Analysis
-
max time kernel
125s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp.exe
-
Size
7.1MB
-
MD5
9a82e4f9ba1881fa411b6473d792f1a3
-
SHA1
24c48768340c61376d3d5ef99091b456ad1f89fb
-
SHA256
d823740cca44676c9fa128c25ca53cc16fbf8a1ad23c10d08f997e9e3fcd6655
-
SHA512
a0819af9c420b188c9f326459ffd23f10d3d038dae0b48a98df34f1ad87d0d08323e184c3cda41ab794b8857f4a3f2c2f1b8c2f42dbc88f375ad87feccba17ec
-
SSDEEP
98304:biPxK2EIDpN+bKXY/TMTRQOEThYBCvSx/Q1t1rakS9f4X/3mTiVRn:Sx3rQDTj9SCvl4F4uTiVRn
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.lkhy
-
offline_id
OxV6DGl22io8sqMOW1zCCOlzPiv4f1Vqzw7Y8zt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-uNdL2KHHdy Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0851ASdw
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4812 schtasks.exe 3764 schtasks.exe 388 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3084-91-0x0000000003A90000-0x0000000003BBC000-memory.dmp family_fabookie behavioral2/memory/3084-253-0x0000000003A90000-0x0000000003BBC000-memory.dmp family_fabookie -
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/files/0x000e00000001d8b6-607.dat family_zgrat_v1 behavioral2/files/0x000e00000001d8b6-608.dat family_zgrat_v1 behavioral2/files/0x000d000000023240-946.dat family_zgrat_v1 -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/988-494-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/988-496-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/988-498-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/988-510-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4476-517-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4476-518-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4476-520-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/1660-55-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1660-57-0x0000000002D80000-0x000000000366B000-memory.dmp family_glupteba behavioral2/memory/1660-165-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2208-225-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1660-305-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2208-344-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2268-464-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2268-479-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2268-484-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2268-497-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0002000000022cd7-832.dat family_redline behavioral2/files/0x000900000002324a-1012.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ filename.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ E243.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts filename.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1592 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E243.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E243.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion filename.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 48AD.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe RegAsm.exe -
Executes dropped EXE 24 IoCs
pid Process 5024 InstallSetup8.exe 2808 toolspub1.exe 1660 31839b57a4f11171d6abc8bbc4451ee4.exe 1756 BroomSetup.exe 3084 rty25.exe 2916 nsh58FF.tmp 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 2268 csrss.exe 60 C813.exe 1484 injector.exe 332 windefender.exe 4868 windefender.exe 1220 48AD.exe 988 48AD.exe 3556 48AD.exe 4476 48AD.exe 1240 5C75.exe 1892 filename.exe 2972 CB6D.exe 3820 DA05.exe 3576 qemu-ga.exe 3000 E243.exe 2032 updater.exe 3476 explorgu.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine E243.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine explorgu.exe -
Loads dropped DLL 6 IoCs
pid Process 5024 InstallSetup8.exe 5024 InstallSetup8.exe 5024 InstallSetup8.exe 2916 nsh58FF.tmp 2916 nsh58FF.tmp 5024 InstallSetup8.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 468 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000b000000000741-558.dat themida behavioral2/files/0x000b000000000741-563.dat themida behavioral2/files/0x000b000000000741-564.dat themida -
resource yara_rule behavioral2/files/0x000b000000023230-473.dat upx behavioral2/files/0x000b000000023230-475.dat upx behavioral2/memory/332-478-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4868-483-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4868-530-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\f59b6df2-e75d-4e84-a2d0-a7e95b773a83\\48AD.exe\" --AutoStart" 48AD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA filename.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 103 api.2ip.ua 105 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\MRT.exe filename.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1892 filename.exe 3000 E243.exe 2032 updater.exe 3476 explorgu.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1220 set thread context of 988 1220 48AD.exe 233 PID 3556 set thread context of 4476 3556 48AD.exe 237 PID 1240 set thread context of 1644 1240 5C75.exe 241 PID 2972 set thread context of 1612 2972 CB6D.exe 252 PID 2032 set thread context of 5116 2032 updater.exe 311 PID 2032 set thread context of 1948 2032 updater.exe 312 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job E243.exe -
