Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 06:12
Static task
static1
General
-
Target
latestrocki.exe
-
Size
6.5MB
-
MD5
0518d9c6db9a614769bf43fbff180167
-
SHA1
928084a70bffb6eb474658dcf062d74f5ca84f68
-
SHA256
6369f6e4a8398cccbbebef2ae7078834d3f92d499257a59b4f9142bd5b079057
-
SHA512
a3a9ae62006133d5e6e7d74527732d6f245c7bfbb8770fba371e877c56b47b61fd5e809eac7e462013c811ab4e49c1162ce16eec7dd15db76530ea09c2a0cbf1
-
SSDEEP
196608:21qELhrUIpNiSF4B3ri+e7UDV2BnIuaR:shRpNPcrrDVgnIH
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect ZGRat V1 7 IoCs
resource yara_rule behavioral2/memory/3544-511-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 behavioral2/memory/3544-521-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 behavioral2/memory/3544-519-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 behavioral2/memory/3544-517-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 behavioral2/memory/3544-515-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 behavioral2/memory/3544-513-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 behavioral2/memory/3544-510-0x0000027FC5FB0000-0x0000027FC60DC000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/4032-458-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4032-460-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4032-456-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4032-471-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2244-479-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2244-481-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2244-478-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/2392-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2392-143-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2392-145-0x0000000002C50000-0x000000000353B000-memory.dmp family_glupteba behavioral2/memory/328-147-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/328-312-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1876-435-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 232 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation nse515F.tmp Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation B9CB.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation latestrocki.exe -
Executes dropped EXE 27 IoCs
pid Process 700 InstallSetup7.exe 4044 toolspub1.exe 2392 31839b57a4f11171d6abc8bbc4451ee4.exe 2388 rty25.exe 2844 BroomSetup.exe 636 nse515F.tmp 328 31839b57a4f11171d6abc8bbc4451ee4.exe 1876 csrss.exe 4644 injector.exe 5044 RegAsm.exe 1840 windefender.exe 1928 windefender.exe 4252 B9CB.exe 4032 B9CB.exe 8 B9CB.exe 2244 B9CB.exe 4008 D207.exe 3544 E717.exe 1524 F215.exe 4284 FBBA.exe 400 E717.exe 1824 13A.exe 4576 5C5B.exe 2748 HostFile.exe 2596 HostFile.exe 1924 pgvdtx.exe 1660 pgvdtx.exe -
Loads dropped DLL 4 IoCs
pid Process 700 InstallSetup7.exe 700 InstallSetup7.exe 636 nse515F.tmp 636 nse515F.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4904 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000f000000023257-446.dat upx behavioral2/memory/1840-449-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000f000000023257-448.dat upx behavioral2/files/0x000f000000023257-445.dat upx behavioral2/memory/1928-501-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\3e88e6b4-d277-4c38-a285-0cd799f655a6\\B9CB.exe\" --AutoStart" B9CB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 4252 set thread context of 4032 4252 B9CB.exe 148 PID 8 set thread context of 2244 8 B9CB.exe 154 PID 1524 set thread context of 5044 1524 F215.exe 160 PID 3544 set thread context of 400 3544 E717.exe 163 PID 1824 set thread context of 1132 1824 13A.exe 165 PID 4576 set thread context of 3184 4576 5C5B.exe 168 PID 2748 set thread context of 2596 2748 HostFile.exe 170 PID 2596 set thread context of 3848 2596 HostFile.exe 171 PID 3848 set thread context of 3664 3848 MSBuild.exe 172 PID 1924 set thread context of 1660 1924 pgvdtx.exe 174 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\Dctooux.job pgvdtx.