Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
ec2c94a21a52027c229a7824d4a1c5ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ec2c94a21a52027c229a7824d4a1c5ca.exe
Resource
win10v2004-20231215-en
General
-
Target
ec2c94a21a52027c229a7824d4a1c5ca.exe
-
Size
791KB
-
MD5
ec2c94a21a52027c229a7824d4a1c5ca
-
SHA1
b17aa25017bf7d0af7ffb946bcace0d51331d351
-
SHA256
cfd185173a9199f41d4819c7479cd868f6d913b0ca02a37ef93a802939889a6e
-
SHA512
f44190b724851959ad712af3fecf4c397386b81a2c5f4258bd0b5ce028b173f29d57a296a448d1568d5de3eb25623f119cea3cabbee6c753890fe3e006df0761
-
SSDEEP
24576:Skt2zwjdnAwQ4x2K3yWds0JkKyV0+mZbmNrUCV+7d9/1:PnnAlpadsLK+mZSgfpF
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
amadey
http://185.215.113.68
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
risepro
193.233.132.62:50500
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276�6914c4.php
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2872 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe 2560 schtasks.exe 2744 schtasks.exe 2776 schtasks.exe -
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/1988-194-0x0000000003200000-0x0000000003330000-memory.dmp family_fabookie behavioral1/memory/1988-605-0x0000000003200000-0x0000000003330000-memory.dmp family_fabookie -
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/1696-710-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1696-711-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1712-708-0x0000000000230000-0x000000000025B000-memory.dmp family_vidar_v6 behavioral1/memory/1696-706-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 behavioral1/memory/1696-976-0x0000000000400000-0x000000000063F000-memory.dmp family_vidar_v6 -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2792-1009-0x0000000004D70000-0x0000000004E3A000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 13 IoCs
resource yara_rule behavioral1/memory/1212-636-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1484-643-0x00000000021F0000-0x000000000230B000-memory.dmp family_djvu behavioral1/memory/1212-641-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1212-645-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1212-665-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-677-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-685-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-686-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-692-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-693-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-690-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-712-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2412-877-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 11 IoCs
resource yara_rule behavioral1/memory/1956-92-0x0000000002A60000-0x000000000334B000-memory.dmp family_glupteba behavioral1/memory/1956-93-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1956-206-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2248-221-0x00000000029C0000-0x00000000032AB000-memory.dmp family_glupteba behavioral1/memory/2248-232-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2248-287-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/568-323-0x0000000002B80000-0x000000000346B000-memory.dmp family_glupteba behavioral1/memory/568-333-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/568-604-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/568-640-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/568-671-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 1936 bcdedit.exe 1500 bcdedit.exe 2552 bcdedit.exe 2480 bcdedit.exe 2596 bcdedit.exe 2388 bcdedit.exe 1924 bcdedit.exe 2952 bcdedit.exe 2028 bcdedit.exe 3016 bcdedit.exe 2504 bcdedit.exe 2524 bcdedit.exe 2596 bcdedit.exe 2764 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 29 1600 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1068 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE 30 IoCs
pid Process 2732 explorhe.exe 2124 latestrocki.exe 2912 InstallSetup7.exe 2852 toolspub1.exe 1956 31839b57a4f11171d6abc8bbc4451ee4.exe 1988 rty25.exe 1976 BroomSetup.exe 3024 explorhe.exe 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 2416 SetupPowerGREPDemo.exe 568 csrss.exe 2304 zonak.exe 1164 patch.exe 2156 injector.exe 912 BD95.exe 1484 D20F.exe 1212 D20F.exe 2492 D20F.exe 2412 D20F.exe 1712 build2.exe 1696 build2.exe 1548 F26C.exe 2504 bcdedit.exe 2408 explorhe.exe 2792 5A44.exe 2588 dsefix.exe 1324 5A44.exe 2260 windefender.exe 2976 windefender.exe 2340 explorhe.exe -
Loads dropped DLL 53 IoCs