Launches sc.exe 17 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 216 sc.exe 4904 sc.exe 2588 sc.exe 464 sc.exe 2996 sc.exe 2772 sc.exe 2708 sc.exe 3548 sc.exe 1644 sc.exe 3304 sc.exe 4912 sc.exe 3424 sc.exe 4508 sc.exe 540 sc.exe 3488 sc.exe 1680 sc.exe 2612 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3108 1660 WerFault.exe 89 1764 1660 WerFault.exe 89 1936 1660 WerFault.exe 89 4480 1660 WerFault.exe 89 3440 1660 WerFault.exe 89 3088 1660 WerFault.exe 89 4648 1660 WerFault.exe 89 8 1660 WerFault.exe 89 3296 1660 WerFault.exe 89 3620 1660 WerFault.exe 89 436 1660 WerFault.exe 89 2360 1660 WerFault.exe 89 1448 1660 WerFault.exe 89 2016 1660 WerFault.exe 89 2280 1660 WerFault.exe 89 3500 1660 WerFault.exe 89 5016 1660 WerFault.exe 89 940 1660 WerFault.exe 89 548 1660 WerFault.exe 89 3788 2208 WerFault.exe 142 2808 2208 WerFault.exe 142 4796 2208 WerFault.exe 142 2360 2208 WerFault.exe 142 3576 2208 WerFault.exe 142 2016 2208 WerFault.exe 142 2280 2208 WerFault.exe 142 2828 2208 WerFault.exe 142 636 2208 WerFault.exe 142 3580 2916 WerFault.exe 112 4788 2208 WerFault.exe 142 3708 2268 WerFault.exe 176 4156 2268 WerFault.exe 176 4140 2268 WerFault.exe 176 4100 2268 WerFault.exe 176 5060 2268 WerFault.exe 176 4664 2268 WerFault.exe 176 4960 2268 WerFault.exe 176 1948 2268 WerFault.exe 176 4476 2268 WerFault.exe 176 2548 2268 WerFault.exe 176 4692 2268 WerFault.exe 176 4476 2268 WerFault.exe 176 2708 2268 WerFault.exe 176 2312 2268 WerFault.exe 176 2116 2268 WerFault.exe 176 4736 2268 WerFault.exe 176 2372 2268 WerFault.exe 176 2860 4476 WerFault.exe 237 2692 2268 WerFault.exe 176 3272 2268 WerFault.exe 176 4452 4996 WerFault.exe 315 2256 3424 WerFault.exe 318 988 2948 WerFault.exe 317 5064 2948 WerFault.exe 317 4740 2948 WerFault.exe 317 1392 2948 WerFault.exe 317 3720 2948 WerFault.exe 317 2596 3820 WerFault.exe 253 4232 2948 WerFault.exe 317 1148 2948 WerFault.exe 317 864 2268 WerFault.exe 176 3224 2948 WerFault.exe 317 2964 216 WerFault.exe 339 3492 216 WerFault.exe 339 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C813.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C813.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C813.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsh58FF.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsh58FF.tmp -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4812 schtasks.exe 3764 schtasks.exe 388 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 toolspub1.exe 2808 toolspub1.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 2916 nsh58FF.tmp 2916 nsh58FF.tmp 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 4268 powershell.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 4268 powershell.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2808 toolspub1.exe 60 C813.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 4268 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 1660 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 1660 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 2224 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 4648 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1756 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 5024 4124 tmp.exe 85 PID 4124 wrote to memory of 5024 4124 tmp.exe 85 PID 4124 wrote to memory of 5024 4124 tmp.exe 85 PID 4124 wrote to memory of 2808 4124 tmp.exe 86 PID 4124 wrote to memory of 2808 4124 tmp.exe 86 PID 4124 wrote to memory of 2808 4124 tmp.exe 86 PID 4124 wrote to memory of 1660 4124 tmp.exe 89 PID 4124 wrote to memory of 1660 4124 tmp.exe 89 PID 4124 wrote to memory of 1660 4124 tmp.exe 89 PID 5024 wrote to memory of 1756 5024 InstallSetup8.exe 87 PID 5024 wrote to memory of 1756 5024 InstallSetup8.exe 87 PID 5024 wrote to memory of 1756 5024 InstallSetup8.exe 87 PID 4124 wrote to memory of 3084 4124 tmp.exe 88 PID 4124 wrote to memory of 3084 4124 tmp.exe 88 PID 1756 wrote to memory of 388 1756 BroomSetup.exe 105 PID 1756 wrote to memory of 388 1756 BroomSetup.exe 105 PID 1756 wrote to memory of 388 1756 BroomSetup.exe 105 PID 388 wrote to memory of 5096 388 cmd.exe 109 PID 388 wrote to memory of 5096 388 cmd.exe 109 PID 388 wrote to memory of 5096 388 cmd.exe 109 PID 388 wrote to memory of 4812 388 cmd.exe 110 PID 388 wrote to memory of 4812 388 cmd.exe 110 PID 388 wrote to memory of 4812 388 cmd.exe 110 PID 5024 wrote to memory of 2916 5024 InstallSetup8.exe 112 PID 5024 wrote to memory of 2916 5024 InstallSetup8.exe 