Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe
Resource
win10v2004-20231215-en
General
-
Target
a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe
-
Size
7.1MB
-
MD5
976f6386a6c31fad6a4e2996306bbf3d
-
SHA1
82018f85cab8337f8fe294a3864bada0cc5d845e
-
SHA256
a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4
-
SHA512
c72cf4eb4fab0e9e3cae2fbe5f39a4aa1b9b031b982f6e98453bcfcf72303a045269244f73966023eb4415038a726d2507d9f594d24919fb294e700199ff83f9
-
SSDEEP
196608:SqVSV1KkmYUVB9daURUyUlYS1yaxK8gb2ZcsS:SXV1r4DOYS1yaE89ZcsS
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.ldhy
-
offline_id
pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/1884-130-0x0000000003590000-0x00000000036BC000-memory.dmp family_fabookie behavioral2/memory/1884-249-0x0000000003590000-0x00000000036BC000-memory.dmp family_fabookie -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/1264-490-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1264-494-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1264-492-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1264-506-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4808-514-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4808-516-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4808-513-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/1852-54-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-48-0x0000000002E10000-0x00000000036FB000-memory.dmp family_glupteba behavioral2/memory/1852-159-0x0000000002E10000-0x00000000036FB000-memory.dmp family_glupteba behavioral2/memory/4384-419-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4768-456-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4768-488-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4768-523-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 392 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation CFA5.exe -
Executes dropped EXE 17 IoCs
pid Process 4352 InstallSetup9.exe 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1884 rty25.exe 3100 BroomSetup.exe 2232 toolspub1.exe 4772 nsw5650.tmp 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4768 csrss.exe 1680 injector.exe 4376 B640.exe 8 windefender.exe 4872 windefender.exe 5048 CFA5.exe 1264 CFA5.exe 1096 CFA5.exe 4808 CFA5.exe 4316 D2C.exe -
Loads dropped DLL 5 IoCs
pid Process 4352 InstallSetup9.exe 4352 InstallSetup9.exe 4772 nsw5650.tmp 4772 nsw5650.tmp 4352 InstallSetup9.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2932 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000b00000002324e-469.dat upx behavioral2/files/0x000b00000002324e-471.dat upx behavioral2/memory/8-473-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000b00000002324e-468.dat upx behavioral2/memory/4872-520-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\79cd1284-1605-4d1d-8dba-2aefd921e9af\\CFA5.exe\" --AutoStart" CFA5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 api.2ip.ua 58 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5048 set thread context of 1264 5048 CFA5.exe 226 PID 1096 set thread context of 4808 1096 CFA5.exe 232 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 47 IoCs
