Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
latestroc.exe
Resource
win7-20231215-en
General
-
Target
latestroc.exe
-
Size
7.5MB
-
MD5
0fb0767520be820c0c3f415fb1bad41d
-
SHA1
e7d6c9a34762e47075bd7716a31db83b9043ecf1
-
SHA256
92e4602f85cc9714e48613d178b5dc8ec55bd78474c73c69de3678e94f7f0921
-
SHA512
482c4a3c308ab5943bb3df5449b3d3ff621cefa45d5ff67022f1b6398b9ff2918c6f170f653c6ebdc2aee9283bc050ce56156d7a439cba9756759e4c4e859a69
-
SSDEEP
196608:1c7qW725oFNKI4eVrTdNqNkNxdL0ws3vnDcekNeMt:1OqW72oFNv4iHdNkkdYwqDcekN
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
xworm
163.5.215.245:9049
r3SLo8kx59hai6gX
Extracted
lumma
https://braidfadefriendklypk.site/api
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/2272-151-0x0000000002F00000-0x000000000302E000-memory.dmp family_fabookie -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/files/0x0006000000000717-670.dat family_xworm -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/3152-352-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3152-349-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3152-347-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4552-372-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4552-370-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4552-369-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3152-362-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/1676-48-0x0000000003350000-0x000000000374D000-memory.dmp family_glupteba behavioral2/memory/1676-51-0x0000000004EF0000-0x00000000057DB000-memory.dmp family_glupteba behavioral2/memory/1676-53-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba behavioral2/memory/4732-105-0x0000000004E60000-0x000000000574B000-memory.dmp family_glupteba behavioral2/memory/1676-103-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba behavioral2/memory/4732-106-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba behavioral2/memory/4732-182-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba behavioral2/memory/4732-220-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba behavioral2/memory/4396-322-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba behavioral2/memory/4396-378-0x0000000000400000-0x0000000002EE6000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/2204-443-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2204-446-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2204-447-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2204-449-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2204-448-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2204-450-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2204-444-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2380 netsh.exe -
Stops running service(s) 3 TTPs
-
.NET Reactor proctector 8 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/1824-487-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-488-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-490-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-492-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-495-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-499-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-497-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor behavioral2/memory/1824-501-0x0000000004FA0000-0x0000000004FD3000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation latestroc.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation C0C1.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 3B33.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation work.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 6554.exe -
Executes dropped EXE 23 IoCs
pid Process 4648 toolspub1.exe 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 2272 rty25.exe 2000 RegAsm.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4396 csrss.exe 1660 injector.exe 4628 ABE0.exe 2644 windefender.exe 2516 windefender.exe 652 C0C1.exe 3152 C0C1.exe 4072 C0C1.exe 4552 C0C1.exe 1932 reakuqnanrkn.exe 624 D7A5.exe 1824 E1F7.exe 2732 3B33.exe 904 work.exe 4656 fesa.exe 4688 5C97.exe 4392 6199.exe 3136 6554.exe -
Loads dropped DLL 2 IoCs