112 PID 5024 wrote to memory of 2916 5024 InstallSetup8.exe 112 PID 1660 wrote to memory of 4268 1660 31839b57a4f11171d6abc8bbc4451ee4.exe 135 PID 1660 wrote to memory of 4268 1660 31839b57a4f11171d6abc8bbc4451ee4.exe 135 PID 1660 wrote to memory of 4268 1660 31839b57a4f11171d6abc8bbc4451ee4.exe 135 PID 2208 wrote to memory of 2224 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 161 PID 2208 wrote to memory of 2224 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 161 PID 2208 wrote to memory of 2224 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 161 PID 2208 wrote to memory of 4128 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 165 PID 2208 wrote to memory of 4128 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 165 PID 4128 wrote to memory of 1592 4128 cmd.exe 167 PID 4128 wrote to memory of 1592 4128 cmd.exe 167 PID 2208 wrote to memory of 4648 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 169 PID 2208 wrote to memory of 4648 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 169 PID 2208 wrote to memory of 4648 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 169 PID 2208 wrote to memory of 2852 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 172 PID 2208 wrote to memory of 2852 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 172 PID 2208 wrote to memory of 2852 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 172 PID 2208 wrote to memory of 2268 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 176 PID 2208 wrote to memory of 2268 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 176 PID 2208 wrote to memory of 2268 2208 31839b57a4f11171d6abc8bbc4451ee4.exe 176 PID 2268 wrote to memory of 1556 2268 csrss.exe 195 PID 2268 wrote to memory of 1556 2268 csrss.exe 195 PID 2268 wrote to memory of 1556 2268 csrss.exe 195 PID 2268 wrote to memory of 4228 2268 csrss.exe 200 PID 2268 wrote to memory of 4228 2268 csrss.exe 200 PID 2268 wrote to memory of 4228 2268 csrss.exe 200 PID 2268 wrote to memory of 2492 2268 csrss.exe 208 PID 2268 wrote to memory of 2492 2268 csrss.exe 208 PID 2268 wrote to memory of 2492 2268 csrss.exe 208 PID 3532 wrote to memory of 60 3532 Process not Found 210 PID 3532 wrote to memory of 60 3532 Process not Found 210 PID 3532 wrote to memory of 60 3532 Process not Found 210 PID 2268 wrote to memory of 1484 2268 csrss.exe 215 PID 2268 wrote to memory of 1484 2268 csrss.exe 215 PID 332 wrote to memory of 2948 332 windefender.exe 229 PID 332 wrote to memory of 2948 332 windefender.exe 229 PID 332 wrote to memory of 2948 332 windefender.exe 229 PID 2948 wrote to memory of 216 2948 cmd.exe 230 PID 2948 wrote to memory of 216 2948 cmd.exe 230 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:5096
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:4812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsh58FF.tmpC:\Users\Admin\AppData\Local\Temp\nsh58FF.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 20364⤵
- Program crash
PID:3580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 3723⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 3883⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 3923⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 6683⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 6803⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 6803⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 6803⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7483⤵
- Program crash
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7643⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 8163⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 8763⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 8603⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7163⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7963⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7603⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 6923⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 8763⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7643⤵
- Program crash
PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 8723⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 3404⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 3644⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 3804⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 4084⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6964⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6964⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6964⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 7164⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 7484⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1592
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 7444⤵
- Program crash
PID:4788