pid pid_target Process procid_target 4804 1852 WerFault.exe 92 3812 1852 WerFault.exe 92 3720 1852 WerFault.exe 92 2600 1852 WerFault.exe 92 2160 1852 WerFault.exe 92 808 1852 WerFault.exe 92 1448 1852 WerFault.exe 92 3036 1852 WerFault.exe 92 3760 1852 WerFault.exe 92 912 1852 WerFault.exe 92 1104 1852 WerFault.exe 92 4576 1852 WerFault.exe 92 4160 1852 WerFault.exe 92 3592 1852 WerFault.exe 92 3500 1852 WerFault.exe 92 4884 1852 WerFault.exe 92 756 1852 WerFault.exe 92 2988 1852 WerFault.exe 92 4044 1852 WerFault.exe 92 1768 4384 WerFault.exe 143 3804 4384 WerFault.exe 143 1004 4384 WerFault.exe 143 2220 4384 WerFault.exe 143 1364 4384 WerFault.exe 143 4500 4384 WerFault.exe 143 1616 4384 WerFault.exe 143 4808 4384 WerFault.exe 143 224 4384 WerFault.exe 143 5044 4768 WerFault.exe 173 4072 4768 WerFault.exe 173 1928 4768 WerFault.exe 173 1364 4768 WerFault.exe 173 1732 4768 WerFault.exe 173 2160 4768 WerFault.exe 173 628 4768 WerFault.exe 173 4992 4768 WerFault.exe 173 4788 4768 WerFault.exe 173 3812 4768 WerFault.exe 173 392 4768 WerFault.exe 173 1644 4768 WerFault.exe 173 4500 4768 WerFault.exe 173 4324 4772 WerFault.exe 137 2188 4768 WerFault.exe 173 4460 4808 WerFault.exe 162 1308 4316 WerFault.exe 233 1616 4768 WerFault.exe 173 996 4768 WerFault.exe 173 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B640.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B640.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B640.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsw5650.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsw5650.tmp -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 208 schtasks.exe 3436 schtasks.exe 3860 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 toolspub1.exe 2232 toolspub1.exe 2708 powershell.exe 2708 powershell.exe 2708 powershell.exe 4772 nsw5650.tmp 4772 nsw5650.tmp 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 4124 powershell.exe 4124 powershell.exe 3540 Process not Found 3540 Process not Found 4124 powershell.exe 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3540 Process not Found 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2232 toolspub1.exe 4376 B640.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4124 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1732 WerFault.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4368 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1032 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 2112 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1932 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3100 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4352 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 86 PID 2168 wrote to memory of 4352 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 86 PID 2168 wrote to memory of 4352 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 86 PID 2168 wrote to memory of 1852 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 92 PID 2168 wrote to memory of 1852 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 92 PID 2168 wrote to memory of 1852 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 92 PID 2168 wrote to memory of 1884 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 90 PID 2168 wrote to memory of 1884 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 90 PID 4352 wrote to memory of 3100 4352 InstallSetup9.exe 87 PID 4352 wrote to memory of 3100 4352 InstallSetup9.exe 87 PID 4352 wrote to memory of 3100 4352 InstallSetup9.exe 87 PID 2168 wrote to memory of 2232 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 89 PID 2168 wrote to memory of 2232 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 89 PID 2168 wrote to memory of 2232 2168 a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe 89 PID 4352 wrote to memory of 4772 4352 InstallSetup9.exe 137 PID 4352 wrote to memory of 4772 4352 InstallSetup9.exe 137 PID 4352 wrote to memory of 4772 4352 InstallSetup9.exe 137 PID 3100 wrote to memory of 3776 3100 BroomSetup.exe 116 PID 3100 wrote to memory of 3776 3100 BroomSetup.exe 116 PID 3100 wrote to memory of 3776 3100 BroomSetup.exe 116 PID 3776 wrote to memory of 3548 3776 cmd.exe 198 PID 3776 wrote to memory of 3548 3776 cmd.exe 198 PID 3776 wrote to memory