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1312 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4080 3872 WerFault.exe 96 2400 636 WerFault.exe 97 4320 2244 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nse515F.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nse515F.tmp -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1928 schtasks.exe 184 schtasks.exe 1172 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1796 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1892 = "Russia TZ 3 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4044 toolspub1.exe 4044 toolspub1.exe 3872 powershell.exe 3872 powershell.exe 3872 powershell.exe 636 nse515F.tmp 636 nse515F.tmp 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 2392 31839b57a4f11171d6abc8bbc4451ee4.exe 2392 31839b57a4f11171d6abc8bbc4451ee4.exe 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3824 powershell.exe 3824 powershell.exe 3560 Process not Found 3560 Process not Found 3824 powershell.exe 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found 3560 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4044 toolspub1.exe 5044 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3872 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 2392 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 2392 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 3824 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 3668 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 4756 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 4792 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 2944 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 3332 powershell.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeSystemEnvironmentPrivilege 1876 csrss.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeSecurityPrivilege 1312 sc.exe Token: SeSecurityPrivilege 1312 sc.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 3544 E717.exe Token: SeDebugPrivilege 5044 RegAsm.exe Token: SeDebugPrivilege 400 E717.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 1132 jsc.exe Token: SeShutdownPrivilege 3560 Process not Found Token: SeCreatePagefilePrivilege 3560 Process not Found Token: SeDebugPrivilege 2748 HostFile.exe Token: SeDebugPrivilege 2596 HostFile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 BroomSetup.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3560 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 700 4212 latestrocki.exe 89 PID 4212 wrote to memory of 700 4212 latestrocki.exe 89 PID 4212 wrote to memory of 700 4212 latestrocki.exe 89 PID 4212 wrote to memory of 4044 4212 latestrocki.exe 90 PID 4212 wrote to memory of 4044 4212 latestrocki.exe 90 PID 4212 wrote to memory of 4044 4212 latestrocki.exe 90 PID 4212 wrote to memory of 2392 4212 latestrocki.exe 91 PID 4212 wrote to memory of 2392 4212 latestrocki.exe 91 PID 4212 wrote to memory of 2392 4212 latestrocki.exe 91 PID 4212 wrote to memory of 2388 4212 latestrocki.exe 92 PID 4212 wrote to memory of 2388 4212 latestrocki.exe 92 PID 700 wrote to memory of 2844 700 InstallSetup7.exe 93 PID 700 wrote to memory of 2844 700 InstallSetup7.exe 93 PID 700 wrote to memory of 2844 700 InstallSetup7.exe 93 PID 2392 wrote to memory of 3872 2392 31839b57a4f11171d6abc8bbc4451ee4.exe 96 PID 2392 wrote to memory of 3872 2392 31839b57a4f11171d6abc8bbc4451ee4.exe 96 PID 2392 wrote to memory of 3872 2392 31839b57a4f11171d6abc8bbc4451ee4.exe 96 PID 700 