pid Process 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 2732 explorhe.exe 2124 latestrocki.exe 2124 latestrocki.exe 2124 latestrocki.exe 2124 latestrocki.exe 2124 latestrocki.exe 2124 latestrocki.exe 2912 InstallSetup7.exe 2912 InstallSetup7.exe 2912 InstallSetup7.exe 2732 explorhe.exe 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 2732 explorhe.exe 848 Process not Found 1164 patch.exe 1164 patch.exe 1600 rundll32.exe 1600 rundll32.exe 1600 rundll32.exe 1600 rundll32.exe 1164 patch.exe 1164 patch.exe 1164 patch.exe 568 csrss.exe 1484 D20F.exe 1212 D20F.exe 1212 D20F.exe 2492 D20F.exe 2412 D20F.exe 2412 D20F.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 2912 InstallSetup7.exe 2912 InstallSetup7.exe 2912 InstallSetup7.exe 2504 bcdedit.exe 2504 bcdedit.exe 1164 patch.exe 1164 patch.exe 1164 patch.exe 568 csrss.exe 2792 5A44.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2892 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\zonak.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000527001\\zonak.exe" explorhe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\44198e38-4b68-4f85-aa61-ff00c9df3f28\\D20F.exe\" --AutoStart" D20F.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 api.2ip.ua 59 api.2ip.ua -
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
description ioc Process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 2732 explorhe.exe 2732 explorhe.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe 2304 zonak.exe 2732 explorhe.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1484 set thread context of 1212 1484 D20F.exe 68 PID 2492 set thread context of 2412 2492 D20F.exe 73 PID 1712 set thread context of 1696 1712 build2.exe 76 PID 2792 set thread context of 1324 2792 5A44.exe 119 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Logs\CBS\CbsPersist_20240122181301.cab makecab.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1688 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1652 1696 WerFault.exe 76 2764 1324 WerFault.exe 119 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BD95.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BD95.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BD95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bcdedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bcdedit.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe 2872 schtasks.exe 2744 schtasks.exe 2560 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2100 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-552 = "North Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-522 = "N. Central Asia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_Classes\Local Settings explorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 explorhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 explorhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 explorhe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 rty25.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 explorhe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 explorhe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 toolspub1.exe 2852 toolspub1.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1956 31839b57a4f11171d6abc8bbc4451ee4.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 1244 Process not Found 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2852 toolspub1.exe 912 BD95.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 1244 Process not Found Token: SeDebugPrivilege 1956 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1956 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeSystemEnvironmentPrivilege 568 csrss.exe Token: SeShutdownPrivilege 1244 Process not Found Token: SeShutdownPrivilege 1244 Process not Found Token: SeShutdownPrivilege 1244 Process not Found Token: SeShutdownPrivilege 1244 Process not Found Token: SeShutdownPrivilege 2904 explorer.exe Token: SeDebugPrivilege 2792 5A44.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeShutdownPrivilege 2904 explorer.exe Token: SeSecurityPrivilege 1688 sc.exe Token: SeSecurityPrivilege 1688 sc.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 2732 explorhe.exe 1976 BroomSetup.exe 3024 explorhe.exe 2304 zonak.exe 2408 explorhe.exe 2340 explorhe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2732 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 28 PID 1288 wrote to memory of 2732 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 28 PID 1288 wrote to memory of 2732 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 28 PID 1288 wrote to memory of 2732 1288 ec2c94a21a52027c229a7824d4a1c5ca.exe 28 PID 2732 wrote to memory of 2872 2732 explorhe.exe 29 PID 2732 wrote to memory of 2872 2732 explorhe.exe 29 PID 2732 wrote to memory of 2872 2732 explorhe.exe 29 PID 2732 wrote to memory of 2872 2732 explorhe.exe 29 PID 2732 wrote to memory of 2124 2732 explorhe.exe 32 PID 2732 wrote to memory of 2124 2732 explorhe.exe 32 PID 2732 wrote to memory of 2124 2732 explorhe.exe 32 