of 3548 3776 cmd.exe 198 PID 3776 wrote to memory of 208 3776 cmd.exe 121 PID 3776 wrote to memory of 208 3776 cmd.exe 121 PID 3776 wrote to memory of 208 3776 cmd.exe 121 PID 1852 wrote to memory of 2708 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe 131 PID 1852 wrote to memory of 2708 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe 131 PID 1852 wrote to memory of 2708 1852 d21cbe21e38b385a41a68c5e6dd32f4c.exe 131 PID 4384 wrote to memory of 4124 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 161 PID 4384 wrote to memory of 4124 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 161 PID 4384 wrote to memory of 4124 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 161 PID 4384 wrote to memory of 3504 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 168 PID 4384 wrote to memory of 3504 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 168 PID 3504 wrote to memory of 392 3504 cmd.exe 197 PID 3504 wrote to memory of 392 3504 cmd.exe 197 PID 4384 wrote to memory of 1732 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 180 PID 4384 wrote to memory of 1732 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 180 PID 4384 wrote to memory of 1732 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 180 PID 4384 wrote to memory of 4368 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 172 PID 4384 wrote to memory of 4368 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 172 PID 4384 wrote to memory of 4368 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 172 PID 4384 wrote to memory of 4768 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 173 PID 4384 wrote to memory of 4768 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 173 PID 4384 wrote to memory of 4768 4384 d21cbe21e38b385a41a68c5e6dd32f4c.exe 173 PID 4768 wrote to memory of 1032 4768 csrss.exe 182 PID 4768 wrote to memory of 1032 4768 csrss.exe 182 PID 4768 wrote to memory of 1032 4768 csrss.exe 182 PID 4768 wrote to memory of 2112 4768 csrss.exe 199 PID 4768 wrote to memory of 2112 4768 csrss.exe 199 PID 4768 wrote to memory of 2112 4768 csrss.exe 199 PID 4768 wrote to memory of 1932 4768 csrss.exe 205 PID 4768 wrote to memory of 1932 4768 csrss.exe 205 PID 4768 wrote to memory of 1932 4768 csrss.exe 205 PID 4768 wrote to memory of 1680 4768 csrss.exe 211 PID 4768 wrote to memory of 1680 4768 csrss.exe 211 PID 3540 wrote to memory of 4376 3540 Process not Found 218 PID 3540 wrote to memory of 4376 3540 Process not Found 218 PID 3540 wrote to memory of 4376 3540 Process not Found 218 PID 8 wrote to memory of 3336 8 windefender.exe 222 PID 8 wrote to memory of 3336 8 windefender.exe 222 PID 8 wrote to memory of 3336 8 windefender.exe 222 PID 3336 wrote to memory of 4796 3336 cmd.exe 221 PID 3336 wrote to memory of 4796 3336 cmd.exe 221 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe"C:\Users\Admin\AppData\Local\Temp\a2e56b293874962f8ccf1fc3d1a6f96b01222f470a6891d7cad95b70bc3e99c4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:208
-
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:3548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsw5650.tmpC:\Users\Admin\AppData\Local\Temp\nsw5650.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 19644⤵
- Program crash
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 3723⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 3883⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 4003⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 6723⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7163⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7163⤵
- Program crash
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7723⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7483⤵
