cdd35ff8f09a34349270b96dc
SHA512408d28deeb7ec9417652a5d1c1869a168f1440beecb97c9721e61e5441bfa324be684e18acb827adb3a04dc79a5b1c292ce28e08b792e7793f3e34cd585b99b9
-
Filesize
774KB
MD5e56c98ba34e2520ea0bb08e643572ecf
SHA147b72b2f009c7bcb8846e3c006274c97cd7d720b
SHA256b2848fc273a249dd45a23e09ea2c9fb52f1e345cdd35ff8f09a34349270b96dc
SHA512408d28deeb7ec9417652a5d1c1869a168f1440beecb97c9721e61e5441bfa324be684e18acb827adb3a04dc79a5b1c292ce28e08b792e7793f3e34cd585b99b9
-
Filesize
774KB
MD5e56c98ba34e2520ea0bb08e643572ecf
SHA147b72b2f009c7bcb8846e3c006274c97cd7d720b
SHA256b2848fc273a249dd45a23e09ea2c9fb52f1e345cdd35ff8f09a34349270b96dc
SHA512408d28deeb7ec9417652a5d1c1869a168f1440beecb97c9721e61e5441bfa324be684e18acb827adb3a04dc79a5b1c292ce28e08b792e7793f3e34cd585b99b9
-
Filesize
774KB
MD5e56c98ba34e2520ea0bb08e643572ecf
SHA147b72b2f009c7bcb8846e3c006274c97cd7d720b
SHA256b2848fc273a249dd45a23e09ea2c9fb52f1e345cdd35ff8f09a34349270b96dc
SHA512408d28deeb7ec9417652a5d1c1869a168f1440beecb97c9721e61e5441bfa324be684e18acb827adb3a04dc79a5b1c292ce28e08b792e7793f3e34cd585b99b9
-
Filesize
249KB
MD5c635d3d5a5ea1303144f22a17be302d4
SHA1a75d05e9166312189005ab0e8e2e9d92c4ac410f
SHA256a706dd1cdbcdfa0e7de3cc5590d422338d17dcc55a9099d611a65dfb592d97d0
SHA5123ec36398d804fe2468a0db62973bdff4b66985db22b025035204d3b1a4358b64cdc1f2676ae511aeaf125b963d1d7d5429702ce370a19ae5eda2c6dc0773d21f
-
Filesize
249KB
MD5c635d3d5a5ea1303144f22a17be302d4
SHA1a75d05e9166312189005ab0e8e2e9d92c4ac410f
SHA256a706dd1cdbcdfa0e7de3cc5590d422338d17dcc55a9099d611a65dfb592d97d0
SHA5123ec36398d804fe2468a0db62973bdff4b66985db22b025035204d3b1a4358b64cdc1f2676ae511aeaf125b963d1d7d5429702ce370a19ae5eda2c6dc0773d21f
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
397KB
MD5443a2a80342e250493c764a1a2507766
SHA1691bbb40c4cc19b99fcbb6e30e10989b010205fc
SHA25636409da21c9c35416d4bf8c12e76042a7bcb09b8ab659545a33bd1d078e0dd86
SHA512a0d7c59f337f2f9ce32e12fc4ee3cc4025687fd0545a9511ea2246783d3e9cc5b63ba8a384d34d44dca399345862d79e53f43f02ca0d9e22b286ef1a047bee94
-
Filesize
397KB
MD5443a2a80342e250493c764a1a2507766
SHA1691bbb40c4cc19b99fcbb6e30e10989b010205fc
SHA25636409da21c9c35416d4bf8c12e76042a7bcb09b8ab659545a33bd1d078e0dd86
SHA512a0d7c59f337f2f9ce32e12fc4ee3cc4025687fd0545a9511ea2246783d3e9cc5b63ba8a384d34d44dca399345862d79e53f43f02ca0d9e22b286ef1a047bee94
-
Filesize
755KB
MD53813360b2761ccd6900baa3181222f8d
SHA10b6c49adbc2cc2843e96fdffc5cc21953d2a5f08
SHA25678c249396c534df474dcace36d13844d9ca61b9f386a00dcade81453b409d067
SHA512c6bb56a8cb632e9e5713d299bdb2f86a625f18318ec0b2b4bdc4ec8ac15d3de27357e7ad07844b2d16cff927d9550eb30d1ed33c37218beaae68e78037affc08
-
Filesize
755KB
MD53813360b2761ccd6900baa3181222f8d
SHA10b6c49adbc2cc2843e96fdffc5cc21953d2a5f08
SHA25678c249396c534df474dcace36d13844d9ca61b9f386a00dcade81453b409d067