PID 2732 wrote to memory of 2124 2732 explorhe.exe 32 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2912 2124 latestrocki.exe 33 PID 2124 wrote to memory of 2852 2124 latestrocki.exe 34 PID 2124 wrote to memory of 2852 2124 latestrocki.exe 34 PID 2124 wrote to memory of 2852 2124 latestrocki.exe 34 PID 2124 wrote to memory of 2852 2124 latestrocki.exe 34 PID 2124 wrote to memory of 1956 2124 latestrocki.exe 35 PID 2124 wrote to memory of 1956 2124 latestrocki.exe 35 PID 2124 wrote to memory of 1956 2124 latestrocki.exe 35 PID 2124 wrote to memory of 1956 2124 latestrocki.exe 35 PID 2124 wrote to memory of 1988 2124 latestrocki.exe 36 PID 2124 wrote to memory of 1988 2124 latestrocki.exe 36 PID 2124 wrote to memory of 1988 2124 latestrocki.exe 36 PID 2124 wrote to memory of 1988 2124 latestrocki.exe 36 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 2912 wrote to memory of 1976 2912 InstallSetup7.exe 37 PID 1372 wrote to memory of 3024 1372 taskeng.exe 39 PID 1372 wrote to memory of 3024 1372 taskeng.exe 39 PID 1372 wrote to memory of 3024 1372 taskeng.exe 39 PID 1372 wrote to memory of 3024 1372 taskeng.exe 39 PID 1976 wrote to memory of 2720 1976 BroomSetup.exe 49 PID 1976 wrote to memory of 2720 1976 BroomSetup.exe 49 PID 1976 wrote to memory of 2720 1976 BroomSetup.exe 49 PID 1976 wrote to memory of 2720 1976 BroomSetup.exe 49 PID 2720 wrote to memory of 2192 2720 cmd.exe 47 PID 2720 wrote to memory of 2192 2720 cmd.exe 47 PID 2720 wrote to memory of 2192 2720 cmd.exe 47 PID 2720 wrote to memory of 2192 2720 cmd.exe 47 PID 2720 wrote to memory of 2744 2720 cmd.exe 48 PID 2720 wrote to memory of 2744 2720 cmd.exe 48 PID 2720 wrote to memory of 2744 2720 cmd.exe 48 PID 2720 wrote to memory of 2744 2720 cmd.exe 48 PID 2248 wrote to memory of 2908 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 51 PID 2248 wrote to memory of 2908 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 51 PID 2248 wrote to memory of 2908 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 51 PID 2248 wrote to memory of 2908 2248 31839b57a4f11171d6abc8bbc4451ee4.exe 51 PID 2732 wrote to memory of 2416 2732 explorhe.exe 50 PID 2732 wrote to memory of 2416 2732 explorhe.exe 50 PID 2732 wrote to memory of 2416 2732 explorhe.exe 50 PID 2732 wrote to memory of 2416 2732 explorhe.exe 50 PID 2908 wrote to memory of 1068 2908 cmd.exe 53 PID 2908 wrote to memory of 1068 2908 cmd.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec2c94a21a52027c229a7824d4a1c5ca.exe"C:\Users\Admin\AppData\Local\Temp\ec2c94a21a52027c229a7824d4a1c5ca.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2720
-
-
-
C:\Users\Admin\AppData\Local\Temp\nst65C8.tmpC:\Users\Admin\AppData\Local\Temp\nst65C8.tmp5⤵PID:2504
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nst65C8.tmp" & del "C:\ProgramData\*.dll"" & exit6⤵PID:880
-
C:\Windows\SysWOW64\timeout.exetimeout /t 57⤵
- Delays execution with timeout.exe
PID:2100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"5⤵
- DcRat
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1068
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:568 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- DcRat
- Creates scheduled task(s)
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1164 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER8⤵
- Modifies boot configuration data using bcdedit
PID:1936
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:8⤵
- Modifies boot configuration data using bcdedit
PID:1500
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:8⤵
- Modifies boot configuration data using bcdedit
PID:2552
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows8⤵
- Modifies boot configuration data using bcdedit
PID:2480
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe8⤵
- Modifies boot configuration data using bcdedit
PID:2596
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe8⤵
- Modifies boot configuration data using bcdedit
PID:2388
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 08⤵
- Modifies boot configuration data using bcdedit
PID:1924
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn8⤵
- Modifies boot configuration data using bcdedit
PID:2952
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 18⤵
- Modifies boot configuration data using bcdedit
PID:2028
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}8⤵
- Modifies boot configuration data using bcdedit
PID:3016
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast8⤵
- Modifies boot configuration data using bcdedit
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2504
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 08⤵
- Modifies boot configuration data using bcdedit
PID:2524
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}8⤵
- Modifies boot configuration data using bcdedit