- Program crash
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 8123⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 8723⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 8803⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 9003⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 9283⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 9243⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 6163⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7803⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 8763⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7123⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7883⤵
- Program crash
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 3444⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 6884⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 6884⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 6884⤵
- Program crash
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 7284⤵
- Program crash
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 7444⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 5844⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 3444⤵
- Program crash
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 5685⤵
- Program crash
PID:4460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 3404⤵
- Program crash
PID:224
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 4125⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 6805⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7445⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7365⤵
- Program crash
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7765⤵
- Drops file in System32 directory
- Program crash
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7445⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7205⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 3965⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 3805⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8845⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8645⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 9565⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 6285⤵
- Program crash
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10085⤵
- Program crash
PID:2188
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3860
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 11125⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 4605⤵
- Program crash
PID:996
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1852 -ip 18521⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1852 -ip 18521⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1852 -ip 18521⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1852 -ip 18521⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1852 -ip 18521⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1852 -ip 18521⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1852 -ip 18521⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1852 -ip 18521⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1852 -ip 18521⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1852 -ip 18521⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1852 -ip 18521⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1852 -ip 18521⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1852 -ip 18521⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1852 -ip 18521⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1852 -ip 18521⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1852 -ip 18521⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1852 -ip 18521⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1852 -ip 18521⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1852 -ip 18521⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4384 -ip 43841⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4384 -ip 43841⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4384 -ip 43841⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4384 -ip 43841⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4384 -ip 43841⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4384 -ip 43841⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4384 -ip 43841⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4384 -ip 43841⤵PID:2988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4384 -ip 43841⤵PID:1612
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4768 -ip 47681⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4768 -ip 47681⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4768 -ip 47681⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4768 -ip 47681⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4768 -ip 47681⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4768 -ip 47681⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4768 -ip 47681⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4768 -ip 47681⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4768 -ip 47681⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4768 -ip 47681⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4768 -ip 47681⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4768 -ip 47681⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4768 -ip 47681⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4772 -ip 47721⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4768 -ip 47681⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\B640.exeC:\Users\Admin\AppData\Local\Temp\B640.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4376
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4872
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:4796
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Suspicious use of WriteProcessMemory
PID:3336
-
C:\Users\Admin\AppData\Local\Temp\CFA5.exeC:\Users\Admin\AppData\Local\Temp\CFA5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\CFA5.exeC:\Users\Admin\AppData\Local\Temp\CFA5.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\CFA5.exe"C:\Users\Admin\AppData\Local\Temp\CFA5.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\CFA5.exe"C:\Users\Admin\AppData\Local\Temp\CFA5.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:4808
-
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\79cd1284-1605-4d1d-8dba-2aefd921e9af" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4808 -ip 48081⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\D2C.exeC:\Users\Admin\AppData\Local\Temp\D2C.exe1⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 11322⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4316 -ip 43161⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4768 -ip 47681⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 4768 -ip 47681⤵PID:1500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
163KB
MD59d8205a3d4ca667f8b507e10ea68325b
SHA106b40f72af38393999c8ca71c21da05b5a554fc0
SHA256ee495f62e615b852b64b3e9bbfca990ef33efe519808323fc4708556285c917c
SHA512d7da588b0ad5f73b09adfbe23b64a6771c1327d471031cffa04816d63c588fe76934d6829566e090eddfd0e5b082911ff5a9de398115b3f368444bff233b75cf
-
Filesize
68KB
MD554c45bdddf3879e76f9c7e6b10198332
SHA1bf1142c3119e519995ee70c63d43ae1ece96a338
SHA2567d87dcbbcc02b4f75ee2379b85b819966a32ed925ab6d73e773c70ee4377cb25