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 3725⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 3885⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 4045⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 6205⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7245⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7245⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7485⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7565⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7765⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1556
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:3764
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2360
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7965⤵
- Program crash
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 9365⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10045⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10205⤵
- Program crash
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1484
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10005⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 9805⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 9645⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10925⤵
- Program crash
PID:2372
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:216
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 12085⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 12285⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 12205⤵
- Program crash
PID:864
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1660 -ip 16601⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1660 -ip 16601⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1660 -ip 16601⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1660 -ip 16601⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1660 -ip 16601⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1660 -ip 16601⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1660 -ip 16601⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1660 -ip 16601⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1660 -ip 16601⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1660 -ip 16601⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1660 -ip 16601⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1660 -ip 16601⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1660 -ip 16601⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1660 -ip 16601⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1660 -ip 16601⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1660 -ip 16601⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1660 -ip 16601⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1660 -ip 16601⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1660 -ip 16601⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2208 -ip 22081⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2208 -ip 22081⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2208 -ip 22081⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2208 -ip 22081⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2208 -ip 22081⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2208 -ip 22081⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2208 -ip 22081⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2208 -ip 22081⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2208 -ip 22081⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2916 -ip 29161⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2208 -ip 22081⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2268 -ip 22681⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2268 -ip 22681⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2268 -ip 22681⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2268 -ip 22681⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2268 -ip 22681⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2268 -ip 22681⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2268 -ip 22681⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2268 -ip 22681⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2268 -ip 22681⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2268 -ip 22681⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2268 -ip 22681⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\C813.exeC:\Users\Admin\AppData\Local\Temp\C813.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2268 -ip 22681⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2268 -ip 22681⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2268 -ip 22681⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2268 -ip 22681⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2268 -ip 22681⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2268 -ip 22681⤵PID:1448
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4868