wrote to memory of 636 700 InstallSetup7.exe 97 PID 700 wrote to memory of 636 700 InstallSetup7.exe 97 PID 700 wrote to memory of 636 700 InstallSetup7.exe 97 PID 2844 wrote to memory of 3584 2844 BroomSetup.exe 98 PID 2844 wrote to memory of 3584 2844 BroomSetup.exe 98 PID 2844 wrote to memory of 3584 2844 BroomSetup.exe 98 PID 3584 wrote to memory of 944 3584 cmd.exe 101 PID 3584 wrote to memory of 944 3584 cmd.exe 101 PID 3584 wrote to memory of 944 3584 cmd.exe 101 PID 3584 wrote to memory of 1928 3584 cmd.exe 144 PID 3584 wrote to memory of 1928 3584 cmd.exe 144 PID 3584 wrote to memory of 1928 3584 cmd.exe 144 PID 328 wrote to memory of 3824 328 31839b57a4f11171d6abc8bbc4451ee4.exe 112 PID 328 wrote to memory of 3824 328 31839b57a4f11171d6abc8bbc4451ee4.exe 112 PID 328 wrote to memory of 3824 328 31839b57a4f11171d6abc8bbc4451ee4.exe 112 PID 328 wrote to memory of 3920 328 31839b57a4f11171d6abc8bbc4451ee4.exe 117 PID 328 wrote to memory of 3920 328 31839b57a4f11171d6abc8bbc4451ee4.exe 117 PID 3920 wrote to memory of 232 3920 cmd.exe 116 PID 3920 wrote to memory of 232 3920 cmd.exe 116 PID 328 wrote to memory of 3668 328 31839b57a4f11171d6abc8bbc4451ee4.exe 119 PID 328 wrote to memory of 3668 328 31839b57a4f11171d6abc8bbc4451ee4.exe 119 PID 328 wrote to memory of 3668 328 31839b57a4f11171d6abc8bbc4451ee4.exe 119 PID 328 wrote to memory of 4756 328 31839b57a4f11171d6abc8bbc4451ee4.exe 121 PID 328 wrote to memory of 4756 328 31839b57a4f11171d6abc8bbc4451ee4.exe 121 PID 328 wrote to memory of 4756 328 31839b57a4f11171d6abc8bbc4451ee4.exe 121 PID 328 wrote to memory of 1876 328 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 328 wrote to memory of 1876 328 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 328 wrote to memory of 1876 328 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 1876 wrote to memory of 4792 1876 csrss.exe 124 PID 1876 wrote to memory of 4792 1876 csrss.exe 124 PID 1876 wrote to memory of 4792 1876 csrss.exe 124 PID 1876 wrote to memory of 2944 1876 csrss.exe 127 PID 1876 wrote to memory of 2944 1876 csrss.exe 127 PID 1876 wrote to memory of 2944 1876 csrss.exe 127 PID 1876 wrote to memory of 3332 1876 csrss.exe 132 PID 1876 wrote to memory of 3332 1876 csrss.exe 132 PID 1876 wrote to memory of 3332 1876 csrss.exe 132 PID 636 wrote to memory of 3004 636 nse515F.tmp 135 PID 636 wrote to memory of 3004 636 nse515F.tmp 135 PID 636 wrote to memory of 3004 636 nse515F.tmp 135 PID 3004 wrote to memory of 1796 3004 cmd.exe 137 PID 3004 wrote to memory of 1796 3004 cmd.exe 137 PID 3004 wrote to memory of 1796 3004 cmd.exe 137 PID 1876 wrote to memory of 4644 1876 csrss.exe 139 PID 1876 wrote to memory of 4644 1876 csrss.exe 139 PID 3560 wrote to memory of 5044 3560 Process not Found 160 PID 3560 wrote to memory of 5044 3560 Process not Found 160 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:1928
-
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nse515F.tmpC:\Users\Admin\AppData\Local\Temp\nse515F.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nse515F.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:1796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 24524⤵
- Program crash
PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 25044⤵
- Program crash
PID:4080
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:184
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:4644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1172
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:4820
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3872 -ip 38721⤵PID:320
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 636 -ip 6361⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\ADB5.exeC:\Users\Admin\AppData\Local\Temp\ADB5.exe1⤵PID:5044