pid Process 316 RegAsm.exe 316 RegAsm.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1896 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000700000002324a-333.dat upx behavioral2/memory/2644-336-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000700000002324a-335.dat upx behavioral2/files/0x000700000002324a-332.dat upx behavioral2/memory/2204-442-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-443-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-446-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-447-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-449-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-448-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-450-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-444-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-441-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-440-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-439-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2204-438-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\48f4c113-fbdc-4a12-bb7f-fcc063fe114c\\C0C1.exe\" --AutoStart" C0C1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 69 pastebin.com 71 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\MRT.exe RegAsm.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe reakuqnanrkn.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4656 fesa.exe 4392 6199.exe 4392 6199.exe 4392 6199.exe 4392 6199.exe 4392 6199.exe 4392 6199.exe 4392 6199.exe 4392 6199.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 652 set thread context of 3152 652 C0C1.exe 140 PID 4072 set thread context of 4552 4072 C0C1.exe 148 PID 1932 set thread context of 2120 1932 reakuqnanrkn.exe 183 PID 1932 set thread context of 2204 1932 reakuqnanrkn.exe 175 PID 624 set thread context of 2216 624 D7A5.exe 178 PID 1824 set thread context of 316 1824 E1F7.exe 212 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 7b0d48dbbf50fe239f1097f5d01c2a6d.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 7b0d48dbbf50fe239f1097f5d01c2a6d.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 7b0d48dbbf50fe239f1097f5d01c2a6d.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2764 sc.exe 5016 sc.exe 2976 sc.exe 2172 sc.exe 4064 sc.exe 4796 sc.exe 4712 sc.exe 1672 sc.exe 1512 sc.exe 2600 sc.exe 4492 sc.exe 2052 sc.exe 664 sc.exe 3948 sc.exe 3656 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 4460 4560 WerFault.exe 94 532 1676 WerFault.exe 89 2312 4732 WerFault.exe 105 3524 4552 WerFault.exe 716 2216 WerFault.exe 178 4200 2216 WerFault.exe 178 3432 4688 WerFault.exe 220 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ABE0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ABE0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ABE0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5012 schtasks.exe 2776 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3136 6554.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 toolspub1.exe 4648 toolspub1.exe 4560 powershell.exe 4560 powershell.exe 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 2140 powershell.exe 2140 powershell.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 2140 powershell.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 3532 Process not Found 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4648 toolspub1.exe 4628 ABE0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Token: SeImpersonatePrivilege 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 4576 Conhost.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 5108 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 4384 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 4304 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 2188 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeSystemEnvironmentPrivilege 4396 csrss.exe Token: SeSecurityPrivilege 5016 sc.exe Token: SeSecurityPrivilege 5016 sc.