-
C:\Users\Admin\AppData\Local\Temp\48AD.exeC:\Users\Admin\AppData\Local\Temp\48AD.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\48AD.exeC:\Users\Admin\AppData\Local\Temp\48AD.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:988 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\f59b6df2-e75d-4e84-a2d0-a7e95b773a83" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\48AD.exe"C:\Users\Admin\AppData\Local\Temp\48AD.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\48AD.exe"C:\Users\Admin\AppData\Local\Temp\48AD.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 5685⤵
- Program crash
PID:2860
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4476 -ip 44761⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\5C75.exeC:\Users\Admin\AppData\Local\Temp\5C75.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1892 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵PID:3636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2828
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2372
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:464
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:2996
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:208
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:3008
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:832
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:3308
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:4904
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4912
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:2708
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2268 -ip 22681⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2268 -ip 22681⤵PID:1368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C477.bat" "1⤵PID:2272
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\CB6D.exeC:\Users\Admin\AppData\Local\Temp\CB6D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Drops startup file
PID:1612 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:3576
-
-
-
C:\Users\Admin\AppData\Local\Temp\DA05.exeC:\Users\Admin\AppData\Local\Temp\DA05.exe1⤵
- Executes dropped EXE
PID:3820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 10842⤵
- Program crash
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\E243.exeC:\Users\Admin\AppData\Local\Temp\E243.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:3000
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:2032 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:3968
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1996
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:1680
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:3424
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4508
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:3548
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:1540
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:1644
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:4808
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:3868
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5116
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\1000316001\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\1000316001\dayroc.exe"2⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\nine.exe"C:\Users\Admin\AppData\Local\Temp\nine.exe"3⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 4484⤵
- Program crash
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 3724⤵
- Program crash
PID:988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 3884⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 3924⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 6804⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 7244⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 7444⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 7684⤵
- Program crash
PID:1148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 7844⤵
- Program crash
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 3164⤵
- Program crash
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000318001\rdp1234.exe"C:\Users\Admin\AppData\Local\Temp\1000318001\rdp1234.exe"2⤵PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\1000319001\for.exe"C:\Users\Admin\AppData\Local\Temp\1000319001\for.exe"2⤵PID:1320
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4548
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"4⤵PID:2032
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"4⤵PID:860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000320001\lolololoMRK123.exe"C:\Users\Admin\AppData\Local\Temp\1000320001\lolololoMRK123.exe"2⤵PID:1460
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 12204⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 8164⤵
- Program crash
PID:3492
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵PID:1060
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵PID:3000
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\497073144238_Desktop.zip' -CompressionLevel Optimal4⤵PID:1152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000321001\National.exe"C:\Users\Admin\AppData\Local\Temp\1000321001\National.exe"2⤵PID:2772
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\1000323001\redline1234min.exe"C:\Users\Admin\AppData\Local\Temp\1000323001\redline1234min.exe"2⤵PID:4020
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"3⤵
- Launches sc.exe
PID:2588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"3⤵
- Launches sc.exe
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000326001\pcsteal.exe"C:\Users\Admin\AppData\Local\Temp\1000326001\pcsteal.exe"2⤵PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4996 -ip 49961⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3424 -ip 34241⤵PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2948 -ip 29481⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2948 -ip 29481⤵PID:2364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2948 -ip 29481⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2948 -ip 29481⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2948 -ip 29481⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3820 -ip 38201⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2948 -ip 29481⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2948 -ip 29481⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2268 -ip 22681⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2948 -ip 29481⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 216 -ip 2161⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 216 -ip 2161⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2268 -ip 22681⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.9MB
MD55b1411077afd968b1dfd6b465f8117c0
SHA1adbd15191ee0505f09a110c085164e0c85731405
SHA2565f4fea43a900ee1cff4c67fc4b08d3fa856e8f9024986ff49cf1a355296e529a
SHA5126655a778035fb60201702b80f64e81092c0fd39692e53d1703fb191aff87691d4245cafc6bfa61d47aa68531eab14c554a1d0d6f8081da1e85d5afc6bb92e358
-
Filesize
4.5MB
MD59e4d1c2ddddb0bb9ab403a7540fcb44c
SHA19d3d818c60aca0d501133497055fe43dd1d8f2c6
SHA256cb6fd0e4779453133de64e1af45a7489ce2e858f7024b792f03c9be549afb84b
SHA51215932b3b10c53ee596101085a0df42218f8c94553cb36d2b5bc384a679288b82eacc5bb52c18ae565426bbccc7c8d4a7a9cbd3df6ee3e60e968de28c0ef8812e
-
Filesize
313KB
MD55275388736eab08ff9dd1bc294293888
SHA1ccacd0707c9f7f6a4640e160837fb31dc80d1b4d
SHA256399157d897d300ca1a761f7130a082fa0ed414f195a47d87b290c66c3c046164
SHA5126ce7825d4d8dfd6a981ba24822bfa6583075f0d6ce0892818670204f63765b8cefdb4a5647c50a50cdc990e0207349f6a6c12e4d8c58e17fc63107a2ec62df46
-
Filesize
768KB
MD5f27f57865ec73c5c23abeb5d761e244b
SHA1dfe87367a39728e448e92ee2c9d9802d729b34e0
SHA256d64e2174376d3f95a30b8a9e7c3352eac24813dfab8f7742abfd707a1ebb074b
SHA51282205d693a86dd074393cad8d16df481dbe546f55e85941992c6146f1b14c01e75f2b320780b479c66d5fc2eb8f1b85af6597a82fb0d0de4bd7d67663cbeca8c
-
Filesize
1.4MB
MD51349514bee62e9c61fb4af65c83aac35
SHA1bfe918dfc43b3b0eb55cf4215cef08c9bfe9dc93
SHA25620d25e27d97f0fbe7c3a8946ca5f958c960b9f36051b3b2676ff7e09707d4832
SHA512fd51c8248035650f6ed5b65d7cf998158235df4c0b6fbcc56b9a94842863c2d9aae72ce92818174cf03291d8f13e8643e6ca8b3ff4111a299ea76ebaa2f7cf9d
-
Filesize
384KB
MD56100cf1c34acb287caa6a7cdc7ec51a5
SHA10207792e053162a0dda39bb784f8df76f92c7943
SHA256dcb4c821180e7de31a5fef0abc84b85c629e362c5d1951782c5801406e7acad7
SHA512990551e46e4201e51c12e03287dd8600a74f088943eed063622f9191a27808e9d091362991739df6e4f1eb82d22f8783ed9caf0b8792e487655ad7dd0d9fd334
-
Filesize
1.4MB
MD55a44d47faed8424946d46ae2f2a7241f
SHA1811cfa286944f2e0f143f57eac87e216980e706f
SHA256544ae631a7049174248592c3324ea99a8e3a01e2bb616313e564414428162e9e
SHA512f1e72ca55d94dfb1a3dddb51bd6cdcd9a8a8da2b23448e8814845b4fb1a18610b822cead0b7f3a09803a55cd35c7ee986703cad206f065105fa73f0211f5f9e2
-
Filesize
4.2MB
MD5a81139f25bcb6daca5d21f7c112342bb
SHA1c749bbad487af9e54dca3c232bae628b1ee4e01a
SHA2565fac6b8c422f2b2d6c3e7ae10a2271ad911eb7c45a6ec838a1050a744ff786be
SHA512b963409735ece02eee1f721f34627cd0776ecc7966740bcc3cf9909bfb397154010829223f8918ebfe4a13e3cb1404d38a79e08b895c2665d95d669de7a6fdbb
-
Filesize
2.5MB
MD54dd56a580e453f78d76d8f1317b229dd
SHA1ac11e2258e0ee9f125a500e1fbd591fda0559eca
SHA25616782c44a48b892a19c2691a7552e43d8dafde642674b92e9a15b875b3bd87a4
SHA512a9d222dc096874b18201a613be272c1a9b373e8954a86539d543b335de621623eda694bde95c1d97236d9b3f1aab0a433022cda884b960ef1d45250ceddf513f
-
Filesize
3.7MB
MD5bdab3f8c67f66e25190f5e5268316e71
SHA106a84b8436d31aa629ae0c801390db3b518abb0f
SHA2569ed47ae1523d7ab8026b4a93d1513afed5fe01ec9984ae0c8bc8860e0e5836b8
SHA5120ebc13e98bcbca73c12fbedef40201ceb5a0f1cd33d83768557bca8f5fb9f2c83aa0b132c330ce6c77cef8ce9915c6c88f5890ffbcd93931a93ff5da21d751d9