PID:2596
-
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
PID:2156
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v7⤵
- Modifies boot configuration data using bcdedit
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe7⤵
- Executes dropped EXE
PID:2588
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- DcRat
- Creates scheduled task(s)
PID:2776
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:2372
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1988
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exe"C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exe"3⤵
- Executes dropped EXE
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\1000527001\zonak.exe"C:\Users\Admin\AppData\Local\Temp\1000527001\zonak.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1600
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {02205C68-EBBE-4DB7-ADA1-2433323AA2C3} S-1-5-21-3308111660-3636268597-2291490419-1000:JUBFGPHD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240122181301.log C:\Windows\Logs\CBS\CbsPersist_20240122181301.cab1⤵
- Drops file in Windows directory
PID:3000
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:2192
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- DcRat
- Creates scheduled task(s)
PID:2744
-
C:\Users\Admin\AppData\Local\Temp\BD95.exeC:\Users\Admin\AppData\Local\Temp\BD95.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:912
-
C:\Users\Admin\AppData\Local\Temp\D20F.exeC:\Users\Admin\AppData\Local\Temp\D20F.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\D20F.exeC:\Users\Admin\AppData\Local\Temp\D20F.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1212 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\44198e38-4b68-4f85-aa61-ff00c9df3f28" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\D20F.exe"C:\Users\Admin\AppData\Local\Temp\D20F.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\D20F.exe"C:\Users\Admin\AppData\Local\Temp\D20F.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412 -
C:\Users\Admin\AppData\Local\7fc5147e-599e-4099-afa0-7ed1c8792c06\build2.exe"C:\Users\Admin\AppData\Local\7fc5147e-599e-4099-afa0-7ed1c8792c06\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712 -
C:\Users\Admin\AppData\Local\7fc5147e-599e-4099-afa0-7ed1c8792c06\build2.exe"C:\Users\Admin\AppData\Local\7fc5147e-599e-4099-afa0-7ed1c8792c06\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 14807⤵
- Loads dropped DLL
- Program crash
PID:1652
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F26C.exeC:\Users\Admin\AppData\Local\Temp\F26C.exe1⤵
- Executes dropped EXE
PID:1548
-
C:\Users\Admin\AppData\Local\Temp\5A44.exeC:\Users\Admin\AppData\Local\Temp\5A44.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\5A44.exeC:\Users\Admin\AppData\Local\Temp\5A44.exe2⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 1563⤵
- Loads dropped DLL
- Program crash
PID:2764
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2904
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD519f8c61818058f74edb29977f1c0ea57
SHA185ad4272e308b2d548589b972347ec27108dbe50
SHA2564639c1ba140b0ee654664e769d047f6a648637cacc8778c7e1b40d1bc5b23e63
SHA51259592464f4a68ec8482282c34ce7f2c533cafc3cade97a92db1f071556d29aa2f4905ab81dbd31e715a712c15047e437601fe2a041f5ffb6669a54dc13bc63f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425504b70b960f9f20e0d654d6d8dbe2
SHA120ee01624f28207af7c4d01d491be43ac7af1622
SHA256c85a079d01c1faeaf09412393e12d7a72413fe4f13ad84d6d16dd2c9461433f5
SHA512b53bbd25bccee17e12a426e0d1871c07bc4f8630c1034d330877fc697ea3674d5c9ce281407df41545977a8c6db22329b277c37dc9ddf9c5a8b0a98f56b9b2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d6974cea35f796af9f4638813850d2
SHA1e640672e141ed67402b741fc932c34a52a2a1b04
SHA25654c7328ae401d6444ee6ae518af9b25f26b7e0ea1a83d2c8fbce3a7dab75aeb2
SHA512547e874af4d8b60742301ffe6e8794ed04620116944e847f5e2b486faca096c7577f4f915bd3de05329fef6d603c7cc07cf005808d1f4a0af0ef3ee15d204a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cfb90d778294e0e3dcaf678ac456492
SHA188e2c0ce0353010b5e0d7384f834a3b86426c21e
SHA25677b3e3b3eb204495b09f07105c2f97cd332af84d17b183325be450e2038287ce
SHA512d2a816adb1bb4d7773c9a3e00b6f17f17e35c14420c03fd5db0515c8b9fc513fa30bec312d1582a9bac4fb183c5c7bce99abed30d6054dfe23bead9aad4a89be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf62031aa9cd5225f10b09c69d4074d7
SHA1caba6f5dbe2217d46ca3aa8aa548dca6a61fd667
SHA256bec373a3c87e9d6054c0bf4affa783ee860ea2703ce6d7e7daf167ee32ef1b19
SHA512395ae99c814c060f7e3e8025dd7485b0f2683408b42a765e2b7f27fe5dd27ae5dbf4d8ad487aa52bd25772d4aea1b54084ed3b6a38b007d9417053e68e1a0fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ef2b3a296c7bbb88464bac1df3c41fd
SHA10c430ff3993210197da9dd72638151c475b661d6