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 5052 powershell.exe Token: SeShutdownPrivilege 4944 powercfg.exe Token: SeCreatePagefilePrivilege 4944 powercfg.exe Token: SeShutdownPrivilege 1240 powercfg.exe Token: SeCreatePagefilePrivilege 1240 powercfg.exe Token: SeShutdownPrivilege 3996 powercfg.exe Token: SeCreatePagefilePrivilege 3996 powercfg.exe Token: SeShutdownPrivilege 2472 powercfg.exe Token: SeCreatePagefilePrivilege 2472 powercfg.exe Token: SeDebugPrivilege 1408 powershell.exe Token: SeShutdownPrivilege 2064 powercfg.exe Token: SeCreatePagefilePrivilege 2064 powercfg.exe Token: SeShutdownPrivilege 1608 powercfg.exe Token: SeCreatePagefilePrivilege 1608 powercfg.exe Token: SeShutdownPrivilege 2360 powercfg.exe Token: SeCreatePagefilePrivilege 2360 powercfg.exe Token: SeShutdownPrivilege 4104 powercfg.exe Token: SeCreatePagefilePrivilege 4104 powercfg.exe Token: SeLockMemoryPrivilege 2204 explorer.exe Token: SeDebugPrivilege 1824 E1F7.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4656 fesa.exe 4392 6199.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3532 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 4648 2996 latestroc.exe 88 PID 2996 wrote to memory of 4648 2996 latestroc.exe 88 PID 2996 wrote to memory of 4648 2996 latestroc.exe 88 PID 2996 wrote to memory of 1676 2996 latestroc.exe 89 PID 2996 wrote to memory of 1676 2996 latestroc.exe 89 PID 2996 wrote to memory of 1676 2996 latestroc.exe 89 PID 2996 wrote to memory of 2272 2996 latestroc.exe 90 PID 2996 wrote to memory of 2272 2996 latestroc.exe 90 PID 2996 wrote to memory of 2000 2996 latestroc.exe 177 PID 2996 wrote to memory of 2000 2996 latestroc.exe 177 PID 1676 wrote to memory of 4560 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 94 PID 1676 wrote to memory of 4560 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 94 PID 1676 wrote to memory of 4560 1676 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 94 PID 4732 wrote to memory of 2140 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 106 PID 4732 wrote to memory of 2140 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 106 PID 4732 wrote to memory of 2140 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 106 PID 4732 wrote to memory of 1592 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 110 PID 4732 wrote to memory of 1592 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 110 PID 1592 wrote to memory of 2380 1592 cmd.exe 112 PID 1592 wrote to memory of 2380 1592 cmd.exe 112 PID 4732 wrote to memory of 4576 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 161 PID 4732 wrote to memory of 4576 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 161 PID 4732 wrote to memory of 4576 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 161 PID 4732 wrote to memory of 5108 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 116 PID 4732 wrote to memory of 5108 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 116 PID 4732 wrote to memory of 5108 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 116 PID 4732 wrote to memory of 4396 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 117 PID 4732 wrote to memory of 4396 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 117 PID 4732 wrote to memory of 4396 4732 7b0d48dbbf50fe239f1097f5d01c2a6d.exe 117 PID 4396 wrote to memory of 4384 4396 csrss.exe 121 PID 4396 wrote to memory of 4384 4396 csrss.exe 121 PID 4396 wrote to memory of 4384 4396 csrss.exe 121 PID 4396 wrote to memory of 4304 4396 csrss.exe 123 PID 4396 wrote to memory of 4304 4396 csrss.exe 123 PID 4396 wrote to memory of 4304 4396 csrss.exe 123 PID 4396 wrote to memory of 2188 4396 csrss.exe 129 PID 4396 wrote to memory of 2188 4396 csrss.exe 129 PID 4396 wrote to memory of 2188 4396 csrss.exe 129 PID 4396 wrote to memory of 1660 4396 csrss.exe 131 PID 4396 wrote to memory of 1660 4396 csrss.exe 131 PID 3532 wrote to memory of 4628 3532 Process not Found 132 PID 3532 wrote to memory of 4628 3532 Process not Found 132 PID 3532 wrote to memory of 4628 3532 Process not Found 132 PID 2644 wrote to memory of 4256 2644 windefender.exe 203 PID 2644 wrote to memory of 4256 2644 windefender.exe 203 PID 2644 wrote to memory of 4256 2644 windefender.exe 203 PID 4256 wrote to memory of 5016 4256 Conhost.exe 136 PID 4256 wrote to memory of 5016 4256 Conhost.exe 136 PID 4256 wrote to memory of 5016 4256 Conhost.exe 136 PID 3532 wrote to memory of 652 3532 Process not Found 141 PID 3532 wrote to memory of 652 3532 Process not Found 141 PID 3532 wrote to memory of 652 3532 Process not Found 141 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 652 wrote to memory of 3152 652 C0C1.exe 140 PID 3152 wrote to memory of 1896 3152 C0C1.exe 142 PID 3152 wrote to memory of 1896 3152 C0C1.exe 142 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\latestroc.exe"C:\Users\Admin\AppData\Local\Temp\latestroc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\7b0d48dbbf50fe239f1097f5d01c2a6d.exe"C:\Users\Admin\AppData\Local\Temp\7b0d48dbbf50fe239f1097f5d01c2a6d.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 26604⤵