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1928
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
C:\Users\Admin\AppData\Local\Temp\B9CB.exeC:\Users\Admin\AppData\Local\Temp\B9CB.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4032 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\3e88e6b4-d277-4c38-a285-0cd799f655a6" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\B9CB.exe"C:\Users\Admin\AppData\Local\Temp\B9CB.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\B9CB.exeC:\Users\Admin\AppData\Local\Temp\B9CB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2244 -ip 22441⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 5681⤵
- Program crash
PID:4320
-
C:\Users\Admin\AppData\Local\Temp\B9CB.exe"C:\Users\Admin\AppData\Local\Temp\B9CB.exe" --Admin IsNotAutoStart IsNotTask1⤵
- Executes dropped EXE
PID:2244
-
C:\Users\Admin\AppData\Local\Temp\D207.exeC:\Users\Admin\AppData\Local\Temp\D207.exe1⤵
- Executes dropped EXE
PID:4008
-
C:\Users\Admin\AppData\Local\Temp\E717.exeC:\Users\Admin\AppData\Local\Temp\E717.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\E717.exeC:\Users\Admin\AppData\Local\Temp\E717.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\F215.exeC:\Users\Admin\AppData\Local\Temp\F215.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\FBBA.exeC:\Users\Admin\AppData\Local\Temp\FBBA.exe1⤵
- Executes dropped EXE
PID:4284
-
C:\Users\Admin\AppData\Local\Temp\13A.exeC:\Users\Admin\AppData\Local\Temp\13A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\5C5B.exeC:\Users\Admin\AppData\Local\Temp\5C5B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3184
-
-
C:\Users\Admin\AppData\Local\IdentityReference\peovkc\HostFile.exeC:\Users\Admin\AppData\Local\IdentityReference\peovkc\HostFile.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Users\Admin\AppData\Local\IdentityReference\peovkc\HostFile.exeC:\Users\Admin\AppData\Local\IdentityReference\peovkc\HostFile.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵
- Suspicious use of SetThreadContext
PID:3848 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe4⤵PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\pgvdtx.exeC:\Users\Admin\AppData\Local\Temp\pgvdtx.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\pgvdtx.exeC:\Users\Admin\AppData\Local\Temp\pgvdtx.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
98KB
MD52cdea7950924f93394e7593805d60584
SHA1f1a651fcd4ca005070acfb632035b5f2cd671afd
SHA25642e902a8d4de7ed26736a065a3d801a6ae5b6fe2ec1a46077e2468f0ae9ad1f0
SHA512b357dec43ec22783c87eb29f529cf67ddda930916e25c12481b16710d92029eeda57133bfe8f43861fd5b9d0a19041ddcbb97263672a930e6f48704df68f5676
-
Filesize
123KB
MD543b27771fe3fb352dcba049181b24671
SHA1d68cdf21ed8041b22315f98a7188dba84beee234
SHA25620c27059a64d667c7f52b5dc4ab4cb514f71568456588ace4711f72d62600957
SHA512c21b3629ddebe499bcff38b082ae70adce73a8ee542b727b19a43e7ce3895928a55fc543d99466a13dc51dea98f4512d22d62b64dd804889f097ae35c954f8b4
-
Filesize
71KB
MD557718be37fc75c741d18049361d0da56
SHA1d4c5ed6483ef135708e8072f5de95e0553374a44
SHA256cd3813947060fb8459adf7cb3f65823d73cc733c72d47ac20e3e216f5a09df7c
SHA51211a794cfa635d853e7bd14bf573515b0553a11e7542a038b4fe6958cfa3c73726231edc5216635cc42712b6aa9ed8ea4bf5cfeb3d155a98dd469416c15ec2562
-
Filesize
76KB
MD59fa2f521f71b601c6baa2a8d806934e5
SHA17084614fcae715a3a2b672f6d621a159cd3b7443
SHA2569289060dc5fc82b2e97ba6c35a1efa77f14ef49cb017c20f8702684c247391e7
SHA512ed9aadb996653e18bcd4235db2869e64754f03373124c88f8752dda63dfff2a50794d5f9c685e27bdc7700e0078f5ed54d43fb2457e2e7513dd0c42687ee9fdd
-
Filesize
1.5MB
MD5b3c9e1e36ec66ac0c73f24f81f231526
SHA1c6c551d3e11adadadca86e36755e2ffaba9a7903