SHA256ad8963a664425a6453a341fe3e448c2b707f905da0f0179185bf725e1f667cc2
SHA5121df73eae5004262297b865d4fffd0320ed57440af192cce32745f2565a3890c35dc2974ea5d6567c631278dcd5e2f8b3aa90ff65966ae6e5d0c46d3f7dbf57e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54a762926e214e8f3e425512129e92ca1
SHA16e7598e6bb46550aeeeca45aa8d50230974039bc
SHA25603fa4694a7873c92d5c75baaac6edee9525ca94227ec9d04c13706f13ff88151
SHA512bc02ffd7bc971a0127b900335de938460fa2de0c233183c3f8fe18d226d43352f907858286e63adb2355a51ff11c61aae7546ce16afed8c928e7b2c37e6a39eb
-
Filesize
146KB
MD540a09805567f731ec216d11f1743a86f
SHA1c4b4834f97fd85e2a548928c8fd2044f82784165
SHA256fb2f6c1422066b4108dab04aac9b25e1fa25e6a82b8cf8f9fbe75d1036d27919
SHA512801ba8e92666f66cd4cfc8cbe97ec7a56df3acecd698a9c98ed1679e1b65fd273de4dfa040eedb7b4b55daf01cf180fc21a77134b06ca5a973c4841c4ed9467b
-
Filesize
278KB
MD5d04d2f1ecbe2f4491d811c8b9afc477e
SHA19ce75cc8c7de520cb07767ad429223fa9ad23f6e
SHA256e3d16f3f69fa0857f966022387ee6f9408385ddf389d09ffe7dc44acc8ac1ad5
SHA512357322814852a60e7ebb7ff9d2bbbb346d52c7fd6b1f1fc43a265b229fe683f0403e1963d7ad054ced2cec3ddc3bf986ba997c9827d0f513f188b6e80d4673b4
-
Filesize
3.9MB
MD554e0c46b645c51e7b3863c53471497c4
SHA1fbd27a44b22ebba6b1b142855d954fcce4cdc75c
SHA2568ca514b183b52d528b0930cbb2a1375f4ca37c69fd7c1cce287cb708bc4f1770
SHA51243543d1a9504573572a88a77601092d234d3c7c6f866129a265d022f50036df096e32f0736ea53313f60bc9c3eb9c026cb6bdbe2ab75db5726e74c1ad6ba060e
-
Filesize
1.8MB
MD582c8db0ed9d26372f0e7060706afbedc
SHA1f5b699c0bf02d5c5bc01479ae66cedf44d0fe62e
SHA2568a1610dea18f643822c1aecbf8cd419bc3f2b76521cd1740cd76114c6901d9ab
SHA51274e662c788b2d9dbdd91adfcb85ac01ff2d3d8a02e7ac4fc3c37de99bff7c0459a06da187ab57b83a01b34ff2e9b44e6f806effc2ec92d37dab6cde39a67d77d
-
Filesize
2.6MB
MD5e5536b51371b75ed971d407a02916564
SHA1c264b8ce26cfbf52276ff88077d39a759b844f27
SHA2566b030f785f3a14a33f40fec561858eb05406ee799defc5abe75b2d23cdef5f68
SHA51211433af5fb7d3f6a8e73825575caf0090dac57461e14419451752e96f64f9171600d4e21e18e393b324ca589c51a5cf99352c4269eadf2fb4c22152cd659bd6e
-
Filesize
927KB
MD596ccdbf87cda4967fa11513108344dc0
SHA117fc55e2a9680f5f1d1c921b9baa236d20cb1ebf
SHA2562791caa3fe4a2c4e874d836848ad0157f6fc29230c77a0e7692a5f117336e5b9
SHA512c960eca8f744e3e6be5b09d867826872c57be32e4dcf91bf3989166852e7a2cc9cc73a87da597916a7030855ab860f0c160d5187329442e9c9c226b261c27638
-
Filesize
1012KB
MD5be8ff6eaa2d52896a3c0747782267b66
SHA1665e763d445bb50dac0baa46c639639c1351298f
SHA256628f5e69cb521b9378012a91f1a2ea389b5b3422f69447bfc4fe8cddc9ff9331
SHA512931a096655515c9eaa0cffc7b5bf3d39e4db28abd26b9e72eb733b2a70ff5582ab9ecb77ef9423095f31df584d9008e68bddac15c9fb1a69235ad903e8f0623d
-
Filesize
918B
MD54bea37262c3bc0b48668b90c5c226af0
SHA14a097ea735f361298bdb75472e50b6cf95a49082
SHA256dcc7bfb401220c0508d993210ce3b24a47c679fecbfd7976c52738d0f97d7830
SHA51219999476cb9de9876ab3eb7f8ba55e38c6a588b0c828a2f2bf254fdfcd91507de189a14e8f61bef79c540ee59229bf74b813a9167a8f93a35c2d1538dd40a55a
-
Filesize
205KB
MD533af9946b15b0c8489bb6456843b081a
SHA1f1aa12bd4198ceef52dedf7a90b5e131e20c6067
SHA2568baf4c9e7fe673b2f3bce00a5b2f6a38d57364213945c8f71cd75758103dc042
SHA512980987d568c12546a4b4137b3eca2e399ac00a42c602085c8e732a0452e96d564599c88df27a6a3de8f0ed3d3c27dc6a6a282fb09d51ccf1eaade76c029ea6c0
-
Filesize
96KB
MD5b353553d5a97fab11c94b7c53a948aec
SHA17db75a3a2738cdf742a2e4bc3c01b28403d466f1
SHA25613ac208a049b9315d37bcc6fa9379b618b00d3c85e4454b5c9f4b6a2247a50a1
SHA5125ea0b3e4d9b03c26c5ddbdfd4d71003683a254e541fc9445f70c89075a73f537552da628c8ddc622d0676a98a151b297252a18c5339e5ee685edf6655ab2ff05
-
Filesize
1KB
MD5aaf46b48626c1a88ba4618f2f579d871
SHA1f2b8e5a761358551556fcb6888a3b258e9a413d7
SHA2560472e6694914f060909cd7104e4786cd1cdbae6e6ae7dedc72d0874450ff9782
SHA5124ce938e93d5a879243ba2262272d946dc31236c69ac37e3b0426593d3953e0845a35f429b970044eeead932fa427bc9df2ca467c40856975868efe45207f03c7
-
Filesize
1KB
MD59952c79771c99b0cfa552bf2d602b9d4
SHA1dc5212cbbadc316f8124cce29bf794eb1741d305
SHA2560655f727c1e43f1b6d332e84e9b5098ad19a03440c4a2896ff57b68f8aba5bd4
SHA5127604bf6d21f43ff046d7ef6a0ea3e94df95c33b683ff63aa4f8f435e0cfdbdb6effc755a41fa3a83f2e10cc4739a76b46792d30c393cfe189da6d2fd0f369cee
-
Filesize
1KB
MD52760a68026881a1a5faa6265ed69f0dc
SHA1ac9ccb7e8b1593da0e605232952ccf110fe558e5
SHA25631f999ec2ed80038fbf7ccf65069b9c30efa7f8687ac2c29f53fa112d71b80c9
SHA51249e23ca4bc3844f9f07d023620f88b8c9f177cd70be99e402a71c183d225bcc44d0bb1e401075ec15507eeb440df09100a3cf8e867dbedb426f050d6f57892da
-
Filesize
1KB
MD5235ffe610059ec565ea117d91d44b564
SHA198d7305e5c3b38bb8b811ef58e146745e365a24a
SHA256518ab29330f5ed8879589fc9e0df2714e1b76e19b2f1287a9d3aea1289786a5c
SHA5128ee2342ec35d8390f72eefba051e75d02a7c034139b3020858b48146430c6fa2c2a2cbe27b1f349d97091e4eb86c9f0f24487a8c47dba162bc85738a3b206c84
-