- Program crash
PID:4460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 9843⤵
- Program crash
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\7b0d48dbbf50fe239f1097f5d01c2a6d.exe"C:\Users\Admin\AppData\Local\Temp\7b0d48dbbf50fe239f1097f5d01c2a6d.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2380
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4468
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1660
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5012
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 8364⤵
- Program crash
PID:2312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\FirstZ.exe"2⤵PID:2000
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"3⤵
- Launches sc.exe
PID:1672
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4492
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"3⤵
- Launches sc.exe
PID:1512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"3⤵
- Launches sc.exe
PID:2052
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4560 -ip 45601⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1676 -ip 16761⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4732 -ip 47321⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\ABE0.exeC:\Users\Admin\AppData\Local\Temp\ABE0.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4628
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:4256
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2516
-
C:\Users\Admin\AppData\Local\Temp\C0C1.exeC:\Users\Admin\AppData\Local\Temp\C0C1.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\48f4c113-fbdc-4a12-bb7f-fcc063fe114c" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\C0C1.exe"C:\Users\Admin\AppData\Local\Temp\C0C1.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\C0C1.exe"C:\Users\Admin\AppData\Local\Temp\C0C1.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\C0C1.exeC:\Users\Admin\AppData\Local\Temp\C0C1.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4552 -ip 45521⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 2201⤵
- Program crash
PID:3524
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:1932 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2120
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:664
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:4800
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
C:\Users\Admin\AppData\Local\Temp\D7A5.exeC:\Users\Admin\AppData\Local\Temp\D7A5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2000 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:3656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:4064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:2764
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4796
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:4712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3136
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 12003⤵
- Program crash
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 12003⤵
- Program crash
PID:4200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2216 -ip 22161⤵PID:3172
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart1⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\E1F7.exeC:\Users\Admin\AppData\Local\Temp\E1F7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:316
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:4256
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart1⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\3B33.exeC:\Users\Admin\AppData\Local\Temp\3B33.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Checks computer location settings
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2216 -ip 22161⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\5C97.exeC:\Users\Admin\AppData\Local\Temp\5C97.exe1⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 3442⤵