SHA512c6bb56a8cb632e9e5713d299bdb2f86a625f18318ec0b2b4bdc4ec8ac15d3de27357e7ad07844b2d16cff927d9550eb30d1ed33c37218beaae68e78037affc08
-
Filesize
755KB
MD53813360b2761ccd6900baa3181222f8d
SHA10b6c49adbc2cc2843e96fdffc5cc21953d2a5f08
SHA25678c249396c534df474dcace36d13844d9ca61b9f386a00dcade81453b409d067
SHA512c6bb56a8cb632e9e5713d299bdb2f86a625f18318ec0b2b4bdc4ec8ac15d3de27357e7ad07844b2d16cff927d9550eb30d1ed33c37218beaae68e78037affc08
-
Filesize
755KB
MD53813360b2761ccd6900baa3181222f8d
SHA10b6c49adbc2cc2843e96fdffc5cc21953d2a5f08
SHA25678c249396c534df474dcace36d13844d9ca61b9f386a00dcade81453b409d067
SHA512c6bb56a8cb632e9e5713d299bdb2f86a625f18318ec0b2b4bdc4ec8ac15d3de27357e7ad07844b2d16cff927d9550eb30d1ed33c37218beaae68e78037affc08
-
Filesize
755KB
MD53813360b2761ccd6900baa3181222f8d
SHA10b6c49adbc2cc2843e96fdffc5cc21953d2a5f08
SHA25678c249396c534df474dcace36d13844d9ca61b9f386a00dcade81453b409d067
SHA512c6bb56a8cb632e9e5713d299bdb2f86a625f18318ec0b2b4bdc4ec8ac15d3de27357e7ad07844b2d16cff927d9550eb30d1ed33c37218beaae68e78037affc08
-
Filesize
1.4MB
MD5ec3697f0d55b1db8f0445358e9c424f2
SHA1557b0ec0e68cf7f1328e5e8d472ddf6a02560194
SHA256d809fdfa818279b5fde711f3ade5d22dc4d49dbd3311d65c725ac26625c5388e
SHA5121ff4a00325ad47ba8ca18d1ad8775a7021f858559d1f67d6b1c9d55fa1badb8c916f904b0b5ed9be518006eeea5c115e482472e1b5ec66a47a4ebfb169f472af
-
Filesize
1.4MB
MD5ec3697f0d55b1db8f0445358e9c424f2
SHA1557b0ec0e68cf7f1328e5e8d472ddf6a02560194
SHA256d809fdfa818279b5fde711f3ade5d22dc4d49dbd3311d65c725ac26625c5388e
SHA5121ff4a00325ad47ba8ca18d1ad8775a7021f858559d1f67d6b1c9d55fa1badb8c916f904b0b5ed9be518006eeea5c115e482472e1b5ec66a47a4ebfb169f472af
-
Filesize
265KB
MD5a25c8bcd78bfffff86e911122d610ff5
SHA1a262560b7b021156a27f2f298d48e5dcb08d9506
SHA256739c8d45ca4059f0b591bd553bdab486519b663fb092ad11868a8c6c3d9ec022
SHA512fd485e565f03b62eb7088ec7a23d00cd0b615cd1e74fff71a4a7059d8770e15d26f67d8e78d21f7ded8cdb4f3fc89a33d8dda25713bfb381c0aa8ceb3257186a
-
Filesize
265KB
MD5a25c8bcd78bfffff86e911122d610ff5
SHA1a262560b7b021156a27f2f298d48e5dcb08d9506
SHA256739c8d45ca4059f0b591bd553bdab486519b663fb092ad11868a8c6c3d9ec022
SHA512fd485e565f03b62eb7088ec7a23d00cd0b615cd1e74fff71a4a7059d8770e15d26f67d8e78d21f7ded8cdb4f3fc89a33d8dda25713bfb381c0aa8ceb3257186a
-
Filesize
6.3MB
MD5202b4a418a695f5fa029892e02af8ae7
SHA139488ec88202904e324e75acc25712262e2d9905
SHA256521e1daebb7e7a0ad94d160e1f3f10157b87c8c744c9b2c6a5f4d1b16c5e665f
SHA512f7ea1890c90ebd5ec652b56376a5bee8bc9ce29ff08fbb9d423d1704a05861cc8fe25d28cceaa4da0b04c426db8aca73228a4ba6ea5a9fe4179f1104abbabafc
-
Filesize
6.3MB
MD5202b4a418a695f5fa029892e02af8ae7
SHA139488ec88202904e324e75acc25712262e2d9905
SHA256521e1daebb7e7a0ad94d160e1f3f10157b87c8c744c9b2c6a5f4d1b16c5e665f
SHA512f7ea1890c90ebd5ec652b56376a5bee8bc9ce29ff08fbb9d423d1704a05861cc8fe25d28cceaa4da0b04c426db8aca73228a4ba6ea5a9fe4179f1104abbabafc
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