Filesize
1KB
MD57c8d1a45d1f4702f6005a500ed29bf35
SHA1f3bf5fe1f0518c50cbc30ac00cdcd881f2340cad
SHA2563dace1283716be5e13fe6b23a42bb880212b944bcf295f96b1828fbceeb9faa7
SHA512f92d4dbf34e7677f1ef622fc4ffa4c28e4e561f67a7c27af4db17685f98e9d087db6679d0c51c55e5ecfe4c2fef857e9a6b823d2c429690755c12ec2af622d3d
-
Filesize
1KB
MD5808cc9ef7660a36ee4546c8530121919
SHA1789b512f48b63a72126ecdf9a61f115686088f42
SHA2566358c13a42c4261c215684c00240ff62614ff98ac0db757fff2ebe60746610f2
SHA5120247a62bd04d81ecf7d2839a1f4a2105c2d6219a1eaad0bad12c2fd3a5c9fd166eb8d2274a15fc8ddd603e5cd00b687b1f9eeda4afb13d270858047d2b62a957
-
Filesize
1KB
MD5dab85cdad639066852c4b88db46c501a
SHA1d2177cb41c62804ecf4c817f2cc65a700532cf41
SHA2568c5c1eaaaf2f3c0c896e27536a563cfad4ad8b95877b4a8489052aaf9cf38d12
SHA51222b18cfc3e01e946d00147a6cd8eb1a88fc146b02c6c8a17ab9a5004691f3847fd35972939fd526878a05f7e386d0a09be5951b7c10b122e9bca2a21277b2c67
-
Filesize
1KB
MD519bbeba3680e2793896ba72e2f83b132
SHA165667b850a4052d956ccd2cca74f3fb92add84f1
SHA256136c27b2976d9d334b3dd7ad1a9dd82fc6643805ccc4d1e55e81317cdb741157
SHA512428af574b6250261e350377b8917e4d3c3d6a01eaa2e9860fb6af117cbe72bd38d71911122c086c229634e7dacf45120f17ed90235c1d55ae6702622db8f29e3
-
Filesize
806KB
MD55dd510e23b60213574a33f984cbe7fe5
SHA10868432864e9804ea43b676f1cea1203ba06834b
SHA2566a872ada935348e4c8fcd1332452d501f65537fa4e3a0917ec579b473c687e64
SHA512653a37e465365aec07aa63ee6a41c9899c634a1b75286b3c2a13823ea758c0608cc618eb5be1b13a2c8698796ae925d8020537b9aa6dbc793a47468c4317ef0c
-
Filesize
1.9MB
MD526ef3a43f9389e49329117c78639723e
SHA1b10dff50450327d5e2b1fe9263cd2599427fe584
SHA25643a399474bd2f49a592c866c1c1fb08d83d150f89c99986ed7bea18eb64c8ac3
SHA512c4a52d2ef1c60d2945013dd658f16408b162ea0e50d22878de5838edb3f2d242bc7558a08652f16169fa7d4c83af282e8477e4105f691722d3fb314273fa8193
-
Filesize
412KB
MD57a9be51acec02ea104b690a45d68e494
SHA1dc4cf04f1a68ad984769918d44c4d5e513b9b9d6
SHA25609a8c766729bdb2b82bef9fc25ab26f3bbfa2913eb49483ec51cfbc8580471f7
SHA512edabe976b808564799d24aa6e0b749bd8e93a16970e01884a3b6eab813b4d726be55d158d69dfa64a1328bab62b84b350f6a1ae6827e0e9de4dc6c1c579d39d3
-
Filesize
425KB
MD547749d82d09d3e8ada93098ac020eb75
SHA1db5bfb2f4f3c676a7c4620dcbfb25473da9d449b
SHA2568d80496448687200de3d4920d19750648bf157b8d120570edb3cb65a0417c70c
SHA5124cb9260aea306cdd6004fe119fe726787280381ffd602be60f2a8c01aa399381492f68a0e8db77537bb6c5c5f9f985bb2399cdc920aa9aacb447bf04828262d9
-
Filesize
245KB
MD5911447afe8770f95eee6407b933e50e1
SHA10d3bb345bc2e1faef3d26a9628b0a7d4347a1e66
SHA25664dd6725a6c46ce857d299caeb135a10f62b2213eb8c5f11b599cc495ad550e3
SHA512810dc3c5cf0d4dc3b8b7184ebc8ac08f836fe04dd7088e7fc9e142a2c6636de0da9a46e8f22829b21ce577f68b164b0a0d5dc35b2136a3824766c0acada48afa
-
Filesize
1.1MB
MD56714da147310e730bb7e16fa69621509
SHA193cc11d655c1f60f3154d1563ddbc09b62a45d77
SHA25639b6c71a0e80c8dcb0137dd5d9c2a6fd2a9841c11011bb7b3c082a61f5f6714e
SHA512895b31f3475cffe8834bcf3a93a7302f9815a24a84f84a70a97c60fac6442a76c4b0ba640e7abd01ef4e2c11f3e8ca954e750a5b5e06144f8f413bd9af1fb461
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
600KB
MD5741ab60a884d98e51499e809e44904d3
SHA1a6ed4c320dff76c30cc3ad5418496d9397e37e2d
SHA2565c9735e747d0ea0bee95a97792bc9c89ef184469056208767f086d924bfa96c6
SHA51245b893ee2006c8077f36c1f5a24a649ced54364c150d279f81e9f5d975f29d652c64d6ed042038a1195bb3d455c5b05cee976c64141c6709999c0063ef937578
-
Filesize
506KB
MD596d5358e05f9191b1a6b9bcad2532eaa
SHA1e2d0f95476b423263a4c2d50ca06a56c151ac254
SHA25658a2541690dc74d4795b66ba5eaf577c1bdd30d3d906f517995607238d4f664c
SHA5125a5db86b8306806e364349d2fd862de8bde36de6712f132bbf43f0a883af1e503bbd35d2f4457e48777661e4a098c76b69f0d4205c284e2d59663e87a3de7f39
-
Filesize
451KB
MD5e113e8d3aeb4008512721d97bd818b5c
SHA16ad3dfc93f9b3e99eeec8d86524ec0c8f0caf040
SHA256f6ea08b4fd450a433d3a731315a540c4573256373996c6391e9006c258aa52fa
SHA512a2ec03fb97f4a910317389db20209adf2aa540fb628a32060f3c6640bbb4c04bf1ebf135e3130c78b01b6f841dbb96909d24b62eb7ae4b139ff207298ec9bd89
-
Filesize
481KB
MD521087c117a329a15b9ee6e24a3fc71c7
SHA10a410cf96c4c2a24db1e8eb8f7fb66b75ce8104e
SHA256a1799a483ec7a97c72546bbdd10063344aa96fa108a3575a6339a386d8b3b174
SHA512a10687b71abcdc3a116d2af5e2099f2b4ef79ae2d6056ab1acaa2c99ff0a2185750247544e3bb6d11e732e9bd04930fbd88e996f971740bb9b436e433687020a
-
Filesize
1.6MB
MD59f49a0c669e40e76362478554316e468
SHA1c19dcf63d1394869123429e8422d096dba95c97f
SHA256125157623630efc8a3008bf1740bd44e875d29946e30d66e7ff5ba5b2962bf0b
SHA5121f8da2fd139f98b9321aa0f4cd5f83dadb1cf0d96b4159eff00707ab858ec5f893da35d9c115e0360e27cd6e36ce29adeae0833ec63aef8b1272388201cb1eeb
-
Filesize
1.3MB
MD52c79f36a70d823e940778c1c3c5e424f
SHA1581473f8595d18cb8250e7de977418c0842ec5dc
SHA256235f5e5f880cd9f01a77451ec6d44c3e2ae066badc7506ad249d3583338d40cd