- Program crash
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\6199.exeC:\Users\Admin\AppData\Local\Temp\6199.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4392
-
C:\Users\Admin\AppData\Local\Temp\6554.exeC:\Users\Admin\AppData\Local\Temp\6554.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:3136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '6554.exe'2⤵PID:1564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6554.exe'2⤵PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4688 -ip 46881⤵PID:1948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5d5656a72a1c2e286f6b50a10f2b616c1
SHA165a1b757e49a9658e0e64563bd36dc84d129a677
SHA2564c97a8944aebd40732c5a9816852f96ae08375c7d21503092be9104133686066
SHA5125d3344b30e3df253d64e0deced9ca7cde669f2609b6586198fdf04d968d7b752daa7e3f3aff4fe14ebfb37b687df95bce8f97728cf64cc2ada7f29b09ca1846d
-
Filesize
245KB
MD51b9e5d2222767e4e8829653e91a98e02
SHA1721d087f6b7896f48205082e17d9dcb4d361bcb8
SHA25624442d284475f81ec28ac8fab96f3cfadde7b9c0c83b29ddaa60b0a73201e9a6
SHA512e3f220121b9f54c43756f7f6338084dd30cd1eae72bbeb5b5dc2e806a17500fa59516a9df78720223142343838c0a083136f7e9e7e9b0da5f2288795e1445b7a
-
Filesize
210KB
MD56934f24def1a5d4ccd8213a26b745917
SHA147859783dc9052d2d36b2f46b7d2ffa44400457f
SHA256e1aade33e8b13dfcd842d2a7277dbb9caea0e0eceed890b1b8533ec8183748b4
SHA5127595fdbdb125c7f4968035ea3d6fb96d3bf57b4bd14cd0600607f235da1664ab897811de2e6c6903b3c09098bf4d7f2cd4fa82c8d842ca76873b4c3db17a92c1
-
Filesize
120KB
MD5f5077ca66f6c019e86b222e2a9d5c4d0
SHA1c6b13d665c84097e73d1fd206f2e0764800407fc
SHA256ec042951c7d64a3fafb299f39c6e0c848ed74f7033366903153f2071aa01dfae
SHA512520222a387b869a1542e676ad756da92d488de1496901c62ae55e0300e417c60669284dc2577181ca6fe67d8618d4228a48d11850060f9164637edeee0184418
-
Filesize
136KB
MD50b5003cdb26ce26a91736b28fe6caf31
SHA1b6710024353610bf2c6f3ff6837057f09cfed8a5
SHA256729added9c2767a996009acbc623dd7efc71df8faf7a22319fef623951257759
SHA512747f510a6a980c16f1bbd5bb66a6912bbaa764ed6a923632dd480b7aba81fa08203975e79bf262c1d7a18d94e53eb307a5f3cf6b064d6e47930b8317e7c68f5f
-
Filesize
17KB
MD5fee3c12e774fe5f2360c45bb6ef47b0b
SHA10b929d2d2cedd40a834f0b5354d59e73069024b1
SHA2561e453e3329371447bbe877f95877ebbf086fc08dee2d4558544106c308d8ce5f
SHA512ade2b549e85a13f8999602f304008b07488163a6f15972d38514985fcc4999395a560e0480340be816f0c7d9e37f4c28551c9b44abea85a87d2fae4529a86701
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD583685d101174171875b4a603a6c2a35c
SHA137be24f7c4525e17fa18dbd004186be3a9209017
SHA2560c557845aab1da497bbff0e8fbe65cabf4cb2804b97ba8ae8c695a528af70870
SHA512005a97a8e07b1840abdcef86a7881fd9bdc8acbfdf3eafe1dceb6374060626d81d789e57d87ca4096a39e28d5cca00f8945edff0a747591691ae75873d2b3fb5
-
Filesize
286KB
MD5b41a8f418f9fe72c3c7f344624170114
SHA1fd7d930c9de15cb483ab4713c99bb3f7c2837f92
SHA256e83cce5202fecd1a486bdfb2aeb46f311c6f66426f3144e1f55e75c80226181a
SHA5129dcfa1b97f53a5ea6eb519bef76f23ccc95317a52b9ba92e43caa4da60ac62e54b32b3316dd226c2f7a8b0fae10e4c565ca051b9d3fb2c8e5dd9eebff51e845d
-
Filesize
199KB
MD55214f5872c154b832355b70135a0ac00
SHA164a9a817ae38b45f59a52f9b28e1838d3dd08b8f
SHA256351ada0c29106fdea643f92cdef374faafcd359f14cd80a2b3cc088f03401d6c
SHA512ceb5acb39d521abafd53fa77c0bb57149161c8c131eaa11c5ecb05eb060a7cf370503b83dd30a33fbf43e4832f3b73a8b9cf8d40abd8ef66c563d4274337c2ca
-
Filesize
81KB
MD5fd7657f9231d73e503565f3b0ab9c69c
SHA10f08267a89da7a50273efd8723aab976a236ec3c
SHA2562270bd740bed02d08308aa9915446e590aaf665b67701b7ed4ddfb9cadfaf146
SHA512fb20a0bd16e426914b5088b5feddae76e43125ede961a2a127608f17a2a94a76e20e2105a5a1c80efbc33857d5bc52efdebc0a1704da03ba1807fc06ceea16f8
-
Filesize
154KB
MD54983847690c28e38475ed896e1343bf2
SHA1f47f36d8894b7f83efb23fe674bd56e2d7c596af
SHA256e672acd58b8d74f8891c91586fa6102dbc050760a9284668863c857b5c9ce033
SHA512851e4c10a471a6910e4ac25388e97b3e9213630c86279addf3b873e9954218a376335a8e146336206349397ffa8b164198f39bb342268b3dd83ce88241a8bc03
-
Filesize
135KB
MD51141ba1ea472b0c69b0c40ba77ecf156
SHA1656e6cf78de4435895e56ce51e52bb5e431d3efa
SHA256c30aec0b7f9603b1fa5dd6a5d1ee29336540e33d5d23a028e901e3ad57e0478c
SHA512a4bf9cea325e069f4eda615f1ba09c07d9ae1cb165e01933021bab0462087e42fdbd52a70fbe1101907757cf2b5d2bf47bcf96a8461ee7c14c966d796bbf7cb9
-
Filesize
240KB
MD5d1f8f53b3a2369b70519b08934f5810f
SHA12075e6a5dce326fa269d5f518abc63b098abe844
SHA256cc6887142738a489d6486892347bfe04f90bd89e4144d614f8d74a5daff6aed2
SHA512daa30d799c57b9f01f2b6ba436a0bed9807f0f0f0b6abb82df9a80275ce131295cbf76200348a0f8a307fbfb19038834fe8cacc1b9ea414c2ad95048d1647354
-
Filesize
65KB
MD53b5926b1dca859fa1a51a103ab0fd068
SHA19b41d9e1810454b00e12cc386e8e31fc1bd29ef6
SHA256e1f3e0bc705e2917d285f9a9ab49cc6444ff9267b46cbf1be3b97f9a716e6d08
SHA5126f924f3b1a7bcce36cea2ef0f73dfcf837b2ec03da44e0a12d6afcd2af1a92d20af251d04fd3970beedad082d646fc84ae7107b4111f43abc12b5a1e3d03a794
-
Filesize
295KB
MD5b4512effb2db71dbe532391edd02907c
SHA1d76446bbd2244634993f0e0b439afaefb11ce985
SHA25611a39fc36642ef1e2cdfcef7865a45c4b07812f38c94606e40633f11b061c31a
SHA512e0ff20f1e12dc5d3bf6e8d4d869a7f6fa348a74765993bd018a4e577f7c3b5dd06686146b9b62c15560546c568469e34eb6e26da7fc4dc894ddd9a144bd7d288
-
Filesize
726KB
MD54c112ddd7c5c48b26bc9a6ffa95436a1
SHA1cc9c89a87ced5a9f96713959138252af1b0064ce
SHA256783c2f792bd905736522f39fad361bb7c90673afde1c46db5b615598e6e6f345
SHA51208e8a64cd69816dbdfbb01797eb02302178f84e4dab9a805b15e83ccb65ad0cfd41c79f41ec4da4bd1c74f549404d0c462a64bfeb7be6606552ed45dc031028e
-
Filesize
656KB
MD52e137bd8831af2e11b6f4453fcb5d087
SHA1027da952554dea20e7aeb59067dcd28b28712d27
SHA25608d4b3370723845492a3d5cfbdaaedfa4c7008745ce220aa5bafef16fbb8bfa5
SHA512e78a5a8f5233f11a3e36262a09c7a1ae8542ea85c60b42da204ee9cb66b492a0043727cb1bd99c73b993a4117f15b3e118ef25f5d7a4ba02eb1cc90f18b5a349
-
Filesize
644KB
MD56977ca770fc10280a1f5a8ed64659ff6
SHA1eaa64e282ce1cd09802728b11489a7d3216806f0
SHA2569cecf0b04e14259f208bc5ff3f61facd6fdf5a589b43379d520f4bd3b4c577a7
SHA512902d0b3d4e91d13cdd05573585d6534f4f9f989fa3757d3a34def79f1f4900a5c89fea909074a7b2d46b58b56100f02c23f19b841b2f145f2ad9c40d084e9456
-
Filesize
133KB
MD5277308f2fadeff20c58f8564281a9abd
SHA1e2b21c73983ec49009aebae7904af599b8ab00cc
SHA256d9b3d201a2422592fc03ddafc6866aac4135492d42753c695158478e59b286bc
SHA5127059394f60b85e0fc12045a9afb188e4c83356ef1c59c7ccbe31f7a4bd410a629142998c9efc7f9dec5f959f30a93c83f3d5484b2c74d443985e21d2d1a07d53
-
Filesize
13KB
MD57a288576c7107ff4b9cad76413e6b99b
SHA1cf278e5351920f1e51402ce59564f45c28e9e081
SHA25650da254e84c02c3525bc6b157d8d6754b2d05d09788bb67a2194e0193f81ec29
SHA512806e7d792fa1d37e3b0bacef91252f687ad10ff125c73f6194c7db285097689e7130eee1d72f77f997ec3b7d982b0bdc9863d016982ccd6175387c936e25d2ca
-
Filesize
133KB
MD5ef196c8c8df06c4a75e7774cc1748e2a
SHA1f2f096e49408e7c4e81a5cf9bb856b14c319fe99
SHA256f2bec558a9b264fca3f63bb017ad0fb0349da4e03535b729e196a5c89d585b3f
SHA512c150d6652bc2171525e7d3f490f974b9a9196db19386c3ec6dc216245f21c411269d2f732f07b3ad4a97914947cd7f0ecf37ce65351fe7c2dd322f84dba142b2
-
Filesize
81KB
MD52beff96cd7c2692b2b6f0db6097e3f17
SHA1a0bca53591c8f7fe1a04910281b543a0ae8e76e1
SHA256ed168b394f921cf83e80afdf14b2d3688bd9c46e684ba546b0e473ef96736302
SHA512d77105753cd57dc0ba759d05cf254394b7debf4b100537be11f0a2cfac5cec018aad6b389e779859ee380fc28453ec6226b7f02e2651f647db69fb89e728c926
-
Filesize
86KB
MD5b80510b4d54eadad7ac753ffb625085b
SHA1b30f9b2ccb7806967de78c3ea5a0b5cadf267971
SHA256949caa8b15bce3efff451a1fca41e8f8cfb7f33b25ac7b00b3ea7bd07c2b3cda
SHA512ce5c09a0f28fe56356b9be0631eb319f3e9626f149db0f2c0f9e391e20dd6cf107613dc170bdfb25cd964f7918ccdaaf03abda768612c63f164e61bf0df7771c
-
Filesize
1KB
MD545300fc68a9f8236c25360b62139eab7
SHA1bc12b28dfb0654cc5400e1a5b836b0fb9c7c5a75
SHA256ce10bae62c591ccc5171b909b5bcec1ca6ec513c6af1817364016afbba84e65b
SHA51235959be17282b0aadc55c943f9ece7b574bfa02046d339847b2c02f5ef33b50ae45e3d9fb0a0b81bfd6a02061d1205078c8c5e174e2cfe5167e5f3e3ffca7135
-
Filesize
269KB
MD584b020e6252f6145641f3dde85604010
SHA1a07b329480dec04c2a2e49edd403690f245607f4
SHA256d6ae2b756cf710e14a2dec613260facae8f12abfdcd08450dd4f9bbe9ec289b9
SHA512391a3a479f754524d5886c4f54f29cea914cffe5cb0aabd59b20844db63ad4980f95c873a8cbd8337f8f820c8aa815f3025f2d34ec6a84258238ebef83064a59
-
Filesize
154KB
MD5b2da4f5ed3448c4c6d7033797b4c9ce1
SHA187937808899ceada415a5e2fb9442ee55a1ca02e
SHA25630222cfc9509aab1be1b6056bb17c31f6635b1868fd6eea9093270b8eee8fff8
SHA51213d910af6dd2b6faa6b46fa18b0b851bfaef5e51894273348fc1222386f3b30e968abfe15bbb736d069f9f4fc1eaa7162e0ecade382b73ee2f16cc9933a5c67f
-
Filesize
190KB
MD5220644cd0b33f87ba201d82f2b86c2e5
SHA1cd408956c48493683845b28f15ac1dba5ad521b0
SHA25662c292d268eb99f68a31d3bc32219d4460c573e251c59702a9e3576ce0a26127
SHA512aba07e7099069e0f6fe66a3554c88375298db8330305bb91393dd51bea952c3fe422ebb2ae2d0a066a6ac63608483ba89ba86a99d3488391e9674bfed97c16ad
-
Filesize
111KB
MD5f55df846d5bb15bf95c344c5d243da29
SHA1a0e208e8584f6ad5d2180719cab02ab300f1b535
SHA25660923817e738b067b7eac1a77c1b94c612d123bd80221c98cff0c19aae4d34e3
SHA51218b3b25e2c790cf7cc59c8d958d5130e0ab8102121e5625bb85e7671c147caad1ca7b23bd82043ba5fb2a54fc12514de3ca92e131077213465073a606a593db5
-
Filesize
120KB
MD5c3e03c186dd2db0c0293c5cf181f13ba
SHA144a859cc00e2f5334e9598648b320abe5dd6a7d1
SHA25633d24ff47d0b57b15075aa2e4b66c561dd91ad4a4a8c9184fb10be005ff88545
SHA5122bfe062fa352b47023b49866cc23454ab62838146f50c7017dc79fcead718c87ed9109b413acfcfaef18234ba8f730b195eb14858ead33056ea2be78c2656ad1
-
Filesize
244KB
MD5a2495916fb7ec1fa880f7d531bfd18d9
SHA19e81c7a604d470c74f2d446130db5d92d2dee256
SHA25670ee77197fecf8d1260a6ae5a7bee4d5f0c0de895610fc10a220a76858e73482
SHA512e375f96ab2ae1b5ad825a91b083342ff64d633a79a4622897285512913d16d48c72268c6f14662cfe88ba071a80e4f1d268774a460a7c0728d1663f2a34ce100
-
Filesize
290KB
MD5b1f4535654c1e75519c11c358777085b
SHA100acfcb302581b8636c525c8f7b6b9ab11474d79
SHA256fedfe9ad6071b61d1c2c9c5ae7746ba42ffec6681616126d6db96cc7d09ad6a6
SHA51273c38877075939b0b25fcf1458e54d4ee16918317d1dfbe9b29f7e5197a1013927f848ef2ae8ad1cbe764721773700a55c80e149401e49f3ccbfeafab25d137c
-
Filesize
356KB
MD55f55aacd144cce3f3e3f6f771d7b99a4
SHA13d686e487bc3de2a44f2193271116cc4a5dda980
SHA256c55094422fa99193800d5a2227fce31bc8a0528c57b848fcfdb5cc6821f422e9
SHA51297c025bf0814a9e42bcbd4546ffb0bdd7ece64251eeafcb1937f1d9546cbacb4ff51087daf00d6fa083d1a1d2170ccb37ca0deaf0f3c83ec16c7ef6f2a74946c
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
78KB
MD55fc6a891686e7ea02b9682135e09c26b
SHA1f19d36118b999eef5d6f9d9774c7c160ee3c9f92
SHA2566cc9160fa1fa197f4c6b101b69c2c9c3054863d43ab4e54adc6ab86448381621
SHA5127cfc667021f4ae8a17b6ed7dbebfe9a82ba10dbf7528ff14dd60ea3a59a5dee37223882fcf8ece8372f520cdc0f8d49ca976f2f653e6d40b0d0bd416efd10abc
-
Filesize
141KB
MD503a095168dcee53013a57adee093d89b
SHA11d6fd1695296a112aefd3a2e954ec1a456cc1a14
SHA2568e271915b9bc120cee68c7d02e76d146caff01b3234b35a3f9951c50cdc4e841
SHA5129fef55a09007c4e9747ea19f549d8a4a4e207c98627e726139467eef8ef19e5fed7b1a3b60a1bdb60168e2eec731bf9dda707b014229e16e3a9239ab79be0573
-
Filesize
214KB
MD50951110588c48008752707ea2c92336b
SHA1c4d655377de5d18ef8d965625b735ddc9cee172d
SHA25665742e0ee8ae678b07110d9dadd5f8e357afc337ec0452fb9d096e51b939db1c
SHA512643a0726c70a114e21cfb6fae5cd9f530d710947c7eafbd0ce22d5e4093d042b306d4a423d270b3feb0be4897bed9b31415fd52f078080859aed64e65222ff14
-
Filesize
141KB
MD572170656790a38f43a565ddd1a634e0d
SHA1c76e513a324c6d9bbe428966cff906fecae8c49f
SHA256907d07682dd06b2a9e6ef49e5d31719ebd126678ebf410bbbdc016369d800f8f
SHA51293085bd1abe39d319d78dfa4e0a585841115eecacd941a23fb7f01b32cb1ecdbddcd916b0b872c0e76b6b2aa20b226f22b8ada66ec146a7b430950b700a9caab
-
Filesize
122KB
MD5e0481ab0fef983abba2b8ae8dbc38113
SHA152ed6e21e08449f55644542296754c014f175838
SHA256924cc0801d18c04ddbc359ba94a9a53f26d6c2b2ad3162179ab1697d7d437d75
SHA5122f0b72a7de88d46def6ede95c1b9cddf756936ae5e8fa898f500b072593e4ff23f44cc65c73a84c3d1d6c58c130a1fa36d44b6b3b21d93ccee13af9532e78771
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
67KB
MD50d9d80485bb6f2b2435adfcafce97294
SHA10158aeea1cf672f3e52ce98e0f58bbd0608537d5
SHA256d996a4212ac867dde989ac50fc88506b4d7bdf6bc60e8f6f343561c88b9cbc7f
SHA512188811d04b34b1a41e087853041feef1ecbbf6049f5860c27f583f4ae673b1d14533534bc087fe2dc41f7395f629b419fc5e296296add9f52704058db3a7aa7b
-
Filesize
135KB
MD5e7d603581d1715380fcf1ab279e9de08
SHA1eba59dd71f33508f40a33772709c9070d48002e7
SHA2569e7ea60913f16812af3dddb0be818c5a391331fd27d1b355c31999a907403769
SHA512e50ac7d984f42d28afbf67cca8e43206282b903ea734dccc84811a113f14aa3b13121740014cbee3599abf37c8eaa66d9c7653383ff46aa25d044e5f68184b46
-
Filesize
715KB
MD50b374be36fee0eae8b1e305f1e4073f5
SHA13e5f24441b9f00c3e5beb7ef2438d1868259d852
SHA256bbd48c58bc41696a56c317d9650057c725642e5c1dee71a8b4f0b9cbd9095ad4