SHA256892058240bc6a2ed5877e406fd7e4e8e8ed7df1c2a89a82f5ffa9f62824730a5
SHA5129359d087a0e9724fe961e14e23e57fde90e88633399f038d38e4546e5967bc1ffd421600d3d6e75d821e6e1875cfe875e7aaec657556f2e614c345a043019ddb
-
Filesize
1KB
MD59f5d0107d96d176b1ffcd5c7e7a42dc9
SHA1de83788e2f18629555c42a3e6fada12f70457141
SHA256d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097
SHA51286cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61
-
Filesize
43KB
MD50fa5678e9fd40382019f92becfebb2e1
SHA12f6e80bd528efc8149ef5d60777aa279901c9b21
SHA25678a1818fbc4f5ee12bca12bd3609d6b07208eb2b8cafcf6296a05e67892d4327
SHA5128284822458a6f37d157c5282f559dcf6be5f87aaf59c1fc8746db984c948286743d76b40561bb2c8113614852b0c2684430b0fd1b771ba06c31b750a7f7736c5
-
Filesize
148KB
MD52c506776ac5d03e710607c9710496b5d
SHA18672a1d60cca56e99852c47c80ff8fcb9861d3c3
SHA25658d04504665dd07fb7309b68b4012a575bcb44d9700040b7897d3b0ec07a2770
SHA51282ea24f4440b431fe828b0bdf8897116dd7fb56d8d4b9f404fb4239900899b5f6ffd815c2ca197251c131f6a0a202b7b66ab8ed06889844eb19118f78c4c68dc
-
Filesize
202KB
MD5fa6e85908cfae399b5fda649c11543e4
SHA13256081a00f2e1e69aa4c6948ffd68017bfa82ed
SHA2568bfd8af3dab9cbd6a085bde702605a03bf6873a086ba11218819e8f4f0efb6ba
SHA512d8341c2155a663b31801da95d4ba4af63b2b544eb1fdb13b3d9970476fbe54f28596ed877190cfa0b43f668f0b81fe7eb6bfcf6b5b895d3cb01944c71dd3607c
-
Filesize
168KB
MD50ab95c23be865c80912880eceef91e96
SHA14333ab2ba06a541733bc5ac03e89f5f6fe20915c
SHA256b7e30bf93f073b3100da5d97df9606838a26531ad9bdfbb6a31ca25c0b912960
SHA512d072f9fb9b8b67d9f6b4845e644169ed0b190cf1451c1491cc4d730c310badd8039c5e91823dd8cd7bca80434b0898550fe7d18a0c4c63cb51cda062e6599445
-
Filesize
140KB
MD57b3d42d3e18d265abaf13e484768b5ca
SHA1985a023e3767af22025ef75844ce09df19174413
SHA256e2d394c26cf83ae396cd5ccca719a7cb8c00ce16954b4bb90300787f3fc99931
SHA51222e77f9a5e3e54b6208d72e8d63dc6c6e29e05f19f3fa2ed1aec97d24835172e7f11a1517c52eeb6e1306e3ae1cf1c2afce2b127cc328538dae9d963f504035e
-
Filesize
1.5MB
MD51f733cd5d76cf3cbb83c64d6f55fba40
SHA1410ef9ce65ef3182685f0b7089b60b4228beaf97
SHA256df745498beb66de29aa9efa2356e6d18e59c37e498cfaa64d130551f0f96a5cb
SHA5124acb0ab2bcde29f7b48f9c23524ac6908aa8e11da0dd50fcc0f84e59bdd8f7a3ad2e1f59e8720130d02461db1429e78ca1e5cbf900e10258fd1ff9c77a27d425
-
Filesize
195KB
MD56080da7562b7f8d86ce822f134504894
SHA1a4339646f58a4c55b68d36cefe25e54a7e93b436
SHA25612a4e87f1b90bcbc8ef91011d67711d9e9a6b2228d7f03b8c4abcffcb8b5e356
SHA5123a1ed03eefe88fdeb0082a2229742430cf9e4e67a03c63ffdbb604eaebeb7ac864ab2d3b9b33e45aca1c0201803e4f339ac3a3662dd1f66434f8a67912360586
-
Filesize
186KB
MD516cefeff325e1d023f3b4ba3dced6c40
SHA125d971557de0494de5c7ac41c6c037fb28142649
SHA256eae72fd831b24b19b702c3cda31813604fa42ac351d7f05e4edc48b8ecb70a25
SHA512bdcca68e3867cdbdc989dd8772d32ee926a5cce03bdb96c7e550c01e23a3ef169d407d32963716bc0a727795f0fe7b5c46273b0c6f7a24e86693e1c4e6b85065
-
Filesize
103KB
MD50d53115d9c4619bed9d9ca2420246ed8
SHA172e94e3b80996b5ebd19fd878e01b9fb947d835a
SHA256c2fb57c98cc4c8dc82152b146740179ba2b14b753ca933fc2d3c03467e738527
SHA5127bc61bb47345473e4a5bd2f48f83c5c1799d920fc0a37b60ac66630fc98b3187935a9bf122c2aa6949345d56e382c4608e3ac3be5fb33e4eb9678d660a2833d2
-
Filesize
128KB
MD5b75709afbb9a3ac712fcfd77c0a15a3b
SHA1d469f8b0661e9240cf485035993e0f058fdc73cb
SHA25627ef9ea82b6cc80dd6339476ae3fec4fa35691a0889061b1c5f09f9e2f2cf854
SHA51225eab18e8baa0a2ba5d965566be1b0823b584c5e4e518ab307d3081e0704d01ea74daaa7b9e391f6b5f5d41cb775fb5ef71122c5fa1796d6d4c013b58bf5ee62
-
Filesize
92KB
MD50d2f090316d71c2422698af3c0ee9741
SHA115e9be9ec966fe82c449fa75262322e61bc539d7
SHA25691c836f1084ed30a0a5f4ca36d70ffc0e4c74176a374bd3233b71bdf4bf707e4
SHA512d7643c239bb15d7a91eebdb5ed280f350fb0e056cbb82fbcee54556edbcfe7706acad9486abcef429a789602e6e38e192c87e53cbc535d2c39ca5bcd852da20f
-
Filesize
11KB
MD5378442dfa1ef143c7c1c4f5525b900a1
SHA1e0f8fac8e58c88c61e39d06d74adba55943814b9
SHA2561b60848967eefebc90199f3fdb706dcc96fd6568d8adf4f3a1e06c142e8cd667
SHA512afd9c9181e7a4dcb2016ca46fdb0d7b3bac51f66d4619a27ff439fdf7018ac431d3f4bb5bf23d537021617dc44e712ccada0a3f82fcf50b31f0e762445f0b8ee
-
Filesize
258KB
MD5f61c26e36c722c659e5dbe50fc89416f
SHA188173c1b9103f21c86c508051db5c6abffefd46a
SHA256739c638c80f347a9e402a7d4989e66dbc756dad11b6cb63df114038dfaa0916b
SHA512785f6840e2cb6a1375cbc1dffff5103be634a65635b7c2f52d480800c564e7b204f5c876c4fb4fff982425d4ed130b393767969bc38eb9716016eb3455659fa5
-
Filesize
90KB
MD5f4b0a556cf0f2eeb1031fb9bb6800e43
SHA17ad41cf23375fe608e805dd9e12eda4ad4178025
SHA25629f32869437ee9ea815b55102361e7b64a9f04a25d5c717816c155a3e18b894c
SHA512a6f09287f6b89aa772aa0a60d4620597039b61a830ca5085777aa8356a1223f1a2f872e0023d7041074b0bfe1ac2eb329cd0a1d3323eefcca1f45f16bd219c79
-
Filesize
104KB
MD5b2f7eeed4cd44562dd3ba86ff40e6e53
SHA14989cc6ffeaada02b793eb18bce080aae692b889
SHA2569db1410f26f9f5fa6e3d7485a2a5f88c9e5188661dc88c273a93c819c306154d
SHA512c697a31f08c4de678bb1746e8e2a56aef59eaf180040d75cc983966f201413743d1b1ed7752fc009ced47247347033fa2c9827b40d5b22bdb48a858fd28c1ab0
-
Filesize
154KB
MD5c5020d708a8df151dc7c0952c6a719ea
SHA1565134872c816f27f2796db2507481c5855d6577
SHA256b4498814357d1dea4ab4bbf9a101b0a9ae27715af987113cbd44a12eccd8b6a0
SHA512aa4c024d61d08a5b933814eef8e2b97e9e4fedba9252f7784421eeccb30cf84b3950e58b526c849716e76164b22539c5550f2b85d2080ab327bd783d87d27922
-
Filesize
94KB
MD560172292d53cef69b3ab8d0e0c4d5001
SHA1513aa15a4f06aedc9e7ca15a3f1eb95d1f7e8011
SHA256f8c814c81c3de2b3e8f3505be22498896f633f8ab5b4ea535fef01322d53fe9c
SHA512063a775b4b53aceef3761f6af7239e76fe9aabeace39f8c4773c35c3032cb2f63316a75390548538e6327e1157a4fe596d40d06f4bac7e2358078ba55b8491aa
-
Filesize
45KB
MD5dd7ed439c62f940fcc0fd8c3550074b7
SHA1d5e816545187b64162d62e64094cac8cd31021bf
SHA256b1d036c0734df4ef00d55a769bfe73debb14ff9a3b13cb358c4815f09d0304ee
SHA512a07e2da7d75daf6fb153d2b7c9a494efe08e74fc2505cc2e5fea261cd6da6c9b576e1c2bc840f21eec74c39f910814d8a7f7e7003a4ee785fb567f18de0b78bb
-
Filesize
57KB
MD5c9e5ed94f3cf1f4609088a7ef923c02b
SHA12b65b04a6b9bdc5d3cdfe0df4f38ab28a2cd26ce
SHA256c7cb485adefdf31e9e2b4c5200e0220b1b40acb77ee9a4429c06f3f8210f0f32
SHA5121b1d93e46b4c5894a67747e4137933a5b96b3ee154b4b9b05123a16378fffe5f4e8153a1ca3d72ab41a48f729158f50a88d6c0b640cdfa8ae74322dc6640cb39
-
Filesize
24KB
MD544469b239173694f075db04f9b1ce1ed
SHA1fd2ab161dedea71eeadeac23295b0c104ab27de6
SHA256b9290249e181358ad334d3c8995d91a73d84141dad4a5a91168911dd4611d0a2
SHA512fb93ef0473abed8428d29b3913937a84b63cd0e05deed8da4224a67c8f578c3b5187bf2d1d28a0b459ab79957e1a6a6b1a886d824a82d796367a43b2a53a0abf
-
Filesize
71KB
MD5e59b132d7e43b8bff4dabbeaac8762a1
SHA1ec8ead7cfbfb1418cfb67068f9a17a0f820a1edc
SHA256ab9e90acaaa2b95eb1d2d842cc8a3063cfccf952db1709ace6c78794b24b03ff
SHA512a3faf66c899dd84dc90a9b032c9fc58932dc8226aef682e1fe5fd43fc5ab62e3cb8a2f992c5eff9aaab4fb9b44eae53aeec452d187345724efefb2e450c1efbd
-
Filesize
327KB
MD598f1a51e6d952dbeb600464ff085b9fc
SHA11a5e9f278f923373404a553f7a7b59caaf4be4b6
SHA25652cc621116a0198341d869121231aa753a1ee540c65a6387ad3312ebddfc0cf5
SHA5120ff63f1f072cbdeabb38289c5a5ef6d3e3bd27bfbdc194daf65e535dcd78e0b90b82b1f9f6d46cb7f02af042bd4e9d12c4e5a6e549ea31a9ba3bc32f5a875cec
-
Filesize
136KB
MD54a8b7516c6408ad83c9dbf31bdd127d3
SHA144a7f9f5a56c0fb62e377278a26193e69cc3f621
SHA2567fbba82c57aec78c02659dc902b5f5e02b499ef4a814dd9cb8651f1eb573b19d
SHA512e5990175aec87303a17d45e0c2131c56fc6c93aed3f51d43d4435fd4fecb65a201bf59778365ffd230cb290478a595bb449b9b96167848fc8fa7d61731831e0c
-
Filesize
195KB
MD5defbe2bfeae19485d28044df7e94d9a3
SHA1fb78d889127aafd4156795fc5097fb0810881324