416KB
MD541484c18078fdced5621a0d209d91911
SHA16cd4ef47e7f9408a18a590d86401f4c3769e2d79
SHA256ce6ddf38ddc57698642bc07efc9088f66f1a6fcb421851fe668b84e7f1169726
SHA5121864f62303606663c9e396e1c9395c52f35e5b94d34795560233dfb6a786b1228b7b46a736fc6781bfc15ff34e71ed084a60aefa1a57857bdbdc484bed058449
-
Filesize
416KB
MD541484c18078fdced5621a0d209d91911
SHA16cd4ef47e7f9408a18a590d86401f4c3769e2d79
SHA256ce6ddf38ddc57698642bc07efc9088f66f1a6fcb421851fe668b84e7f1169726
SHA5121864f62303606663c9e396e1c9395c52f35e5b94d34795560233dfb6a786b1228b7b46a736fc6781bfc15ff34e71ed084a60aefa1a57857bdbdc484bed058449
-
Filesize
416KB
MD541484c18078fdced5621a0d209d91911
SHA16cd4ef47e7f9408a18a590d86401f4c3769e2d79
SHA256ce6ddf38ddc57698642bc07efc9088f66f1a6fcb421851fe668b84e7f1169726
SHA5121864f62303606663c9e396e1c9395c52f35e5b94d34795560233dfb6a786b1228b7b46a736fc6781bfc15ff34e71ed084a60aefa1a57857bdbdc484bed058449
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
32KB
MD5b4786eb1e1a93633ad1b4c112514c893
SHA1734750b771d0809c88508e4feb788d7701e6dada
SHA2562ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f
SHA5120882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
647KB
MD52fba5642cbcaa6857c3995ccb5d2ee2a
SHA191fe8cd860cba7551fbf78bc77cc34e34956e8cc
SHA256ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa
SHA51230613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
8KB
MD5076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA17b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA51275e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD585b698363e74ba3c08fc16297ddc284e
SHA1171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA25678efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA5127e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
1.4MB
MD522d5269955f256a444bd902847b04a3b
SHA141a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c
-
Filesize
265KB
MD57a63d490060ac081e1008c78fb0135fa
SHA181bda021cd9254cf786cf16aedc3b805ef10326f
SHA2569c63b33c936df8c3cca5b1e3665b3f0c1b36a1c1ca826a8bc80551610413b74f
SHA512602ef6907cc4b0b2aa16f7d4b5b5ff14c5434ea2a50854ae0fc4583eba77bb043089fb47c8963f0e9b296ee1481f4f32caa69ab48890156ed08e3b50eac11349
-
Filesize
265KB
MD57a63d490060ac081e1008c78fb0135fa
SHA181bda021cd9254cf786cf16aedc3b805ef10326f
SHA2569c63b33c936df8c3cca5b1e3665b3f0c1b36a1c1ca826a8bc80551610413b74f
SHA512602ef6907cc4b0b2aa16f7d4b5b5ff14c5434ea2a50854ae0fc4583eba77bb043089fb47c8963f0e9b296ee1481f4f32caa69ab48890156ed08e3b50eac11349
-
Filesize
265KB
MD57a63d490060ac081e1008c78fb0135fa
SHA181bda021cd9254cf786cf16aedc3b805ef10326f
SHA2569c63b33c936df8c3cca5b1e3665b3f0c1b36a1c1ca826a8bc80551610413b74f
SHA512602ef6907cc4b0b2aa16f7d4b5b5ff14c5434ea2a50854ae0fc4583eba77bb043089fb47c8963f0e9b296ee1481f4f32caa69ab48890156ed08e3b50eac11349
-
Filesize
265KB
MD57a63d490060ac081e1008c78fb0135fa