SHA512dfd90fc424052e87755ac38b54f14feca0d368b7f4ef16de2b0681d9dff5e311e24d229e132c8f9cd325c2bc4ae81fabbd04bd46aa6c3802ab6121eae340c99a
-
Filesize
70KB
MD567918d197ea6af35c899500369cd0356
SHA14caeb00c8c6596cf11b36c56d2dedc1c668a80c9
SHA256d5ac8cbd349830320ab0fbf215ebee489da83fb8bcccb6b274c8ffc55d63e78d
SHA51277bbe7670d5114a963988703558e3cab0c277eeb52152db13f25729460403bbf18c310f41b2060e91e84784e5eafc216a2deca09157a8db36a0518275cc294c3
-
Filesize
71KB
MD518e234a15698362cb18904489770a9c9
SHA136d806d92fe7e803c72d1193f4666d32c2593126
SHA25686dd27126481f3d3de7671223b8071af11793e569b3b36d337bc92883cfdd00d
SHA5122d1ece4049bf53101272f4becb7ac71f86192fc8dc2aadb777c3cfa188bc0c69871474867865f0d0bd9e50c99ffdf8081f7fd55414ff37c2e82f406d4c424178
-
Filesize
111KB
MD5432e37340c56196d23d2efa6f2d6e36d
SHA14976346cc13e602eee040afc9dabfc105326ee76
SHA2562cc2cb01b09e0e33daaf5990aeb3c80dc930fb26d5f13077d8fb9738ad5844d0
SHA512e9c50576a67d3ef24e592ca55ac7545c9bcdbf8428ddc82736c0ac4468317825909d75e4ce0769e76796d3c1432c6b968dc302a9c1455e9cf79fc3fad25344a1
-
Filesize
112KB
MD5d61ba3a80a8fc5837259718c840796d7
SHA16901c0aa4491b993ee294619e08fc2fa619a8315
SHA2567712af2e2d832665720dbbf35bfeac636920bb83789019cd07fc64d13c4d60b5
SHA512b8a5eec69026849831387e938ed97d2bebe76abab66112d33f579ac389842d52c38d7c2cfc8a50c4e8aead37a38418841a2e0b3dfd8b020bc417bed9e3d410a5
-
Filesize
233KB
MD5167c0b8771d33c4337e2fd96fd5c7e90
SHA14cc55d8a47513c0c4ba26320faeaaddb5abb7d84
SHA25603a8c2a6f33a9dfe3f019db9a20e645cfb34b1c9f09b32724f46e1705cffb816
SHA512e4918ce9226b989144289c91d3d59582b20a6e2fd1678e3d64de5fdf4f6d59428f923a391cbef884b2c46673d606d6fc2fca186944c9c006010a413cfa04af81
-
Filesize
179KB
MD502fbcded2618a0f9be3b72416ebd07cf
SHA1b58f8e5e7cf59fd0094dc87649ea1339d2e4763f
SHA256f5debde23edf9aeee5764f1bb81e4483ce86540cb4a0be343d865372dd3c4b85
SHA5124f133d5f2b8a7bf02440c6481ef69395a67a5731d953918ab67712a7d025c926254dd976c8e005ddb09f8436aef997ee8699056a74cfea1ea271b1b6fa710f1a
-
Filesize
177KB
MD555619fcd89e943daf67abbfa7a0b1fc8
SHA16e0ad99cea8aeaa1d1f4006a1dd93653b1c588b5
SHA2560db4c3688b07d7ac9525c05db8d3a8bf6df7b61148a51a287b284f5db302f962
SHA512263c868ea931631869df2fe6cd9ab0113b9b0e130b8f1ed96f0bfa496b71a94765000d438ea3ec74d4f4c9ec7b6e7db7754569b009a846a32e389060a8703367
-
Filesize
69KB
MD5b9dc60af5a71bbb848c736cbdb901927
SHA14810e6521c565fed211c7c92ed6810604f2d38ce
SHA256d0f661cab4c933dba1ab597a6441bc991598cbe0f23b651c5791f19a58751cf0
SHA512f26a12700e70659736ef1e26b296cf49dca768c9b01c7b165b1e171a3dac4a058350d1ebdd2ae158dc8af2199a3f407e0e310dd0af1b935d2c683d29acaf4606
-
Filesize
30KB
MD5c1cfe6cc9089e72cae106d2335c40db3
SHA102e5a3268d78cfa5fe15c4e1bd584bf00db50446
SHA256c12f0b78e7457bca531af10e98859d03c3e3980b141fcc03c5036ff0f2f05fd1
SHA512f32770f5a45de3dd297882b31dd4bd47c025bb87608804b9a3643830c3ccb6cff73f6600ddcc4e6ba5d9a33275fac24e202ee4fe616d5883cc2e0f187b69e044
-
Filesize
201KB
MD5fa77a4fce96f48cd110a4f045f68e7d5
SHA13ecdb87807a323b30970e0d48bc5b47c97c21b80
SHA256330f22c7fb7ca10f4a75e164a9e8367cfaaf0e90bc703d5e60a3fa5388a54893
SHA512aadf8c51039f3edd174e3a8a157453fdbc0309bf8fd83cf21beb0d2f0951e9470df632be3b9d99b7010b6a2800d59311afa5771d009c9c3f628f29c6fb906577
-
Filesize
189KB
MD589ec655022c726ee757afea118754098
SHA12d588d531f468c3aee2f38da20ef8fc48d06d17f
SHA25694f4c398b90af4a5947fc13b4868358641977b5ca79e3da14a90b2dadd137b95
SHA512efa345c380b86347888acb743048b5f591d265540e499bf62a9d57329ce529f9ce4acffda0ec9612e9c80d1db454bad79e0810159d6f1a5e6b9ff85edf5992bc
-
Filesize
153KB
MD544b1ffa59e0436183bbdc1b4e946c50d
SHA1a352c78f94be9bb6d5454261c39d6e8f3b2a27c8
SHA25663939950f5632a7c86393df87b25b438ca16bbe719a644c88f7971b3c55fb2be
SHA512fecc0137cd9377172f615384689cd7efbfafb163f203e9d822d7bcd99c4c397a3894e340661d167c1205cf25e4a60762889c053eb0e0321f1c3d4fee83b297bf