SHA512def0964cff7cf082b3c107a762acc7eeedcc196571c759a8245a65cfdf2086cf335913d95bffb30b6402443b8a4e59cd920b7712fdca1014a0f9e1029adad5df
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize395KB
MD55da3a881ef991e8010deed799f1a5aaf
SHA1fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA51224fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
92KB
MD51c7c4ed9b254b667c5629a1a00594082
SHA1158339c16070d4d310b11ae993084a0cc196d82f
SHA256c9f2f391104535c7ed77c93e944431209f48d3b60f81574e29db5887352d8058
SHA5125c1d22bda047de2d6aa9ac22a7a4d86f111f4df7b52a570f25c422d985da04a47b5e914435010e97fad59606680ffe1a4facd6a2008a8858f2a6d47f79cf0b7c
-
Filesize
791KB
MD5ec2c94a21a52027c229a7824d4a1c5ca
SHA1b17aa25017bf7d0af7ffb946bcace0d51331d351
SHA256cfd185173a9199f41d4819c7479cd868f6d913b0ca02a37ef93a802939889a6e
SHA512f44190b724851959ad712af3fecf4c397386b81a2c5f4258bd0b5ce028b173f29d57a296a448d1568d5de3eb25623f119cea3cabbee6c753890fe3e006df0761
-
Filesize
614KB
MD50b8865960c68da3ba3e60f80a3766e52
SHA197a234f4f2dbb0ba4361aba63ff487b5c40e8c45
SHA256a62cbe16816c4838ca5c3a314880401fa5dfaaa5a9075851b921c1b6e9591d78
SHA51274b95614729e7766cd2bbe512de7e1e0cda84fb6ff603888236d259793f79ed230acaa59308641795c3267eb6e0cc00fb011a9d5725bc1621f0db0dbb9fbb81d
-
Filesize
245KB
MD57bbbe41e21d870a3e976714551054830
SHA1c68e8b509cc7c14b6c5d7e67e071e4751bc3c329
SHA2567f7251f17c600a5dbcb7ea137a67598ceb51a1fc26dcdf543dbbcdb4beba0058
SHA51291bd0375cb3f8203840c1982ad5c8f9114758a9998bf2169397cbe6ba8e3e52801a7484db20de2d5a4f48823405c53d30399aeb5f9c62941cb1c02647a03773e
-
Filesize
448KB
MD533f63e6278297e30159507b38e1e4424
SHA124f7158e8d2a8a74792557baeeeb7792039a10e0
SHA256bb9e5d7e8667c94a45f99684bac7a72458beeeae50125310016e1269e2e0f6d5
SHA512b7bb9196450a6da06eb1fb22f45e029a2ce41a42a7191abb1e4d8ca10c98993a94d2b36129194984ef85c59160cebaa24b9e59b0cc1c1f70a883895b598a9c4b
-
Filesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
Filesize
313KB
MD5be5dd8b7ee665c298c372c4883c3c15e
SHA1f996f23d5a9d9702e564b94a658dddba4e185660
SHA256ecc729d531520e7efb7fc1f228032466412c913df6bba13bdab252813dd01098
SHA5126cf239a6c29ce95def999c786d5b3836e7355f56fe7fc3210f6e1123e83d97a3badc5a5e1afe7b1718195bfd4d0a7223f2fa9af6214e2af5a0922532d5078930
-
Filesize
230KB
MD5219e7425b61f8b9f627e1a4659901f2d
SHA1651ef7d25f58ddcc3d71d2d43078a9112929cde9
SHA256137aaf991507d90ad86343ea960b798f349504fcbdc3b004ffd9a50366b6c1b9
SHA51270c20cad836330c262939882b31456c17e19c7fb120f64642910f69cdb68a4bf9a97b9fc46e337f3715b73ba7e7415ac7454b38d97124d98c626a6b6a4243694
-
Filesize
48KB
MD5d274edc2961152ef7f57b252ba90f338
SHA14683fd97c518fb7b2d579c7c2a4831e25b85c83e
SHA2567da2b9e5817ce4d4a045a5a48d867b4ad84be29ad843b35b8209a71345626ef5
SHA512a9d576c67359554fc20c685579e5ef84ca4e9327605ee9b3f3f83ac6af39333c2102cee2457e5870bda0b8bbe63db361c61b01d04214ac69d851272357c7db27
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
324KB
MD55351437186979046baee6d1aa5efea1f
SHA1106bf8b417440414f171ade11ad8f7c06a5ee661
SHA2568288bbb10602ca496cbb2b287abf02aa55837baa4dad9d7af71878d1dff50ff1
SHA5125927a2806053a679dd58a078813c3355472db61adef117f34fef92d5072fa27311f2c842ab0f43dcee7d5bc9506dd1b27a598b8a9a86f7a55a61bfad4dbc9a98
-
Filesize
367KB
MD5770d3096620863215da24d0ff8404970
SHA15d8f2bce9617566df9b44f2e589d6d40c3ebef18
SHA25672da94bf39e8fa156718a72a58b5479884ad4cb42a5bb309ce7a2c5d8d991022
SHA5125a2dcb378227380ae059b2fa7856da867ca95ee8f634f1297b53331d3e8dfb4f5f6f292d887635daf0ef57c49f85cd2fa50d0964e0910a8d6010cf7e871af23c
-
Filesize
14B
MD5c15bc8a29020a97a08e4003a05956877
SHA17ecedfbdc4d14f7bedf5ec4979051458103c7e0b
SHA256007b40b86fa555a75f1a0946fb0f0bc9fd903d1f5a3625ad3d61120593e34f0f
SHA512c2bb8b64670d7ff4688f1b64a9c8e66cbe59ccd52e8e9504658957ccb33b9266805396a9989d6930828993e102f53f9a99035b2e26c417449276f194c0060be1
-
Filesize
1.8MB
MD55ddf3de69560910dc463d4243459439c
SHA1be979d0d78332d3f6eee5b9502ca41408a162453
SHA2567581bd505390c74779beb21517f89a3a7c863f822539c4dbd6b336d1591acee2
SHA512ea01cb7983d4a206f7f2a835351b9005d74d7871bbfd2144614dcbdaa18094e67570aa131edfd3a69b5b34ae7330f692bc819cc4f1f287458629f6e882be7e23
-
Filesize
207KB
MD5e6ba9de74110fcf2e9aefc8d6ba311b6
SHA1511c7b5f4d41c9eafb02197b37a3fa5afb43c05e
SHA256838a43389495cb30047a7e4a0b1f8bd8a24c5c1ec6f9bcfe626e1485e467dab1
SHA5120df343e2a8b4637f2cee4a0645cecb54fb7f0426d0143dfd6d096de35a09777c852be6cb5182fd2d120a602ea4a4b75bd0dab06967bf1a576605bd439aa448bc
-
Filesize
123KB
MD5242bf27544620c8ae72ddec5f1dc5b37
SHA103eb0d9d8533ff0e7bee851a4ecd5221da8df396
SHA2568cff2050407bb9b43f688d196a35516f4712aff9a4e9346eb7d3877359ce5201
SHA512c65115e90a207686005420e4ab9f4506e56fb3c70d17dbf26871b901976975d95d3ce63d4a223841591ad6836a9861494d3169f98efd5a4008fc26c796d779aa
-
Filesize
512KB
MD5120f7ee16015502e2f5cb3eebd9c0ed0
SHA1d9c0fa21b092a70d7449e11c9ca1e4dfbde4e474