SHA181bda021cd9254cf786cf16aedc3b805ef10326f
SHA2569c63b33c936df8c3cca5b1e3665b3f0c1b36a1c1ca826a8bc80551610413b74f
SHA512602ef6907cc4b0b2aa16f7d4b5b5ff14c5434ea2a50854ae0fc4583eba77bb043089fb47c8963f0e9b296ee1481f4f32caa69ab48890156ed08e3b50eac11349
-
Filesize
265KB
MD5a25c8bcd78bfffff86e911122d610ff5
SHA1a262560b7b021156a27f2f298d48e5dcb08d9506
SHA256739c8d45ca4059f0b591bd553bdab486519b663fb092ad11868a8c6c3d9ec022
SHA512fd485e565f03b62eb7088ec7a23d00cd0b615cd1e74fff71a4a7059d8770e15d26f67d8e78d21f7ded8cdb4f3fc89a33d8dda25713bfb381c0aa8ceb3257186a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b0327e8ba338b5ba56c4f55e24ef0724
SHA1716b5e69e766697e6c42dcf9b4705113e18c5a12
SHA256ba9fef4ed5989ab6a32de91aad129002a2161b696bcb37c16c1fbfbaaa05f1b0
SHA512f2a725fb09aa75672a7926d4c77323f08037c8c8054b65bcf3e1476f94f5d4095aa016c1f2dc8cf693e8f4e4bdb4426fac50f60cec70b998a72a40c18ed9a59d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a27e48b4b5e318eb6b31dcc87a14f530
SHA1d3068977d49549493307fb0eba4bf3f580116249
SHA25664771c59f78b7b85e77491dd83f8205d7725860524fdb6b631f6a04d954fa680
SHA5120ea7fbfdcb4b5151c5a63963308d560c21b001bf074b9369de55e14255d295a81c769beaedbf6ec983649d125bb6896f6953bd900ceb07d6b77b61576da341b6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aab5454fdd622b61906f94a3451d3a1d
SHA150881fef38a633171fd721da269d6a59690d79d1
SHA256d1d5fadd9db6b850cb1ca95ef9992cde7b52b071dcc1dbc0f913f9b3af24fabc
SHA51297d1465ff00df97ecc80c8ee0dcc5575031c4d2e2a0d4c12896976c35b5613ad6b33edc9b537e7cb2e92de83938abb787891e7b135546d040cd40c8df4c39501
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD509f4f5b1fa444e369114bc2dc3b87675
SHA1f1a2e94d49fc374d0d57e1cca209de98cb168c18
SHA2562245f10740c7db5f89b3a3d90f2b724ef4b5dd341ade10a1991f0873271dfadd
SHA5123bdb3b025abfe998b1d08e02ad76eed85a86983f2bdaefd8edddaeb3e54bf1d8779f0c30307cc8ffb57e8e484b82454eea42fbfbd408d16d9f69aa38f341067e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f54d30291ab76f8848f1d4d9fc2d60c1
SHA1098d54d6317f0744328df030e22cbc90d04dd5f9
SHA2564582552352e9273ec492a557af2a54433eeb860777695b9ffc5aaaa27b93addc
SHA51250d98af06187de953f19332e0e3c542857270cbbe95d4e1697bdd01dc98341aaf9c1a037eb7ff402019ea2d7a80374b94c1a15c835bd8f16b22be7489fa95898
-
Filesize
4.2MB
MD5f2a6bcee6c6bb311325b1b41b5363622
SHA1587c5b9e0d6a6f50607e461667a09806e5866745
SHA256ae3d87edb3a831555bac3684482ac5f4f1d794b75d00809250ea8d4937e65e8a
SHA5129e7802dd50798bfb50553396fa9a45cf0ad16ca5937a33eeb731b4b9744dc0c0b837166675bf4a169c2fe1bc1ac5883b4791b4f2ac7dea4e42e43de77d053e5b
-
Filesize
4.2MB
MD5f2a6bcee6c6bb311325b1b41b5363622
SHA1587c5b9e0d6a6f50607e461667a09806e5866745
SHA256ae3d87edb3a831555bac3684482ac5f4f1d794b75d00809250ea8d4937e65e8a
SHA5129e7802dd50798bfb50553396fa9a45cf0ad16ca5937a33eeb731b4b9744dc0c0b837166675bf4a169c2fe1bc1ac5883b4791b4f2ac7dea4e42e43de77d053e5b