-
Filesize
1.0MB
MD5810b89f4d9daf6b9e429b3f5ee48c819
SHA1f548880feeb8d64ea7f8415f694b0731097b3243
SHA2569beaa38e4635f25a1c6f9722e3889e00f359d8f4b2e1163f4b38246086f280d5
SHA512502c56776b935b187b82842da289fd3f47cb3feb949df2b14dcb2b8f5dbc2b0a637d6579ff999a6b3a3eb5163c226d472daac2b9bccae06e878e597a867f4851
-
Filesize
944KB
MD59d71bec37acdcae2ccce788a791b72d3
SHA135f7329ad66f75ce92cac74fe2da12bf4200d8c0
SHA2562a37de144bd26db2e53f4d2031fbb0b592cff124f72af84369502e45a3810911
SHA512ec473139065d5f9591d7f661d246a43ecf50f3018f19a90f68c628ccfa01fd43ad91730baae7e0f93740e6408cdf6ad15a7a7540b9318fcac1fa14a8850bc702
-
Filesize
560KB
MD5b5b8bcc9ef1cc12437f892d0fd8055ba
SHA186b48b49543279760131f284b130a86a689ceb61
SHA256586eb2fde05d7d102d09b0aa0c0fac0fe949d1fc822543a6c78543fdfd53c8d6
SHA512410f731603f893ea6af337b7ea2b593369635928db78ccb6de9225495e79eac684c4b4dc467688ce3c035dda1d95f9e370d444b24449e81f9709cea367522cd6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
65KB
MD5e6b4726324db4f7864b55759b23ec6b1
SHA165f4ffb86e5dddc1579e3abb1630e4c406f0cd28
SHA25634700cfe1bbb7abf612e847d19363bf09c3e257563e5a8f68ec5ba5308b9ddd1
SHA512b7d9c4c733b382c7b96824c23365713546cffbd38156f742d347306c0a8dbebe57017354252b2b18f912234d8582dec35ef9286006a6b9a16b37313b6f2eea83
-
Filesize
96KB
MD53482904ebe845dba37b4bf8b6e85692a
SHA12d78ca5d8d48a7469726a0a53405902b22207f90
SHA256a8bddcf957293914806cc047f289a8a07a8e73dc82bb0e50144755fcc2195608
SHA5126760d399a7a4016773e43d19cdedddcbe972e910dddf98f2b8a4fdb15d9ed98c042d4c7b83941f5423a884cfce5c2ef77b0ac134fd312b19681a087441879c66
-
Filesize
387KB
MD5da49d75126af95db7bc682762e4c7d08
SHA12107e52d780bf2fc2d8dd19246effef9b27c2410
SHA256a503498b9b86ebc59e5e6f2dc0456a6521530bccbef0b857b8427566f316190f
SHA5129005b6e36b88bf508857b664dec0a113f82dd36b8f00a037e0162c8776a68223c1e1b0939c56886b39e705196c9cfb02310c2f7ff4499f9463cf8934eb1e59fb
-
Filesize
127KB
MD52307d18753b636ad03395b4f754384a4
SHA17a9654787eec2e811870208127c02a05aef18360
SHA25609d4ccac54e384f0efce2db35b719ad7dd0992b0401be225eabb148cb10f11fb
SHA512923cc1f6eb76019149b2d1e63d2fd5c9a510b21937fa0d5961cf8c2c2e672c02f7b9c40c21d16f1ebc5298452e387baab51894747f33ba780f5418cd6ab4abe3
-
Filesize
800KB
MD5e4d0916a79a8a7feb869d745f26f218d
SHA1e7ed09935495fafed2572c8d01c404ea57b9a51d
SHA256beedf84232eb1f9b6d0109244d1f70a7f08f39668953405ada2a0f66add4ee04
SHA5125cd2c3ef84d295cdb6f7877870c96136a7fdc830c047efbfd0b026831cb3d6d912481302ad539659c1f4993d5e1731133acb8fb4fa7dfea56297acfbd4faef7d
-
Filesize
768KB
MD56259e549fd083e10da04d87a17c6cee5
SHA1d8d86cea5b20aed90a69adcc40bdba172c718287
SHA2569ded70eb7f23c7aea8b608c722d0cacc556ac41805ca6905892e6521d479f5ec
SHA512d0fa8bb116a8858b994cf2eab6ccca1f86a894de94d1c5863106fabb3a6be04441cf53f988e36fa1c4b6a8a24e2717bb47aa4fd42adbc2475ec46cbcf912c0f1
-
Filesize
307KB
MD5689278a1d1243ac5aa47715ad2e89c8f
SHA1d3552fbf0cd683135d7b6405c9e62af3c14b06c7
SHA25690b8b9f8527548c095fe5a40df3ace331b7a26540d2d80ea19688626f0420cf2
SHA51260021f67ead3f02bf01d643a9ed1f926ed564de8b5dd749dce5bc93699b07414e800e36911fbda3e0bcc83ae068543981f61ea3a3f598fbf6e21185f5c4fe576
-
Filesize
256KB
MD5af6b4a4e25789042a63fb1de438170a1
SHA1302bb0f3dd6f484a02bba582a6ea0654d6b262dd
SHA256753ea711a15fb0195b1387c60c9b98d2cdd139ad4a341f34a9fef6006dc9d096
SHA5125ad385e63d5c8b9407438186d3f873618badf071a91717487b8506612af8cd1e6b7c0f6d6890d3719a693844e866c840b232483078de29b360431ccd82a01830
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
715KB
MD58dc1f88ae1fcedeb3983c5f5c3d486b0
SHA1d40e67ba5558d90cb11eeca04d213322159336fc
SHA2564a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca
SHA5120b2263fe049e280af1178fd396a06a04e6b99f7c971839207ae225161257ed9d9b7eaa8d0ceb1f14d3aa2094b53ce91dd045ebc169102e707ea7285f91432ac1