SHA2561859d92cc6ca7a30ca49e52db684a8f76d2de0988bb5e5906a1a251015f0fb51
SHA5124c9a02ecbda2e784017ebe5e2038bbcc90cd73148e8f1e8a12d4c75a89fddd766e4983bee4c62e39b38a3906a23270d33f8ec27984a796c1430167ccc7d3126a
-
Filesize
449KB
MD562e4ff0024dc7694f86a329c0e74b750
SHA1223cc570485809562e0c7e6c54bd3cf62a23f4bf
SHA2568e5c4256512d76eaeb6e9534e2452f7bd591afd1329a95110cab159e21196617
SHA512ea670525ba7d86a897df6f4d6f89613183754809ca927b567fadcb33c743cd3ba05a909eb23676ddd974e6607f8ba8279158310c0968b66456a446b3e663e730
-
Filesize
1.4MB
MD536ea54962cb72d9526b7045e5626839d
SHA1aa1d1fdc6f918f8c435e25293ce1aca949d2b6ec
SHA256f1cdb981bb0326200b4dd3c79228901f4b172b318c900a242ba2f9396d3f9af3
SHA51270fe127dca755c4e9dcc449f98624a83db82f05afaaa6095dd9ef93d73f1e4bddfa76c562901807771b6bf178b0ee6faffb0cd97b4f3a328aa7da33ab60f452b
-
Filesize
504KB
MD5e76e6ed96c462e68c763c8a7e5047d8d
SHA1ed2100e16b98bcbafbb2242399d8a3a5417093b9
SHA25650a28018cf25fd462c09dd25fad78823c1a0fe93fb0966ec247571745c824c12
SHA5124dd33ebf8ed23ad25740d8cafd4cf3f81b1289f34f8bb84a6123b95b2edeedf34c6434bd2b66c868ce6ef090c27040bd0ec513b526c03692e090884c4de2a7d2
-
Filesize
105KB
MD5a18473099b313182729c7118b7664e4a
SHA18a93709df6d7a3611b9fe180dac71802c717c9d3
SHA256c663174b4abc254580f31464cc7060fed9792c28e8b15c652a3a066d6a279b81
SHA512541faab01849f820a66a6e6e7c082bd31f304236a7aea3088e8ba7acf170f16a458fd5c998c9416771366ddb17521ecf86cf1a6a6122a6367a1a8899ccf2c888
-
Filesize
1022KB
MD5f17572646233fa6902f8ba4a913b60df
SHA1f8647de2c5899cb6ec811b00085b179ccbf5dff2
SHA256cbb73fe83c69e115749784bde055382b40e8ff5618032975123a79b88376ff20
SHA512ca57f616a9021a0b036fff77be4785daa8b39cb3a38ff4d04882f61919e6d70b807210acca312e4d0d2cc17535b243eeee897682b78201da16f2a89700082e68
-
Filesize
55KB
MD5b89981ed2ce990970e6f4cce14fb8e11
SHA1ba034c6ee3b74fbae4dae1a56365812161c27db1
SHA2561af6936098856df44ed9262db5cbb338a56f015f0ea9cab3716fb5066a56a20a
SHA512c16c9140df697827b191c79f2c619ef0995538e479583546b5ff8469976e68b9c16859d19e578ed8525e6d3c8ccb6413a9a89d5a5b5893a571ad686d88354af6
-
Filesize
52KB
MD50e81ed60611eab82e8da466c5c2c7855
SHA10307a51edfae5153766ee7be7588d75618f9c8e6
SHA256f88b04e830cf4ac5a69a4f165934f2b64d22da395ac939236a69c8ba0dd98846
SHA512af6569b839098bb1bbf05440fa8b77ccc4f2401b9e3fc1e98b202327fd591c95e7656a549255363c50eb2a540a4eaa19527fcad8bd402e3485f0876952514e6a
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
451KB
MD52e7cefed7d68aaeb04e6517dc9504185
SHA147eb34bda0e7c9ee9c1a17f3e84ed845e76d0acb
SHA2560b6122acfe3a45337aac3391404644fe5f661e14b3852f87ed62c978622becd0
SHA512ad1bc46c3306382b0a9f615f65416e487a4adcd88c94519fb321a30892c9d93f9f46267bd764e186bd22b3dff8b067b840ebc9942ed0027f000d721735c66690
-
Filesize
547KB
MD5ecb30af4a3885e2f7f3ba904a7c11161
SHA1491bdf8e08453f26249f8ce32f62f1d49ced1935
SHA256964798ff8d3e0e75e8f828ab07ce2b898552252b07dbbe0ce74e64d82d22af02
SHA5123bf824e5de188f7c6dd45845b91cd1d98a205777c6d83407a4e55812058f0e0c09626c4b4d7fdd285dafaf33afced85bd77b3807a8d1c496d44dcffb518a2f7c
-
Filesize
807KB
MD52b1b5c06a1750c1d0fafd65000c60035
SHA1ba621aa487a70afdeb8a4732a51931870b135896
SHA25662c1157317fe53ab11c2dabb602df72d70fa7e49ae8f4fc211c81f6cdd045b9b
SHA5128e9e5d74c258c2e7e3591762682322e80c8faf1f7c80d79257b4190d0376634f59f1d934496e967467a0358e6a7af854beaa2780581578f6106469fe6ecc8caa
-
Filesize
43KB
MD5d05d60611bc187956f823ef7a7c4614d
SHA1b672f954b5b9ce4f71375741fb0e41f48a7935ec
SHA256ad963dfa56769c286289dac35329e2b9d6f6530370cc96e2a6f276f39102758b
SHA512a95846cdb6b48e031ae352978f3a769cc1681bf37114b6b3b8ada43ebb6ff44d866898d0e610b4ae19ca68ca0b5addb49b28b9f9c20baa98d33a8827ba362e58
-
Filesize
102KB
MD585af6c99d918757171d2d280e5ac61ef
SHA1ba1426d0ecf89825f690adad0a9f3c8c528ed48e
SHA256150fb1285c252e2b79dea84efb28722cc22d370328ceb46fb9553de1479e001e
SHA51212c061d8ff87cdd3b1f26b84748396e4f56fc1429152e418988e042bc5362df96a2f2c17bcf826d17a8bae9045ee3ba0c063fb565d75c604e47009ff442e8c8e
-
Filesize
19KB
MD56d5ef11fb7f393b5bbe74dca187432a9
SHA12b6143855826ca77bc1a299e8c05691953a709bd
SHA25614c1250c00f97649e57d38b27e884d33271326c7b1d702a811440df3a4b22a7a
SHA512319ba1922ae1679ca7cc655f31200899bcfa382d10e0822f56f4339f933d6ed81963150c1d1bb47a79c06ae71240367e6a4e3b72c92456ad950b5ad6c8b2ad75
-
Filesize
363KB
MD5db6446b12bc18a0f98692598c1332dc0
SHA1550b74bea2114aef9f418634b3e7a2052e22fccf
SHA25674847b504b0cb542a1bd56fda7a6bb4295ec8253040d83cf7a16a9c425150dbb
SHA5127e4ef6f121a324f47c2a4f3ee2d712405b5310b17c2c149dce62616e747b3072c888394c367840d7f23ead97f590706c5cc70c4ed3a1c44f4d706695fa59049f
-
Filesize
731KB
MD5f13635429ad562ebeebc7c5f6a185487
SHA1f8b50fe20088b1dd4e42087aa8d1fc9edfbe037c
SHA2564eb13a526a00b255bf47cb28fae2af2695e85d84daf92f31debc2ff9242e801d
SHA512a19afdd96abe32c0a251df973ff16705e0664defc6edcc8c8d120434378ac85ca5f7124a685ac434d2c406814ea621e91253f44a72eec6b59e92f162a1b1068c