SHA512f8abf77020dfe9cba6c8afb6535a86338a8923dac7d3a81ce78110302708611109c3b80104178ec6dcd95ce7d9e60829fa8b88c7411aa726699aec04eaaccb9c
-
Filesize
621KB
MD5be936129997a04802918052d19c93aac
SHA1e0b1011b4bb2c5585536b6cab879c26b56ea775b
SHA256acd2980b06b55eb7a6adc6054770b8573eb725de356f28598a15bcf8e7aabeaa
SHA512bfc4d76312911c8b5715e59900e2b245fb64e2548c04da5049b7440cb43032796304aa3824fd974785a11d6c3dd652218b10f11d44a3292d9f8c2a2068662ef4
-
Filesize
579KB
MD5e4412f19bc0958f8839747b727832c93
SHA1ebbc3e9db7d5ecbdfa65e4a5a50ba03419c00c99
SHA25620d4fcf7c8b09b2096e62e810630ebc98b3cc7d26d7d2fae4d0e5eb4931a7e89
SHA5124a447e0192da1dc621eaa9176dc845ae3e24e0926e47dfa7a4d531b4159bac1c61b6081f36b39a5d236a50209b9fde160b95c07cd456e344e81d44a13dad8f24
-
Filesize
175KB
MD501fb175d82c6078ebfe27f5de4d8d2aa
SHA1ff655d5908a109af47a62670ff45008cc9e430c4
SHA256a07112e236e0136b43294b31a43fb4456072941a135853e761680d04315841c3
SHA512c388d632c5274aa47d605f3c49a6754d4ad581eb375c54ce82424cffa2ad86410a2ad646867a571dcf153e494b4e7ca7a7cf6952b99ddcf5940a443f7039f2fe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50587e4f1c8a078ee9ad84910edd02a23
SHA1d05130885965c40a77613ca42719fe28acf148b6
SHA2567d6e9f69e4f16e5005dac6235703e51d6a44842a2e7522a7ef1aabc12d235d7f
SHA51246d9577cd725f925988b8e12593808b52c9d8d1bba19c4c043de219eb25e9fecb40a2ae0ab7aea0ef4e4c55c641625cc1b641cc3933a29bed8281d32c9e880e7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d4b578fc218daaddd62c3ecc0d4fa66b
SHA1d71d55fd2d45f9e6d5d9e4d101d6d789134fa842
SHA256ee6fbbab815bbacca304495a927629c13123c91b16f50d34b9a97696e37c1315
SHA512ca25f12793fe4c2a1f708e3ed991ab32634435154775820bfa82744ae87bce6d21c111f30fe45b886545f936fea84186317581d66d7d5b7677fb3f4c662e3f92
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53d11fcb2921b39a58f4ee3ea0acc75ee
SHA1688d9d315da84a72af2140fa698cf6e0741c321c
SHA25603fc827dd29994f8d8d263d1044fe37998fcd1785db3ed621fe3c1b37d617237
SHA5124ea47e641ff1820ebdc6b09722f21a9acd73e8d1133326e7ba2a3ee0e6bed2fa5ac8166b98f877f53e4003253d6c1016602d156694963c8f0c4d7646fa70927a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5308bdace939369362f9fd1d4c5cc9453
SHA140b141ee55cc01c81adf402bde69860478785339
SHA256d9c26d90c207a8f296fdcfd27ce0cedc4f4b331cb4e603dac779de46b7ed5cdd
SHA512cd7ad3978698b767b13b09de57ebc83786d8a6e1a05b76d07680674570e4c188f80390c2fb0a799015a80f5bd9c2285d7c46590b501f31eff7c51984fa45fc5d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD549ef12aad122bb5e09484526cbb4ed5b
SHA15ee1fb9189e4ba412bdee18d6c1399a6cd192edc
SHA2565df482384d8f0e8d95035861b7a1e08fa7dc557a7d5fab63a02caff007b35459
SHA5120fa8f2ffef88c5683931af03fc2c9211f0f6079bc03199df23d22feff08e3b161d8490285d0828b0fda8158313530cac6f43d9d9ca76496db470be379777d7e3
-
Filesize
95KB
MD524ad1df4633fd27f614f0c1ec9620004
SHA1d49c4dd89eb521604d382b362284b46211ddb08e
SHA256f47f0343d1754e046a01517685acbaafca6251a37ca054047f186999ca271782
SHA5121f4d25040165e0d48e9814083c92112411a32f8b546edaad1d691eaac4dc3ff4ca94e45bf3a56f04df0b84c509e6e6179baccf892f6b7f9f80b3845a42efc952
-
Filesize
76KB
MD5d931a6eefa89454274b19527f8b01465
SHA1d22f10d3c58e889558d4d16e7f5cc1fc16690487
SHA2561e8587316705fb71280c5d309e234315c286ae9f668e93ce4b1d2e8b00405cac
SHA512a6605c304056270af674044020590beb0d7fb11a4701cfeaa9cfc7b3144041bb00990f17bb6ca550da482ef1a9e0969a6a51a8680417af4526126e06b030dae6
-
Filesize
88KB
MD50b0d453153c1b616ff67314d7a0b4aa9
SHA15ca3b99be38e8bfead31cf397657f0f37289579a
SHA2564da739ef9de89a4c01fd9a060d7041d0642b5297a293d769d39f27ccc39f3dea
SHA512a57da7aadec20aa052a20c72f5a25b8fcec079a005a70a985329221ef928c1f4f05d87b44f63128d3625645e84086983f4c7338737bbaf41d51233b1eb4bb818
-
Filesize
92KB
MD5df987deace3fc06e593e47b66a1b6518
SHA1ee77ea765923b91a8a2434b76b1a631c8a64951c
SHA2566635cb4db4db69fa34811d05891414991737fa439e9f92d16ff7a75a12558b23
SHA512a99a63bf35cbcd0ca947ea223282ca4fcfb295b4a2e6b7f3a8afef4b32b196a5b593dd8073443307215bad0934075d3afff8d3496da12b63b4ee8afdfe44dda9
-
Filesize
57KB
MD55c51141aabd9883165118bd6e2096a7d
SHA1e753dc7fc9ded6241eacd9b54f82ceeaed9423e6
SHA2566fbdaf9c44527d844280c051a6ca2d8b32b709ee2e1b49b096a6c56bbd55571e
SHA5124f7f8fb69943d82385398b358ecb168385d5bd586927f4428c0fd7233734dfd2b6379e097cf2f5462dd6cd7ccd46acb1ae5b6a911947e373c922539f566e2a1d