SHA256b8fb57ae17abc36c36aea5db487e2974761b8216f3e4d62c49224f9de8f58110
SHA5125fc45e35d684110c6f394081c77fe0ba7afe86d6b249b27bdc5b50c9ee5d5c996640971329d6f8d44cf45165aee272c25e8070ccc7a92ff0df0a8e55214fd06c
-
Filesize
466KB
MD506c3776e98995395907a09053c010efd
SHA14401a196f942cfd5b1cf2b445c1127b89c6f046b
SHA2568e180a5d58f8e8a3fe3b14d5dc33c04290ffcc02f6504bea34d4cf1c959e2aea
SHA5121c06774d4071549995d3305a213ec90a32db1b8b56cdaddfa23f93656af94ac0e27f564a5eb74028516ca4ee42d9a53e7fe5b8dc110b25fdba5f9c0fd0c8670b
-
Filesize
374KB
MD52796d5169ac409342fdb796626015367
SHA166dcbb3e145a44c9ccece81bbad8f6e16d0ed71e
SHA256e15e510bfe446477875548ac9df12f62fbdcb591694de64091e491896c885cc8
SHA5120d59c6ec362296c98b629f5d479d76afa1feb38c5a4539ea4e774bd27acd2277f65c988a2fe61e72d3feee34c8b847c81ee51b5edcd76f67c27fa46913e7ea15
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
48KB
MD58e2e0b353f00ee79a1359ea5c0d3c51d
SHA181090801343d6affee2b273fb011628412394f35
SHA25601a2fc98f5bb5c4b98f9e0de3d7ebbd241781e9a2be4f76c5408a65f9c0b0167
SHA51290401a4af518095e9cb2c21fb6b538265d2be6301497b226a36bf4a96cc10475466170548b5868acbff692c6abdf8400a1454a7d303f31147c9508c97ec762fe
-
Filesize
51KB
MD5e0dabefc703a776f1bcb5d76d04e3111
SHA16eec6021143af3a679886297f45bc6303e0461b3
SHA256095e6d3fd54363dcbc30d3754682fbe7e69d1c147040b2d9f95e0bb1ced7a0dd
SHA512a23279de6bd6ab98f20e7685dc18778f1a528b65788f7b6ae50da7584e3ea8c2e3d2bb91cbf235e3f251db4b95a0e78242994b5110d14dea2e7389cbae4bc306
-
Filesize
49KB
MD5c72184441d2d728198dca06f0858083a
SHA1f42d5082d00a4fa838e60dcdbe059bffe223a102
SHA256ffe0e52ea8688f498761f7cb4399f0faedfb394ee20f2b778c76d7dfd11d33d2
SHA51218c94cca9f18ec677072a69a2360f380c605914caa3c990bc4190d76e6790cd27fca9e68031e18672fbc923f0c6543fcbb2c1e6b9764ab6a5322830ef51b29ec
-
Filesize
134KB
MD5e040a9ebf2fe86362cdd837cc9cc9835
SHA15c9568d2847cec16426c220e05d6b2ddc5358097
SHA256a816b04f79088088850d61d0bf1cb1f9183809b28e131be7f4383f538df18cdb
SHA51278d8ff0311a59005108326e0cee8d1e802fbd925f37660f2ca9bcd3856d2698d6a202f659853d6643a481408213e5c813ec2eea57e692494a67d28b4552fc9e3
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
825KB
MD58fb7fd1387b37d326315cb7414b0f183
SHA183c3368646777d5e0f5666f8b4f87df6999634de
SHA256a02a6d0ef3a4f4415829b8d27704be0c7b338b6e9e6c561b9a1874ccdbc156b6
SHA512fce7a97ecf314c752eb51c30d25ac79088a6c7c961adcfff83c308ac48ed25e18c2aabfc47d1a4c4abd2299a5f0fcaa941f6dd0bbca97f23ed2c3a17de3a669a
-
Filesize
153KB
MD59a5c6a620d8cd63948487419407f451d
SHA1db803884424a0fdb29f8bf61ebf4ecabf90819fc
SHA2560b9cb1cf0cc601d9689484ff5e4cdc50e5be099ade4498435452dac9e6c451c0
SHA512dcae8d9f137a4db8e954e7934b9471394256a3ab42e8e126f13c1c53a1854ec9da940dc36e01bea241484a6d650cada58f8065ee9432dc02a26fbfb45665223f
-
Filesize
85KB
MD50065b5d39a7ec996f976003434affc6a
SHA12b7ae17ccadd8b2fd66f324dcc15a1bf332f9344
SHA25674b24c2af6d267cbd4ac65784005cf256280f17a0159873587681b6c0634d6d2
SHA5120522fc28321b18968a56c83174d3926e7b0abd606c3f9316ef61b9a1ecfbe827940363110e2f25f6f67c020d58c7125da2c1841b9f9a96415574380b710ed5db
-
Filesize
152KB
MD559236ffe165228bdbe45715a00e56b51
SHA196a8cb642dabb7e197f22e099e2c4eb3cf008768
SHA2562f578af4fbd870753aae7c832495811225a5133fe8e72ae39ba92f3871aff322
SHA51274727a6f69c911c75581eab45e66f952ee21dc79ec305569eb03e649855826fd23e1c017351c1d34362677fc3331eed2d5d350f3f4980b7d50bae640a08d17c9
-
Filesize
243KB
MD5ebf10985faf86a305e792da34f224a02
SHA1409dcdfc04cd0f4b3635c636a90e90e5464268aa
SHA2562bf6f1f1296c076b969021708adbf0447385d6a7d5793ad633aa40d51350cfe6
SHA5128289ddba4192060bc587c006d121857055e1d39dbadb77b505fb0b3a8891ad4d60fadb0845ea42f99616f805d265f09d8267fa0cc6128c15f8036454842f7887
-
Filesize
270KB
MD5c0b633a98fa5893164a9df18f41509cd
SHA1b89c597843a879e812e41141665ae69d772cf177
SHA256e6881e2872ea0f78055c7eb46aa0e1d82ffbb69ad58083f3c9627bc3cf3f0647
SHA5121cd92f83863326320c8fcba9c09758cf088577e034fe5ec240e08a5281d4ec380112a30292cd14656f896454c3819295992a78ff748b6b1f0fc552f62d7f3986
-
Filesize
272KB
MD543c66bb7924057abaf91e8ac6cc54072
SHA1d05479ac2b8016f9435a75c5ec9506ff42b56563
SHA25635852b3d65c820d9d95c4b5105b5f8ace19a951932111c8b6929b0651591288c
SHA51269b9b5d98e2d098cd48c645bd0dab4dbeadac1614a9e3e373c03c4c171a676188a2874524b2231404b18c742d144d1f4f7722f44daeb4da733eafd42c17d1f62
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58de0e0ae3b2e721c894e910511840e07
SHA19a052f060c8e8c0ac071b2e9e48575af78d8dc42
SHA256b9cb53429d5cf62a3e0ca59c85b8475a69dcf11d22a4cf701edec41395abeb7d
SHA512ab228d0912105cb75374e22902ee5d5667aafe6f9922a8718b9189563658beaf8ff40a3cf94a23a20ecfd7d22316ede8f12c0a2652d491c13678df550f967c77
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50643b8339b8f844309264b62cf035d10
SHA1af1954b3d2c685190577b30473313afb2edc59eb
SHA256687d401ae9f78c56b39217d5e694dc4a5b149f29e57bb9754801f620c5177e26
SHA5126ab0f5e7227de884c755e2df85c53152ebaabd66ffa8ac811a9ed63cd812f43c21f2717fb7eb455c6f1ebf2a828563db9e3f37fdcfa2b40c7c592ab6963e7e72
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f7080d977616c4323e96b62e0d62a274
SHA1b348e7b0536123beefe1960d15d2036fcd007ca2
SHA256b401c3976f52ba30b33662b6aebcbd20aee37fb49dd4602ef7e5805daad28121
SHA5126bc6f77440e0946481629ca481d758e555a3b2a793929e84ad3eed71412f9127d879de379e180a71e24bed9c2698d9224c1e5ff2b03fafab988f35fce9ab4569
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD508e82fbe21b53b2e0bdfcdf15e5df2d7
SHA11082c67349103977f2f3f21e3aabf7616859c7ad
SHA256a1bab0a2cf97647ac317fd5301e82bfce696b2f1629a9bfa637613ff6d9fb646
SHA5121990f15d48c30d4efc2765a51d470b9d47684485a50dd3f0d642748d601843c251504a01e95bd48fd24f4f33137ebe542212623be2f2d13a1f742581f704f309
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD511453e1b4d713502f868b057508576c2
SHA1622c284f29f000a175c02c9de34d5a1cd976b750
SHA256bd222ce9785a6b39801aa65d767519ab442b5bf8f7a66d7c7ad6777b1eca2d77
SHA51221455cb05857e6ba52d57f893a2b0b58958836dc1761874b3618c1c466e0df7f2114aba99805686442dc62a7c575f66c090a023321f7adf97c4fb80b9e627d0f
-
Filesize
53KB
MD56ac15f397366507e1466e3a628ab8a42
SHA14c07a1d1d05a845756682ef0186c3843b4783b0d
SHA256a375459c8e7b704ee25c8cdbfab309002c218fb863460abf97f0ca62b1a572e7
SHA512ce8b029a1f37e52a82f8bda6d3e990b71c6db23514665a3d09cba2f4a0ce2022f3c34fd9998abe33aa151dd5d648dba2debebe6215687911d71ea61d849cff06
-
Filesize
22KB
MD596e19d18b52349c66cbdefe1b833d83d
SHA1b24e493e497f548f32b78c90de4415863465f477
SHA256cd0db45642be6f33bc4ae5529b80f12225f21ebeb6f7f9411cc66a87fc31a1a2
SHA512becca58fdae95d4fda991b4691637c2dccf716a959233e8ddeebb302150fe1576deb92f40864bc885d395b99091e74e84cf38bb614a178e4d1fa440261f03440
-
Filesize
352KB
MD5ab62a84667afec66cda898dae01e5105
SHA11e606573a1ca09936ae0f92b8ca4b454f7e0c009
SHA256ed1ad1c74b536a33c7c7d5c680b99fc7acf47cfee449cb80bca8eb37f291fb9f
SHA51271070b14a4d020d5cc8b669de18da013311d6756377b41162a74c02c5b9b1ecd5bbe4e450d20b5a0084c8b46a356446db12a885a53e669a22f0f662af1c54ac1
-
Filesize
7KB
MD5b3d793dccc5570ad3c2620d09028a42d
SHA14b7171f6b40ab31b50881ab034d3e8d44da726bf
SHA2569efe7afd54aa482ac175c19785861630e18ea85fff928f9f21f0615e43ba69a8
SHA512b639ae8b913d2bbc8dbded1b865956a07c4f5f1bc736c454d0fc7a4059c0a5b5579765784cb2c473d281aa3445183dc3d8a010e04c894aea819b5792cbf04e32
-
Filesize
345KB
MD5151031a3c2e45cf5bc1949272fef5988
SHA1b5740b767cdff237c2ad8a4f2b144b8756654b09
SHA256833e21b8579b4bfa281821ce50cd518f1a6502fb9102d2db0ef7b030cda02f7b
SHA512b96d960b38c5d6399d3456677afe27cb479561c9334f4ddb2864e96784b19a05a04cfc47380941aa75bdc239734da84939e835440a9e57c9c2fc9902c1958817