-
Filesize
587KB
MD555050d8fcbca42bc1a7d15024d71ef4c
SHA1a6bf2fbfc225bd35aa8b613457645a01a7c12b5b
SHA2568b2dca992d028f6b461bcfc8e69de8f1092b5c430ee4192d6a5359fdcd3da760
SHA5125246e8258fa7746102135448ccc5edada9f76358230300ee54562c5cbd9a2c8cbbf978420d0771c8390199d5ffb4d653e8f97a0c4c8d94910caf9706b19a3605
-
Filesize
450KB
MD5c731b5f8216211a23b3343292f575907
SHA18bd3b587942c7d40fd09594ad289bcf85a603289
SHA256fd98fac70b4d34e92c8379c533f7aa527e2a5d60ea4cb445b47f9520b72c54fd
SHA5125ba5376614668759430944d5147c0a7a585142f45414401929f340191f72775246cdf22a8b45fd72cec25285dba3c75cb5083f326e52b21db7735d4ff58f6bc1
-
Filesize
238KB
MD58c20d9745afb54a1b59131314c15d61c
SHA11975f997e2db1e487c1caf570263a6a3ba135958
SHA256a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
SHA512580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a758823ce9f9b2273a7dbb7a4b9d8fe7
SHA1a5f91af7206a1a35a429353fc85b0b10dd5234ec
SHA256c351f0572db7fa74ec6b28ac0a87c70437ddac0188d291bad829542faf4e8abb
SHA512153bedf1b0096a79cdba98fe9016c740864df727d6307007f858ce468edbbc936fc31c5d6ee62c6b1a72aabf5202a18c78b92fd6f3a5c044da4f1a65fe628683
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cb434a9bcc9b0812af66bc4a238531b6
SHA1870f2d1c52c4074efde3c1357400f5433161f019
SHA2564bfcff9aa58600698728c30e10f59f78e5e2f7698c76cdb5d3e551ed73354aac
SHA51270bf2ba42292d5dc0ae4b9f535d1561fa9c945a2ec739f40473cca30170233f1930ec2c628fa869c2801884e73069479bd991a150a9334057cd97fa184b8a35f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a4e3edbe38bf26c2e756e0242c70c469
SHA1a09bd0d6a108a55cb6439f80f891a5b3d95e93de
SHA2562b93d27f11287e4dc286e84ca522838e3e1b4586e23a62d5797f299edf9139ca
SHA51216001a922e3ff4bac093307ac9f63ebb7f249303406f7aaa59177718b0f606bc30876d2b0a09ec749d0375f69cc387f0453f108485f809d28865b0250293e401
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59991b0cb38fe3c54502e2afd00341eb5
SHA18de5a14d0da3057b762c0b02dec238037629fa2b
SHA256b57b74b10366ed7d4f58aea06423c45c0e960fa9e2f83801121bd5ba916151bf
SHA5123a20c67a45a1fc219c363a13fa8d3f98101737aa3c31e37198eaef31ad361e12fe8772ff038fc974c359389b38f71ee1dbb821100c54635f27c74bbcaccadd2c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5610d5ab5971c1d098545191602be8e98
SHA16b190ee1b6f198bca3e8603dcb664854403119ac
SHA2569ed1f361512520ed6f4a7887f68f795e651893894d574b0296c84b7f0f1cf541
SHA512a79932729c1d4246bacbb106b1f5479ee283cb98fba5f0bfbe09100def07b36a5abf94850f23eb4ba21a524e7650e953433afbbc8b65cd01c585bc12b7a8865f
-
Filesize
238KB
MD5021f4743412bce46292069c990622c89
SHA184eb6bbbb405ca7df5e593fe58fcb074b59a3862
SHA256cd29be4416616e65758584625960df229087af6763eb101a4cd540bf5080ea35
SHA512f9df789332cbfb702658026f867cd20ebf30721d768cfecdcfe8b813ef13107822ea9ab1ff223f9e783248c9a15012928e557fad86cbec5acaabe0cc5ba597b4
-
Filesize
153KB
MD57965e0f5359a85f617ddb5b75b35e837
SHA10e38af02604657e37c487eeb79fba2525eb8e630
SHA256407483e0d24bd62028b4233e17fe77894ab68d2608f641adc12b9c0b34d293a7
SHA5123c4a3dcd4a7ff4bbd273b6264ac89e57a6339cfda1e2a9ba41d3f12e668cc798c8ac9560537c59e11c692c3095bb52f0cb8a8904f8956248d2a8669fea3091fd
-
Filesize
420KB
MD5b18aec093601095d75b4a6875c9fa4fe
SHA1e301038d4e207249a64a2159cdf79e22c9cfeb81
SHA2567c5a68e4f633b934e0efc8745920929871a7563bacfd0e52215bff9893e94452
SHA5122738788e28007b76be8f3894ee12d0d865887abb5eb0322014c3053108728a72b3a32f56f6b694050208ea01c5a3d36a4b0350086211d26dc6722c01095c6960
-
Filesize
26KB
MD5878cc5a898306e774cd936e33b711217
SHA1bdd6266896436ea742b91190d50acc9e2ab59067
SHA2562b9ee53f9a026f4f18eabd280245e24a5f165444b3fba52a8b668ea3b647705f
SHA512dd2d31929427544b2b9348cc2400c383644d431138ee09af5553cc96eca6cc9ad8ea3776b7c555963b13ed7eb566d476e9624e79e712931da2e81f871e2b5ccc