-
Filesize
2.6MB
MD5cef3f45bd2f76afaa6aa2199928ad933
SHA1728e582c2870631e114c09b8813c726193fbbe61
SHA2560ff55c14cbee03273d1afebe504fbf62d5628fd2107dea2fba2cbfab7599b3b7
SHA512652c0c3dc3f196e1f0d4e18bc8470fd00d44c7c9af3d6e7a0fd9deb10373ee9e20625c9f20644b7c572e8bb9ff24b5ebe8bea559f68f0d1fa13127dadde92af3
-
Filesize
815KB
MD57e46a1ead53b47ff775549cb9a2fd835
SHA14d8b025b05958ddfc6a7b5629494e07712ba2c21
SHA256be30285fdd967e89fbcf936978d64b298a3d6530704913c60049a84da934d7b7
SHA51248f6d4f05eae49d8a2567236e7d41c5b542de568a31fee82e7122f98f8e68c21aec2bdf1f0b183b3e0cf8939312978c56d196e06bf1e1d502ae2f3c52e51ea72
-
Filesize
2.4MB
MD57ea4ead4fc9c5c7a9f3309cab716a28f
SHA1b5457c2c7529585e02dac132b5adeed3a4f1f260
SHA256431452b0cb6b0ee3d623c3394b120b104e24826585530708942690eeba34055a
SHA512f6ca00aa0331da628514f982a4627c338c1c9f29a70146c7324e9212f73487a1a146a93f438be93f13cf08574da73769bdfefdbb02b689ffa6d8fc98a6993d1b
-
Filesize
4.0MB
MD5fd9a9420fcd8962b51e41e9ca645f19f
SHA1e6e719b165267567aa74b34506d72c8fbc9f4c8a
SHA2560078b47b35212df1184c86ed59fee51261d317d83040c194b6bf69c1ed8716a4
SHA5120397f5567d4c9af2a3269fe41b357e02fc851f7be4943cd057e9fe4db4dca6c6da06ea3c38dce1701101b80c672aaf6e337e6f2e065c067a0d7237ce2bc1c053
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
286KB
MD5b70a1bd49d4133d98946486d4ec6bb36
SHA19feed9636e3a411bd1d2a3e80e713fe53376d9c4
SHA2563db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede
SHA512880b427c04cd532f7f49f496c5fb1f3a4244757deff6495c2b20d7b19631dd296a9a04ae968d9f3d51f3b022ea4c4d16a57e7c2a215c9a0b053b96dcfb290441
-
Filesize
535KB
MD5c85359e6fcc2b3aad2407a8769d8d1f1
SHA177adb2c84465aeef9ef0f8ddb12b0165610b57da
SHA2568934e11fa9c967fe8e67d9fc1c1f518f18c107b6abc91b143e03e5b18f892782
SHA5122f3c97978972293ca5a17838d173ad4554731edcc12e848bc27063a13ed5ca9bf0b8483f247891cf97be83e531ddab011d3c2b8156c92da8ec56a1a0b4c033a3
-
Filesize
2.3MB
MD51c879e257fa457c47439d5ba4c01b2a0
SHA15c96adfc28086dcdf682531746d0a42be1e2628e
SHA256940a3f45bddbf5a9da585e78ae9ea67675ef4aeed2e1abd4918c284c0959e6d4
SHA5128eef7497d5344b40054fc2e00802bd6c7526770fbf6df531a044b0906bc88c74314597892e788961bb718604a3f7dbb8c3016a71ce661b2a5a6b05f20d7b8a3b
-
Filesize
4.2MB
MD524731473beaceccd9ac209d1c3ed19c7
SHA16a5afb595aecb4c414e44eec0e42e5537f4a5f8d
SHA2569db5f471ddb2aff1a4ebbd55d8eff564026ad50a053ecbe3da30fb196610e4ef
SHA51244f0f0a943b545eee23be9b1ee548348f02210403b2164ffbe29e71a97abd513351cfd53151d6d117b015f4ea46ad70d7ca4c9046771c1fda495ba0610e0a954
-
Filesize
1.4MB
MD5ff11061189cbe432b1586fd37190de23
SHA15dd5c25513fbcdaec19625b3d385573fe6c380c7
SHA256bc8f6d1cad8890d90fae2750e602ef4e206811ed295ad0dffb33aceedcff085a
SHA512fb9d5871e822383278103829aada1f8e0e0f027c4ca9e292948efff139c576b7b13362e2c2bf6f334e8417792594b44f179d66681271d612e2e2b71dc401fc87
-
Filesize
1.1MB
MD523f5443fa5e190d02bd5ada3a5bb58dc
SHA1785a7636cc5b0483b6732be26d937b647bfb4a5c
SHA25683272237350fa5075e32385b994458f70c630754e324c77d62d97a1df62d5944
SHA512f2751c4bf377301dc35948d81ed6032db25291b92c9d5b9903d4842ef4b7098f1774afcdc9a1de4c0374841958a3460651caaa995db5bd6e44feeba416e6eeef
-
Filesize
2.0MB
MD51bf708425e397e8cd7784d14322f0435
SHA177e4209e868eb1115dda3ebb64e37ddddd2a825c
SHA2568a94354407a01f31848af8bea6aa9fc300a852e66c096e78015585fa3eea546a
SHA51293b58cea1c32f9b76b91b8e1f3422a4e8a9e95f30ddca2fee0a309640f6137b8f52a82d6d05ba33dd3aa3bb91208762edf12f0d26c4c38771e23297ab0d3a29a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.8MB
MD538c5b0b3c2e77e3c52a56ad8014f5908
SHA17efb6f39a2ea7fcfd484b144ad4fc2cc8d38340e
SHA2561acecfe3919d5e187b3561245c3b24b334c8e57c1d79ebe054f46460556d7c20
SHA512220a1a781e17a3246cbe9a15219765c0561311b1ca6eb164e860eecfe41d07715ee4b0c76663aa3adf6cbfcd3afe79ba6f295df5215b63633fd0c07911141cea
-
Filesize
1.1MB
MD5165337e44f0df650737f51046167b153
SHA1aaee1beb40b0d7c79c93a2a1022c245dd6673e3b
SHA256b34214d6f36ce397f8027a89a6ba154f15a3bb40cfc6fee89d801412ba5c3f83
SHA512548e0413bd584369dc62a93f3593204974f09c5a9b993c3dab3fc25d28ec76cde0e653565bb80a4b62e41b4cf3603b89543d94d26e7ffd54ecd6ca7b2c3b2873
-
Filesize
1.9MB
MD55f4641ee7c425983585c4c20215f48c8
SHA1e8610b8a94a4f52134540d03ab47deaae61b3ed9
SHA25610b065c7360175ea6554d382e22bd473f799076913bb6d59cd76b52ae5f93b17
SHA512902e5e94992f749bbe5306e8d15206a2933b8ba6ca1477b15bad5381e2b5e8b2aa777c9ff5229a0fbbf7a3317cba0c36b4ae83c5737120eea50c98ee6580b77f
-
Filesize
7.9MB
MD5c7360f031893f764c09c12d1a93bb6b3
SHA1ed7645fce92872be3668dd38da104ec0c5648213
SHA2563c1b63ce143c1979f3d963fd3ed0d838bc231c1d2fcb02a965c7230ef94dc899
SHA5126924d9f34c317bd45008446bef35a4ef9da1f985cc213ad32d29d5f1dceaef0b3f73b07eec6d489e561711ff6cbb7e99ea110d345d89f571ad3ca4852381f413
-
Filesize
960KB
MD50541bddcf92a5c6cbb75572cc61f9a3e
SHA14fad270f2e416519c07e486ac3a171b838e88018
SHA2566a4e7b0a7221bf29ac9dc2d89f526040552b0da8cdd4f56f13929ff341917e72
