Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 06:15
Static task
static1
General
-
Target
latestrocki.exe
-
Size
6.5MB
-
MD5
0518d9c6db9a614769bf43fbff180167
-
SHA1
928084a70bffb6eb474658dcf062d74f5ca84f68
-
SHA256
6369f6e4a8398cccbbebef2ae7078834d3f92d499257a59b4f9142bd5b079057
-
SHA512
a3a9ae62006133d5e6e7d74527732d6f245c7bfbb8770fba371e877c56b47b61fd5e809eac7e462013c811ab4e49c1162ce16eec7dd15db76530ea09c2a0cbf1
-
SSDEEP
196608:21qELhrUIpNiSF4B3ri+e7UDV2BnIuaR:shRpNPcrrDVgnIH
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/1364-158-0x0000000002BE0000-0x0000000002D10000-memory.dmp family_fabookie -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/2328-479-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2328-481-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2328-477-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2328-492-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3940-499-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3940-501-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3940-498-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/3264-42-0x0000000002DF0000-0x00000000036DB000-memory.dmp family_glupteba behavioral2/memory/3264-50-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1920-123-0x0000000002E90000-0x000000000377B000-memory.dmp family_glupteba behavioral2/memory/1920-124-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3264-126-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1920-357-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4136-444-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4136-504-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4136-509-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4136-515-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3816 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation CBAD.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation latestrocki.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation nsm57E7.tmp -
Executes dropped EXE 25 IoCs
pid Process 4080 InstallSetup7.exe 4996 toolspub1.exe 3264 31839b57a4f11171d6abc8bbc4451ee4.exe 1364 rty25.exe 5040 BroomSetup.exe 1840 nsm57E7.tmp 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 4136 csrss.exe 372 injector.exe 1888 B6DC.exe 4720 windefender.exe 4004 windefender.exe 4476 CBAD.exe 2328 CBAD.exe 3956 CBAD.exe 3940 CBAD.exe 3364 4989.exe 4656 6D8D.exe 3092 7DDA.exe 1476 8B0A.exe 4600 6D8D.exe 4276 A123.exe 2924 3B6.exe 1404 HostFile.exe 4648 HostFile.exe -
Loads dropped DLL 4 IoCs
pid Process 4080 InstallSetup7.exe 4080 InstallSetup7.exe 1840 nsm57E7.tmp 1840 nsm57E7.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4400 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000c00000002323c-458.dat upx behavioral2/files/0x000c00000002323c-459.dat upx behavioral2/files/0x000c00000002323c-461.dat upx behavioral2/memory/4720-462-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4004-506-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4004-517-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\389c5317-dcc8-4eab-8bf6-103021e29005\\CBAD.exe\" --AutoStart" CBAD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log WerFault.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive 7DDA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4476 set thread context of 2328 4476 CBAD.exe 155 PID 3956 set thread context of 3940 3956 CBAD.exe 162 PID 3092 set thread context of 1092 3092 7DDA.exe 167 PID 4656 set thread context of 4600 4656 6D8D.exe 170 PID 4276 set thread context of 1396 4276 A123.exe 179 PID 2924 set thread context of 3944 2924 3B6.exe 181 PID 1404 set thread context of 4648 1404 HostFile.exe 183 PID 4648 set thread context of 2132 4648 HostFile.exe 186 PID 2132 set thread context of 3596 2132 MSBuild.exe 187 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2472 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2476 1864 WerFault.exe 97 1448 1840 WerFault.exe 105 4032 3940 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B6DC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B6DC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B6DC.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsm57E7.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsm57E7.tmp -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2260 schtasks.exe 1248 schtasks.exe 4776 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4804 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 7DDA.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 7DDA.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed 7DDA.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4996 toolspub1.exe 4996 toolspub1.exe 1864 powershell.exe 1864 powershell.exe 1864 powershell.exe 1840 nsm57E7.tmp 1840 nsm57E7.tmp 3264 31839b57a4f11171d6abc8bbc4451ee4.exe 3264 31839b57a4f11171d6abc8bbc4451ee4.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 1592 WerFault.exe 1592 WerFault.exe 3436 Process not Found 3436 Process not Found 1592 WerFault.exe 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found 3436 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4996 toolspub1.exe 1888 B6DC.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 3264 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 3264 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 1592 WerFault.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 4896 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 208 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 3092 7DDA.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 2476 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 2916 powershell.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeSystemEnvironmentPrivilege 4136 csrss.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeSecurityPrivilege 2472 sc.exe Token: SeSecurityPrivilege 2472 sc.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 4656 6D8D.exe Token: SeDebugPrivilege 4600 6D8D.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 1092 RegAsm.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 1396 jsc.exe Token: SeDebugPrivilege 1404 HostFile.exe Token: SeShutdownPrivilege 3436 Process not Found Token: SeCreatePagefilePrivilege 3436 Process not Found Token: SeDebugPrivilege 4648 HostFile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5040 BroomSetup.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4080 2588 latestrocki.exe 91 PID 2588 wrote to memory of 4080 2588 latestrocki.exe 91 PID 2588 wrote to memory of 4080 2588 latestrocki.exe 91 PID 2588 wrote to memory of 4996 2588 latestrocki.exe 92 PID 2588 wrote to memory of 4996 2588 latestrocki.exe 92 PID 2588 wrote to memory of 4996 2588 latestrocki.exe 92 PID 2588 wrote to memory of 3264 2588 latestrocki.exe 93 PID 2588 wrote to memory of 3264 2588 latestrocki.exe 93 PID 2588 wrote to memory of 3264 2588 latestrocki.exe 93 PID 2588 wrote to memory of 1364 2588 latestrocki.exe 94 PID 2588 wrote to memory of 1364 2588 latestrocki.exe 94 PID 4080 wrote to memory of 5040 4080 InstallSetup7.exe 95 PID 4080 wrote to memory of 5040 4080 InstallSetup7.exe 95 PID 4080 wrote to memory of 5040 4080 InstallSetup7.exe 95 PID 3264 wrote to memory of 1864 3264 31839b57a4f11171d6abc8bbc4451ee4.exe 97 PID 3264 wrote to memory of 1864 3264 31839b57a4f11171d6abc8bbc4451ee4.exe 97 PID 3264 wrote to memory of 1864 3264 31839b57a4f11171d6abc8bbc4451ee4.exe 97 PID 4080 wrote to memory of 1840 4080 InstallSetup7.exe 105 PID 4080 wrote to memory of 1840 4080 InstallSetup7.exe 105 PID 4080 wrote to memory of 1840 4080 InstallSetup7.exe 105 PID 5040 wrote to memory of 756 5040 BroomSetup.exe 101 PID 5040 wrote to memory of 756 5040 BroomSetup.exe 101 PID 5040 wrote to memory of 756 5040 BroomSetup.exe 101 PID 756 wrote to memory of 3500 756 cmd.exe 102 PID 756 wrote to memory of 3500 756 cmd.exe 102 PID 756 wrote to memory of 3500 756 cmd.exe 102 PID 756 wrote to memory of 2260 756 cmd.exe 103 PID 756 wrote to memory of 2260 756 cmd.exe 103 PID 756 wrote to memory of 2260 756 cmd.exe 103 PID 1920 wrote to memory of 1592 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 141 PID 1920 wrote to memory of 1592 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 141 PID 1920 wrote to memory of 1592 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 141 PID 1920 wrote to memory of 3456 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 1920 wrote to memory of 3456 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 122 PID 3456 wrote to memory of 3816 3456 cmd.exe 121 PID 3456 wrote to memory of 3816 3456 cmd.exe 121 PID 1920 wrote to memory of 4896 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 1920 wrote to memory of 4896 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 1920 wrote to memory of 4896 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 123 PID 1920 wrote to memory of 208 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 126 PID 1920 wrote to memory of 208 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 126 PID 1920 wrote to memory of 208 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 126 PID 1920 wrote to memory of 4136 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 127 PID 1920 wrote to memory of 4136 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 127 PID 1920 wrote to memory of 4136 1920 31839b57a4f11171d6abc8bbc4451ee4.exe 127 PID 4136 wrote to memory of 3092 4136 csrss.exe 166 PID 4136 wrote to memory of 3092 4136 csrss.exe 166 PID 4136 wrote to memory of 3092 4136 csrss.exe 166 PID 4136 wrote to memory of 2476 4136 csrss.exe 130 PID 4136 wrote to memory of 2476 4136 csrss.exe 130 PID 4136 wrote to memory of 2476 4136 csrss.exe 130 PID 4136 wrote to memory of 2916 4136 csrss.exe 137 PID 4136 wrote to memory of 2916 4136 csrss.exe 137 PID 4136 wrote to memory of 2916 4136 csrss.exe 137 PID 1840 wrote to memory of 1404 1840 nsm57E7.tmp 142 PID 1840 wrote to memory of 1404 1840 nsm57E7.tmp 142 PID 1840 wrote to memory of 1404 1840 nsm57E7.tmp 142 PID 1404 wrote to memory of 4804 1404 cmd.exe 140 PID 1404 wrote to memory of 4804 1404 cmd.exe 140 PID 1404 wrote to memory of 4804 1404 cmd.exe 140 PID 4136 wrote to memory of 372 4136 csrss.exe 144 PID 4136 wrote to memory of 372 4136 csrss.exe 144 PID 3436 wrote to memory of 1888 3436 Process not Found 145 PID 3436 wrote to memory of 1888 3436 Process not Found 145 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:3500
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:2260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsm57E7.tmpC:\Users\Admin\AppData\Local\Temp\nsm57E7.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 24044⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsm57E7.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 23044⤵
- Program crash
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:960
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:372
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4776
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:4720
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1864 -ip 18641⤵PID:4804
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:3816
-
C:\Windows\SysWOW64\timeout.exetimeout /t 51⤵
- Delays execution with timeout.exe
PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1840 -ip 18401⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
C:\Users\Admin\AppData\Local\Temp\B6DC.exeC:\Users\Admin\AppData\Local\Temp\B6DC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1888
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4004
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\CBAD.exeC:\Users\Admin\AppData\Local\Temp\CBAD.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\CBAD.exe"C:\Users\Admin\AppData\Local\Temp\CBAD.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\CBAD.exe"C:\Users\Admin\AppData\Local\Temp\CBAD.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
PID:3940
-
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\389c5317-dcc8-4eab-8bf6-103021e29005" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\CBAD.exeC:\Users\Admin\AppData\Local\Temp\CBAD.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3940 -ip 39401⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 5681⤵
- Program crash
PID:4032
-
C:\Users\Admin\AppData\Local\Temp\4989.exeC:\Users\Admin\AppData\Local\Temp\4989.exe1⤵
- Executes dropped EXE
PID:3364
-
C:\Users\Admin\AppData\Local\Temp\6D8D.exeC:\Users\Admin\AppData\Local\Temp\6D8D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\6D8D.exeC:\Users\Admin\AppData\Local\Temp\6D8D.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\7DDA.exeC:\Users\Admin\AppData\Local\Temp\7DDA.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\8B0A.exeC:\Users\Admin\AppData\Local\Temp\8B0A.exe1⤵
- Executes dropped EXE
PID:1476
-
C:\Users\Admin\AppData\Local\Temp\A123.exeC:\Users\Admin\AppData\Local\Temp\A123.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\3B6.exeC:\Users\Admin\AppData\Local\Temp\3B6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3944
-
-
C:\Users\Admin\AppData\Local\IdentityReference\cosfupyuc\HostFile.exeC:\Users\Admin\AppData\Local\IdentityReference\cosfupyuc\HostFile.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Users\Admin\AppData\Local\IdentityReference\cosfupyuc\HostFile.exeC:\Users\Admin\AppData\Local\IdentityReference\cosfupyuc\HostFile.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵
- Suspicious use of SetThreadContext
PID:2132 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe4⤵PID:3596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
210KB
MD543281a1ec0313c67c00fac98438384ba
SHA1e67c87049e52459c4af4a1a16794605684c0f112
SHA256cc6484a57b13de0b927270beaf21fbe097dc54c4224746d7fca56c2ef1367216
SHA512d372403e45f48c22d426e2e688ef116fcb5e448065017ded6673e450a7c27e8d928e5a18f55817174fefd5b1753663d4acb552f08ded9e64f21248808d945459
-
Filesize
158KB
MD524891954859cccfd590c74175be11e15
SHA165041880872d775ea4d911ea90614cc7f94d1724
SHA256d7e08436ca4b46c9854c68c39c680445ab2f9473310fee33c3a711d153a44c86
SHA5125ef13b9a70916f38a51d69bfb556c63ffa5e949e9c1774b1523e975935f0f9b0d98ae51a48cb3d118617220e99fa0e0360eb72979f5ae23e2be55c9df3ca9b07
-
Filesize
397KB
MD54f05ceb22284bb8dbb922510206198ff
SHA15429205e204b950150ccc310f95b3eb68ea0c17a
SHA256da51edcf4ad5f5f5e455db6821e28f6a6e4083517a593201229d1eb3115f912c
SHA5121b3e72be5ab070992f7c69f0820dddc5584d7ea55ec33f99fe521650945426927d1eb33602348451d278d0d2d8e6990d58f1f9a65eb55c1de33f8c2caa55b9cf
-
Filesize
87KB
MD5b229193992c9bac348dbb11dd8c4560f
SHA13ee6a3911bc9f9c2f012345c984ffea1662240fc
SHA2561726a5a4a26de6f74d265f1c9ac75fe0daf18693c48eabae812377dd3f30b149
SHA512dccbed7ca51256bc855e281b7720cf004af3883591267d3c1f15dc840ab0a5bfe1d1a48d459af435b0c59e10d6a4661eb391d44ee8516da92c1b46dcb5b53ca1
-
Filesize
784KB
MD5a2a8cc2aaba893f16e991e5080c1765f
SHA1a0a3ddb256d5d83c74f79576564d531bb5a33c6c
SHA25698e0189a382867f9e085b594e7fe4c513401c22781378081516c1d5d4913165e
SHA512049579cbae8e184508dd7f6c5b066e0d92e103a3e4802d606bce61f1246b0ede84ed59731c8c88c7a34a0165c230a17b37dc7fc9ed102b2d1d44050326d1dc12
-
Filesize
733KB
MD50b433a06592cb605c824c40af31ac8ce
SHA1f51eb69df5b10765f5eb87cba9e2126bb0c600bf
SHA25680a46ac8bcc4a3ec63f1d17aaf10c02656fb8d821270b08427a15551953bc1a3
SHA512b446278609ccc845bafb0ff6906ad28c117250cc904a2047bddb4ad421933a5698b4d066285d62ca8fa935de8d326c9e0eeaad83c527af2ab0054a0779854137
-
Filesize
1KB
MD59f5d0107d96d176b1ffcd5c7e7a42dc9
SHA1de83788e2f18629555c42a3e6fada12f70457141
SHA256d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097
SHA51286cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61
-
Filesize
57KB
MD57ba15d78223d724d255fac8d6717d999
SHA14a12abadaa3d8e24823728ceb6dbd33a108cc1e2
SHA256f4842537d58cac192fb4f094446f4f64d9217476b0b54b14271dc40afa059dd3
SHA51265da86056cae34702c5a3aa4b6088df1365af8f7a344931d690609c0b736f1c5915387e77139826121a223ebc1af868b644e28950bb01f898c745ca221a266ed
-
Filesize
546KB
MD5f8f1b72513ea14172d290bed08498262
SHA1717a5385a9a3838b44672e5922ca473a836d71b1
SHA25682283fe725887a7935c6e9566864583480ad927200abb77cc52ebfa9628caae3
SHA512895e2c4078e6e12e615e4c5a75f37ad496d27bda34c0e0766b594f1b2b567fc0eddf0d5de11e614b435aabd50fb7887e40e6cf13e5b3f450f3c70977b70401cb
-
Filesize
446KB
MD56154665e7174f3443c56ff1fd1fd89fd
SHA1a5a4a41910aa30aa33fb5b2bdedd8b6452e5cf5e
SHA25615809e89c7e414049e4f211982e50459e32d2c153dff37db90ffbd3b812cfd66
SHA51219ac2814327011009cc71e2fa930596f3e78aafee8fa7e62917b236c108d2f84be58a9a164484a9b14575a901c276aeaeb4c681c3fd7a1da575e44ce1e9a57c3
-
Filesize
417KB
MD5dfece48f4760d6452c1560cfb859980b
SHA19293034388ed356e69d2e9f796aa873a235822bd
SHA256a8a714c4bc93a460cc8d10d77115aa05868ed580a44400cf3f01b7c5d6ab0852
SHA5127f434e94dedbb00bea8aaf25f9ee611b417c16e6fb32fb9b7df92dc3dc917aaf0c217e895d6545463fd59326c6a6f88d78c7f83dda8a00298f6d9abdfc251d89
-
Filesize
330KB
MD518f474b8b29942e09c88c2f3136218f7
SHA16c71ebe56f2a7a9b157b9988918ce16c84058d33
SHA2560c039da9c47a7158177813a92b44b906f248e19ac6bd906cdf34fd5a6e24aeed
SHA51288927df9928ea71d64a3518f19d7a2f6b10fc72181ae446f8a506f07f7c85616029efecf2f8daf3fb733f313cc5d9c5e967b3c51faca565cb5a8a6fc07f735b4
-
Filesize
264KB
MD55b0500ec7a44e931f58d5fc10026cd46
SHA1eeadfcaac2ffe2f211a1070a0b0d9da28ad81d8d
SHA2560ad5f8dcdcc335e2a5d9e960316ede4ca83cba14a4ecbb5d4f0e323093fa6522
SHA51291f55f4e4ea6bb098a3cdfc021aff9559e1a3388316b6b11d9150ceee12f1ebaa0238f257d2c570bbf70ecffd43f4953709faa6a47e0db0d60172ecf974a769d
-
Filesize
842KB
MD54fec5fd5a854196dbce1165487be5208
SHA10d349eb91eb6d212187321bbdaed14430bc136c3
SHA2561ffc6d6ead3d48e7dbd53153a68be091970ddd1e7c8f02af0a2fd8507822145d
SHA512bbfeb2d596e42a7e9d23a75d6cb3c29fb08e17da8a778508b7c6798cbf596d9d1ffacf930ec13012436fd1840dd605d21f6d0b21136a610eb9011aec7279aa7f
-
Filesize
1.0MB
MD522e13119e523c8fa8ddf3ed4c2dcc7a7
SHA19c522354e197d77f628af6ed3370d7868577b9f1
SHA2561283ab7f27c27ba6ea7e2e9b5f71f592f49aec4bbcfd52e2456c3b6b169f0a92
SHA512a0742e0c0b2b88f59af512e74eebde8cc79c2bd73a7c9bba2c1516ec40bf8578b2619ba4707145e1a7b038d5fce2eaf16dde7cfb49c8345ccd54495675ed8338
-
Filesize
1.5MB
MD5b3c9e1e36ec66ac0c73f24f81f231526
SHA1c6c551d3e11adadadca86e36755e2ffaba9a7903
SHA256892058240bc6a2ed5877e406fd7e4e8e8ed7df1c2a89a82f5ffa9f62824730a5
SHA5129359d087a0e9724fe961e14e23e57fde90e88633399f038d38e4546e5967bc1ffd421600d3d6e75d821e6e1875cfe875e7aaec657556f2e614c345a043019ddb
-
Filesize
341KB
MD52ce0ea34614b1c045893ffcf2ca33ca7
SHA1085a0de6ca5d92a78618c4e7b08c5aec2621cd2b
SHA2569b102f2285c92fdb90472887b18b96b50e6f4382e27f39bbb708afdf08b11d6b
SHA51245b5430f081889f95f3fb41f17e31223ba5ce5101fcc097c91afe788e429fe78959e3c08f26343e69c8eeb2a5d698ce7599e0571640a332ea7276163992c2e73
-
Filesize
1.6MB
MD5b0e9e35cc24d5eb0d50b265e0a49a0af
SHA16ec1d6a88c57c9b4f3bdc124e73527e994802916
SHA25648e624ef1fe5f5fcddf9658d4f7f4933041bb719d47448a4a8b0736a86535402
SHA512d0cb5077f6a9159e51c024264907d15cfe42b8267307c3c18df5c064a08b58eef9c096a5ecbe54a705cab51c4d15553d186898987680108cca06c2e2abb4864f
-
Filesize
2.0MB
MD572d8b91344387ff5cf8aa84249bd8bfe
SHA180f1198ec6a0bd82bef4e4c4d361e5784c423394
SHA2565141e162ab5c10485fed250945c4ef9916363afa5fb0c46ce83ef2cbaad13858
SHA512530646f10cf8e7cc316ec1db56fc5851428fcaed922ccf1c7b95596dbbc8ce85d078fa8b8619f35d0e16f512398e0589f1798853888c6afba35c39e44427e3dd
-
Filesize
237KB
MD571f8c64c8401696c1b9ac019a41a5560
SHA16a3eb92403f38de5092d1e20649cc0e23cc1d651
SHA2566207b75fcdf5bc8bcc175059439eddddb37fe1c2e40b73a680a4374b8a495e9b
SHA512947f3d6121a5ea54f5d3dde3c07b7147da5dce1e20a244fbfdf198a789a2ee642f82840e7cde7ce25f015371b49494a6232db6c9b7c4f21aa2aaf055c6a8b296
-
Filesize
6KB
MD5071ceb1c3f433b6b76ff4c36bf5e1e74
SHA186eca71d733b684040c4ee5284f42766f8ec7303
SHA25609c937bd38e3cdacf78522bd5cb88f9a068eea6c44d3ae895af0fa55f0f82b92
SHA512d88fef395385d8b38d857ac82a55f3881bd0334920fdc5f3153cb9adb25f7495928e64022e55a96c108bf1899f33731325bdb0032fe2817c97f0c8fa16d0c2b2
-
Filesize
420KB
MD5fd230129597785d50cdaf45ec4261833
SHA1326d0f8d24741b5f1cbb91593f6270ab7219ed17
SHA256c450a67a7ea863686dd6618091db38a0401b2ba0ce5cfa08f56691be783cb8c2
SHA5128a2903442bf6ca78241f5caa99c211c5e0566440c90002c8cb96ab16ab7f4d26732860b2b411da04a2cad5616c42a7694a3951503923343200269739b0360ec7
-
Filesize
77KB
MD551b365ab078f0e557d37a790673830d3
SHA1bbc8aaadee3e8c5abc3fd407bdeb2a0d0ad5dd03
SHA2569f2c3df7c1e47abfcd73fbfad37c79dbda10535f07223fe2c385c31f2d7e0c33
SHA512a4cef205f26fac49aa6cf01d3e87136396a775e4164fa30810a76edf22711e70ab71372d81d2f05bcfa5de058c7848a36e634998a98c9b2193da2ef9dfbbf1b5
-
Filesize
40KB
MD5a266836d3d9260da285de6d3d05eee15
SHA15bfa4f4fdc6143b96a64706cb9e45b858eefd615
SHA256e962d9c603ad128a03c024c45b848027894391fbed92b6ad866e8fb332aadc9a
SHA512a6baf606f805300d3a0cbe06e1c341103ecc184e8f65a5442e6de1f6ee04660fab58f45afb2b7077903ed9efc969a86820e273b36020bf59314be63844b862ce
-
Filesize
52KB
MD5b6223e2a94003252572e81ec67155952
SHA1a5e9d93e0b4d6d6b3aaa9415515b18c2678158cd
SHA2565fd5fd10cdbafcfc969a440fd27fde889db80b836654a4868b720e2ea4260e69
SHA512d178954a3082fc3282efd644966da991a94297d739d962351a593948f4e0bc22e474dd60a1e9c5164480ab2fb4020c58d035c305fcb68dd65bfc6e230e1137ac
-
Filesize
131KB
MD580bda8ec0f98eab5f401dcaa0495fffd
SHA15eec57cc3c3041e780fcad1a3f32d91592d1fbe6
SHA2566112de92ff8d721c2652535e90eaa5ee8cadf9cff810cc851c8f5b73e6ff8f19
SHA5123b27a7b9feb1ab922f58f5fe58db1e268b73c132a5e36c1ce8a23cda842085530739025de61713362dd5822d0bded5c80a5362eebf06142be23d412fdc3a952c
-
Filesize
206KB
MD51156c6e780e51191f27a379d7fc1d138
SHA1c7f85b1fe007fd5db2ca5c3ac924b978faf2f5b3
SHA2568db89d9b1fd953eb0d950f2aaac67214c708aaf87f3f9fa3d922e42c2213708c
SHA512cf13672febe3cddac4b4e88f6955fcb86d7fd9a32cb06160a3924dd346ab98514fca3a02e8e92cfae5d6de26c03a83dc10093fde4e20a4919b7593f2fcbf1618
-
Filesize
363KB
MD540269705b592c5d689b1d7ee810f0c67
SHA1b6f7d873db54bd466632982df87ad2ca6631665b
SHA256b040081f78d10dfbb97e32efbe047a43f98ca20a835df245c23b10d45c69e437
SHA512366552e96ba14feabcca024121eca15778c527458130c07265775311c2ed2df9e6e46dd55f3b70bb6c311338a839cc6d2eb0d34bd4b89c8445ce87ef5b3d7fa1
-
Filesize
796KB
MD5f8a0280458e911f284ce276f875ee83a
SHA175ed4ad5e85caf7704aea727853683ec56f5e356
SHA2567eb91aae409f2a382eb9cc9cb2021ed0a19e25e75dc8b90f995861427f168bf3
SHA5126a9ee4ca64f4bf983462a0fd40bbd9a38cf9afd1a98914741cc8a9dbf3818006f4da321258f920baadbe82601dfd2f32ba380bb1659d888d0540e62166e208d0
-
Filesize
830KB
MD5252aef92f54d3d4a59d35160b3c9349a
SHA103f73edec42a89c08d4ce614e28fceb97d3ecdd7
SHA25631038ad1ec1ca179dabf93d26c528673cfb2ce985da0e8f5f90399153bd0f810
SHA512a9abe52f81d28fa3c401b54fe89b97ae37abe4ae323f3962b057c12da05bbfcc99fd8cfcecda72d9daef27eb83839cd59dcae72a6dacb59ad7bbca1c850dbbe8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD5af87a865b257bc3a9b03d794698f8bd0
SHA1fbbb26dae3dd036484c07b71bc14c8dbcf88aad9
SHA2567a05b4d7ac35f259921d29bd8db4ab5d8458686ae02c68a941d9ce66a519dd53
SHA51216f00a92a9d02110a0faa388fda7e961effa62f93401cc2087538ab61b61feba4cf1fb393c75c98c39b317b383f1baf2af2a2cdcfb425800d24c04a6e94e636f
-
Filesize
13KB
MD56f5464bc5aad3a09316752ca38c209db
SHA1a302bab05f1b626a1ee0aa4a6b97bd3f6333a5b1
SHA2568cb0c81fb29e6167f2d68ff94568f38a8f73c7088faf7788e5b5c07605ffc858
SHA51279620f71e61f66509faf257be3330136bf590a5090f2aa811c8313518a29bd60ca9c74b6a515a07d34089d7535c92180f399985b62b2b3b159eaf4d1764226f4
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
238KB
MD57af1a7f0c5d750567bb6c9db170ad76c
SHA1756389a0e84646853c77c496c1e5144e83cfd280
SHA2560523d96352c2028dd22fe5591db75e08c6d8ad76afd0baf2c0b5ce04ae850439
SHA5122095bc5ab45ab4351be4dec9243cf242eab15667c46a4070aa9ec35aba6b8d74c0367153f430d5f4eb40c3e0d6f6a2cc2a68cac06d9c5384a1ccb41f8d232756
-
Filesize
95KB
MD5f2bfff45093eacac326f824deb409b5f
SHA1f157200e817471cd563308b67975fd4200976fbb
SHA25648ec23e42919c8185af8df13bf18633f0aa6064e9448f801ea0c4414d4fc0a5c
SHA512f172d894e9894af89c1ccbcf4e9502bde279a22516ef22caa4be526b2ee179945b5fb657934ef436fcf4dcae8b53f67276be79a0bf291b72916e15f6a6263813
-
Filesize
313KB
MD5be5dd8b7ee665c298c372c4883c3c15e
SHA1f996f23d5a9d9702e564b94a658dddba4e185660
SHA256ecc729d531520e7efb7fc1f228032466412c913df6bba13bdab252813dd01098
SHA5126cf239a6c29ce95def999c786d5b3836e7355f56fe7fc3210f6e1123e83d97a3badc5a5e1afe7b1718195bfd4d0a7223f2fa9af6214e2af5a0922532d5078930
-
Filesize
249KB
MD50354701834338c3e27600dc1d9339cef
SHA147aa8cd16727aba5c4059285e1aa21e6ce3facb1
SHA256b20d94368f25f3a3aab529fd9a5972c8ffd2e9538212ac42120e1ba154ddb7e8
SHA5129c15685b087735d681d02cbd79628e083e945921f465764f635a15c61cf1177490ba1a36d6764db251ce654f815015eb186e1ef240c1b7a25c4a5a12c5955dcc
-
Filesize
272KB
MD543c66bb7924057abaf91e8ac6cc54072
SHA1d05479ac2b8016f9435a75c5ec9506ff42b56563
SHA25635852b3d65c820d9d95c4b5105b5f8ace19a951932111c8b6929b0651591288c
SHA51269b9b5d98e2d098cd48c645bd0dab4dbeadac1614a9e3e373c03c4c171a676188a2874524b2231404b18c742d144d1f4f7722f44daeb4da733eafd42c17d1f62
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55511eecfd992f2b27d78602c137ffc38
SHA143a9057c6b65abe56b16876238dab14896b375fc
SHA25654c67935e857381a0d72cad5e98048a3c964bd0c6247080d2151b278b103754c
SHA51217d51d5e1275aa6bcb34b647537b6ab571a469030f08f2afeac401370843739454330654489b46c9fd2b03af7cf2f2e82da72d76db8345ca8c5405e2933ae4b2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53c58b99350d42676496e2ad073041733
SHA1e23401271ffcc83a2198730df9e5ccad8e411713
SHA256ae7e1a6478894ba9aa7523744e8e27b0faf6f543a989cec2c5a0f2c59f9ab5b3
SHA512b88692c4d428c9ee934d008e974e9013ebfcd622d94c90d176bdc1b28145a6cfc9d711cf4484b34ebb938103141ca1c8e992e580b47cbf3d43156c39c60da1db
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD534a4e6d7d9de0c3d1efc677d2d1e3d6f
SHA14158f6a411bcbfad5c8177b703c3df4a18236fc0
SHA256df2610aba65352a18bf7a605f11b6357de6721e3c5921edec0d5ea6509e15482
SHA512c0ba73ec57f68a935242dd0894319019f8b1b6a47942d544d968c5b5226d75efae80172962e1b33286988e52e1f9787674bcdd4e15ae41260989cbbe8a6d700d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56a049f0f181e15faca78cd5ba1d01a2c
SHA189fb17db073b54c428ca66775acf93a40faf3510
SHA2565ada0cace079b927820de08523f21df9b33d249eb52537afebadc6e06d4f9d1f
SHA5123385f19453623cb65968e626f9d4d870be1ad80184e7633f3165e97fc2db81e0edbd2eedfcc1adcc3b8032aa479d9b7fee130e54812ad1eb9c78b38a5337bdf6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD570052cdf19e70baa7ebb66c0c1383b29
SHA1c3e0a8d1acfb6c59b37a8e1a4b02b726659e6b5d
SHA25688f62eeca83e0c2d9a62d44e6ae90c4eb29a5883fc3ff7bdd876c45865ba1937
SHA51299f4e341bd4a6fa8122fac5f4c0f39f4be721a6a66e8fe84a7e8bf395aad2b6a57a53da32baa0b711c984d4cbdc791a1ee6f979a54da9a64733bd5138afcd3c4
-
Filesize
45KB
MD57f4bbb1cabe880bb5bc43672a33f5b7d
SHA1a3ed155d6f0dce3b3b1272153ad47fab363a6453
SHA25675a46bf94164b77d2a93a16c8513169ce0815306e8063e77317946a1781a7d1f
SHA51248071702ff378cf3479dd44e523b2a4beb5bb0851ecd08f2c63f67974c497bd7181b73ea07d43111bc15a730a75a057a7f7f7be1ce2fc09a9bba190cfa8df6fc
-
Filesize
312KB
MD57278cfcfa4f2b53b210683ec8007cfa2
SHA1a4c8f2a8dff699e7bf78521f362b92d5276e0543
SHA25691cbac7b5a8d90a5d4126b2c550ab77e9d1955f213b5b3ff612bee23381863df
SHA51295fcddcbadb610a181660dafde751cac54f571a8c0fb4d542882757599fd876201e3e7d21a902eecd7e48677e5adec6d4689f9342eff2eb4f683f75df5f8d752
-
Filesize
1KB
MD5cd70b385f225e2c03875fe06c156cf69
SHA13105a89756c346a5b359f1f84598433b654b3f3b
SHA25683b35f1e9dad2a88fbe230d94f0449dc4dcd27292e9ffe2f1558d62fe8b29a63
SHA51283e077eaa597c80709bedfda1aacb611b59f3fd7f8fcc357c38d14d3caf14d4a4c9f05099c7fbac428e6c7154500055050a6bb129b799218bbe6d3c93d00d550
-
Filesize
597KB
MD563da4891f5a6df04cbc07cdc5c301168
SHA15e029bf50b5fe5930d3369f9a3361b2ea966da8f
SHA256cca8f5662aeecc2a50c1bc7777187b87c9884f745d61852e031e872eb7a389df
SHA51277fc00e4b318ee33b5052b2e5d41b6962a2aa6e3b4ed9ed8a99d2cc4f918a61994d89f496dca1f4c53b6dfb9cdc8af66ca5bcb355574e3cc55f61eb2f65786e4
-
Filesize
508KB
MD5061a791199142d08cc8bbceb6b98767d
SHA1638aafdba7b8531a6e7e3afad6f8b1439f0cc586
SHA2564ed614f31e94fa4f4053537d66584699585e6480cf37550c30ec28eb666a36d8
SHA512fd68948f0ea655259c59d1e3b394adb5c7dc0c67e13bfec80c349cebf4ade383954c50536fbe3e0f43a564f1f3d6f08993e5065e6295a86709cc9c1abc4d1894