SHA51237a6731b569ff2a21e49e73162286701981db99959e47056270b4adfb9dfe7554b3ac8b650b5ad24f738749701f91bb7594662a3300d2ecfeffe62934a0f866b
-
Filesize
1024KB
MD5c1f4c806f9b5f8ace8cbcb494d812163
SHA1b848501bf7f2b9f18ef7a3a2ad8149ff359e7d98
SHA25645c56c1c3aa6cb27346a9444f163b9d43161a7e994afabe5829640493a97602c
SHA512bd031e5ad82abb842f943711ba31a2cdaf672dbff1fd6538689566c77796903ebffb4bbbe85eb90d10be3bb221779eb48e582b11eeab48cde77ed4905ada19ac
-
Filesize
257KB
MD59377b2d9cf30cdb95938581d2f443d0c
SHA15b2d23dea7d5f7deded14b1f33e08260b9c25878
SHA2561b045d664cd5ce2bf315bffef85f0b4be363bd6d146533e3c3624257122330e9
SHA5124278f05d7da33465332fe62b8a9f1e01717f99a3b7e8f7769ec62947b9aca924228575087a035bcc064f816e4b58ff28bc7ba0cc84545ebbe8cc0d69b7ca7f0e
-
Filesize
328KB
MD527f37fa93c3f218d90a4b9d1c769b225
SHA1208d502169a49edfc23cedb7bf26b3f7a0030add
SHA256bb9397786f7314931ced6370ceacf505923dfa835988c306342efc061341dabd
SHA5124f303ea2a90d71b7d064c097ba52611c287c68c958e4272d83c303c4450b418dfe3a3d5c4e0a3526cf20caa2985866bcd68ad5f877216effae96110ea76d4123
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
715KB
MD50b374be36fee0eae8b1e305f1e4073f5
SHA13e5f24441b9f00c3e5beb7ef2438d1868259d852
SHA256bbd48c58bc41696a56c317d9650057c725642e5c1dee71a8b4f0b9cbd9095ad4
SHA512f8abf77020dfe9cba6c8afb6535a86338a8923dac7d3a81ce78110302708611109c3b80104178ec6dcd95ce7d9e60829fa8b88c7411aa726699aec04eaaccb9c
-
Filesize
175KB
MD501fb175d82c6078ebfe27f5de4d8d2aa
SHA1ff655d5908a109af47a62670ff45008cc9e430c4
SHA256a07112e236e0136b43294b31a43fb4456072941a135853e761680d04315841c3
SHA512c388d632c5274aa47d605f3c49a6754d4ad581eb375c54ce82424cffa2ad86410a2ad646867a571dcf153e494b4e7ca7a7cf6952b99ddcf5940a443f7039f2fe
-
Filesize
170KB
MD555f8359ef2f889e04fe418c80bc952ed
SHA1b2ac224b69c20b721ef9810b79003b513823e55f
SHA256732cb080fb5e27e98728c42f77b5dd865faa1f5e840d8113c9f30fa2c3f550c8
SHA51242bfba12e19f399beb54d65dfdb8767584c75264a1f321aee68cb85880d7ac606b3022bb0ab7df72075d3f2271e7d4918c9c7bae7acf6675856bcd21f6fe46b8
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
570KB
MD5ea037914e6f1aa6a8ad565407158d49b
SHA15fbbd923c0bbcf33fafca5a0ed847c19478856e5
SHA2569deee2315490381305b70eeaff5805df00d10feb9d9f78fbce33b3cd5795ed73
SHA512369943b3ac01a8c89c7d163391e60c2a4f9f616ade5161df8a67e75c490ff4a70b37d4b617675518c924d2fbc07605a37d4f76166da9becefcb4bd5052a69e55
-
Filesize
313KB
MD5753db7d6804f9f27aaf30fe62c00a011
SHA14c29fef91e4a099c08b90c0aa9f0397fba36d452
SHA2568f09598518b4d2a084e1fe1068c43027fe9e6caed74de0926bdac110a305ac2c
SHA5127ff04ef374e8a97b58f110dbf3451493c2e2644fce3935a6d4107074819d9547ea861c06a2ed24b5d459f41784bcc0be107c920e78310332ca50f3143b7ac830
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5747c1f14d2897fe668a250dbbc527d1e
SHA14f581a2fb26c1ba3fcbb847853ab36573b707586
SHA2568178ad3191b078c5a254c68618420542cdca730b24485a14f32dbc603c7d5484
SHA51201365b6fc53e22ac17e22d66a7987b76a58ba4a07b9757d6e23ceeab8943338763eac1c8001f3ffe8ea9ed825f8c9741867296fb1a8c6cf7e2036440ac859dd9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bd83795448330b02105468b631db1d2b
SHA1754c16a84c9ee74e32ef2c7ea7cd07d35ab32608
SHA25600a8fb9a816358b98006b706b4ae15fcf306aa346b32e50c23cfec2d4118fbb7
SHA512fb1958534f1cc85a82e46c23ab61e7d6a2f8f383bd588f4c8421f8f67ff6fccaae3565c0621fa3ca2d9b8d52ce6a3e650ff917a02b5c18f126efc5664f03703b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f923828b961cd3d4ec7fb7ff182fe656
SHA142781372bd904a33250d9426fa449ce9e7767cc3
SHA25686f0ef7cb6e48b5bef2de0ed9f572e48767dfdae960cc96d22cc737f96b9ee85
SHA5122f485eda690d661aeb6d02f94ce59ba1eaa512eda4a0b2e4474ad0d1a13dc833e91cf108e3b3861bab9dd3a3b4be1d6893eda215928cd844b7a0ef738a24154b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c6640c08fb4da54d66bbc8501ef17918
SHA1cf78fdb6520afeb3428fdeeee93eb6f12f62d913
SHA256ca70d6d4cd24bfa554db794d3cfcec0b5ea77475183eaa582ce03bb4e49da7f2
SHA512ef45dec17616ff134a29e5dc15f151305c1a99d2afe6933d9f7f1915676074fca9432ae6e0603c48297b65adcbe57b884d57d7741883411d57314bf0cff8a3f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50bd9e0752c7c84046681fddd3d3fe4d4
SHA1030b611a626f429ba33fd2110d856b39bbe0074c
SHA2564fffd0ea3fcb89e2cb2bd99941046f203db818173e58fb473e8f9af72aa07126
SHA512d8d26a459292e4023dce380c9058d15a975977a85fb4931a38ffcbd8d247faf6d06f5fe77f536195cb032272d03c7bebbbef5064f1c58c1dfd174ebe63237bb8
-
Filesize
3KB
MD52d29fd3ae57f422e2b2121141dc82253
SHA1c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA25680a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68
-
Filesize
832KB
MD53cee364c54a316d5e1640b0875636b19
SHA1ac2ce8ed4fee293ce66517dd5d9e54d99336e07f
SHA256fed9f01b17df8d0a1d7442ffb96e95f9f88e7c25cb38fc8872722928cdcffd01
SHA512b1bebf4644790af4651afd3b2d770c3e46370b4526f7220c3c4ab85224da0574f681daa94041737305d483b2ae73092b43f2881fbd4d6e1dfa124b688d9f1969
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec