Analysis
-
max time kernel
85s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
c4580e8db0c3dbc88891842fd8a31158.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c4580e8db0c3dbc88891842fd8a31158.exe
Resource
win10v2004-20231215-en
General
-
Target
c4580e8db0c3dbc88891842fd8a31158.exe
-
Size
5.5MB
-
MD5
c4580e8db0c3dbc88891842fd8a31158
-
SHA1
744f03fcf10db1459d3f40beaea2bfe1b000582b
-
SHA256
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922
-
SHA512
cefd412e0d5aba56d6603fdc46a056474ce387dbb220b32a9317dca0822bef9320515afacc2ab2086db46f9e01b3456c87a0dc83bd99c246550d87efd3606945
-
SSDEEP
98304:Fs9EI6sZJrf04Hr3VvPkrcRizJ6krK4JLQaEHlXU+vG9G1jMaZQRrkp:W+I6sU4HjZkwkVJo1+G1jMaZQpk
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.ldhy
-
offline_id
pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1428 schtasks.exe 952 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation c4580e8db0c3dbc88891842fd8a31158.exe 2828 schtasks.exe -
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2872-94-0x0000000003930000-0x0000000003A5C000-memory.dmp family_fabookie behavioral2/memory/2872-252-0x0000000003930000-0x0000000003A5C000-memory.dmp family_fabookie -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/files/0x0004000000000743-556.dat family_zgrat_v1 -
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral2/memory/1056-345-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1056-347-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1056-348-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1056-386-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4008-396-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4008-397-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4008-399-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 11 IoCs
resource yara_rule behavioral2/memory/1340-60-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/1340-61-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1340-167-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1340-172-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/1340-207-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1364-251-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1340-268-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1364-295-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1364-364-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1364-407-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3988-455-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/files/0x00040000000162ae-629.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000022cb8-818.dat family_asyncrat -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2520 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation c4580e8db0c3dbc88891842fd8a31158.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation InstallSetup_nine.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7B75.exe -
Executes dropped EXE 15 IoCs
pid Process 2284 InstallSetup_nine.exe 1340 d21cbe21e38b385a41a68c5e6dd32f4c.exe 2872 rty25.exe 1892 toolspub1.exe 2640 u1rg.0.exe 2528 u1rg.1.exe 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1612 6481.exe 1040 7B75.exe 1056 7B75.exe 4236 7B75.exe 4008 7B75.exe 3988 csrss.exe 3448 C3F9.exe 4280 D986.exe -
Loads dropped DLL 2 IoCs
pid Process 2640 u1rg.0.exe 2640 u1rg.0.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2240 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0004000000000745-568.dat upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\46a03768-4297-4d11-858b-5e2f63ec1c10\\7B75.exe\" --AutoStart" 7B75.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 89 api.2ip.ua 90 api.2ip.ua -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4280 D986.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1040 set thread context of 1056 1040 7B75.exe 120 PID 4236 set thread context of 4008 4236 7B75.exe 124 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job D986.exe File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 400 sc.exe 3216 sc.exe 2716 sc.exe 3888 sc.exe 2364 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1276 2640 WerFault.exe 88 1252 4008 WerFault.exe 124 3432 3448 WerFault.exe 136 932 3448 WerFault.exe 136 5048 2988 WerFault.exe 148 384 2608 WerFault.exe 191 3548 4980 WerFault.exe 165 2324 4980 WerFault.exe 165 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6481.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6481.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1rg.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1rg.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 952 schtasks.exe 2828 schtasks.exe 1428 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 toolspub1.exe 1892 toolspub1.exe 2640 u1rg.0.exe 2640 u1rg.0.exe 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 4024 powershell.exe 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 3540 Process not Found 4024 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1892 toolspub1.exe 1612 6481.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4024 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1340 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 1340 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4452 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 2920 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 4572 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1420 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1612 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeDebugPrivilege 1684 powershell.exe Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found Token: SeShutdownPrivilege 3540 Process not Found Token: SeCreatePagefilePrivilege 3540 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2528 u1rg.1.exe 4280 D986.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2284 4728 c4580e8db0c3dbc88891842fd8a31158.exe 84 PID 4728 wrote to memory of 2284 4728 c4580e8db0c3dbc88891842fd8a31158.exe 84 PID 4728 wrote to memory of 2284 4728 c4580e8db0c3dbc88891842fd8a31158.exe 84 PID 4728 wrote to memory of 1340 4728 c4580e8db0c3dbc88891842fd8a31158.exe 85 PID 4728 wrote to memory of 1340 4728 c4580e8db0c3dbc88891842fd8a31158.exe 85 PID 4728 wrote to memory of 1340 4728 c4580e8db0c3dbc88891842fd8a31158.exe 85 PID 4728 wrote to memory of 2872 4728 c4580e8db0c3dbc88891842fd8a31158.exe 86 PID 4728 wrote to memory of 2872 4728 c4580e8db0c3dbc88891842fd8a31158.exe 86 PID 4728 wrote to memory of 1892 4728 c4580e8db0c3dbc88891842fd8a31158.exe 87 PID 4728 wrote to memory of 1892 4728 c4580e8db0c3dbc88891842fd8a31158.exe 87 PID 4728 wrote to memory of 1892 4728 c4580e8db0c3dbc88891842fd8a31158.exe 87 PID 2284 wrote to memory of 2640 2284 InstallSetup_nine.exe 88 PID 2284 wrote to memory of 2640 2284 InstallSetup_nine.exe 88 PID 2284 wrote to memory of 2640 2284 InstallSetup_nine.exe 88 PID 2284 wrote to memory of 2528 2284 InstallSetup_nine.exe 91 PID 2284 wrote to memory of 2528 2284 InstallSetup_nine.exe 91 PID 2284 wrote to memory of 2528 2284 InstallSetup_nine.exe 91 PID 1340 wrote to memory of 4024 1340 d21cbe21e38b385a41a68c5e6dd32f4c.exe 92 PID 1340 wrote to memory of 4024 1340 d21cbe21e38b385a41a68c5e6dd32f4c.exe 92 PID 1340 wrote to memory of 4024 1340 d21cbe21e38b385a41a68c5e6dd32f4c.exe 92 PID 2528 wrote to memory of 4872 2528 u1rg.1.exe 96 PID 2528 wrote to memory of 4872 2528 u1rg.1.exe 96 PID 2528 wrote to memory of 4872 2528 u1rg.1.exe 96 PID 4872 wrote to memory of 652 4872 cmd.exe 99 PID 4872 wrote to memory of 652 4872 cmd.exe 99 PID 4872 wrote to memory of 652 4872 cmd.exe 99 PID 4872 wrote to memory of 2828 4872 cmd.exe 100 PID 4872 wrote to memory of 2828 4872 cmd.exe 100 PID 4872 wrote to memory of 2828 4872 cmd.exe 100 PID 1364 wrote to memory of 4452 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 110 PID 1364 wrote to memory of 4452 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 110 PID 1364 wrote to memory of 4452 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 110 PID 3540 wrote to memory of 1612 3540 Process not Found 112 PID 3540 wrote to memory of 1612 3540 Process not Found 112 PID 3540 wrote to memory of 1612 3540 Process not Found 112 PID 1364 wrote to memory of 3308 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 1364 wrote to memory of 3308 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 113 PID 3308 wrote to memory of 2520 3308 cmd.exe 115 PID 3308 wrote to memory of 2520 3308 cmd.exe 115 PID 1364 wrote to memory of 2920 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 116 PID 1364 wrote to memory of 2920 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 116 PID 1364 wrote to memory of 2920 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 116 PID 3540 wrote to memory of 1040 3540 Process not Found 118 PID 3540 wrote to memory of 1040 3540 Process not Found 118 PID 3540 wrote to memory of 1040 3540 Process not Found 118 PID 1364 wrote to memory of 4572 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 119 PID 1364 wrote to memory of 4572 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 119 PID 1364 wrote to memory of 4572 1364 d21cbe21e38b385a41a68c5e6dd32f4c.exe 119 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1040 wrote to memory of 1056 1040 7B75.exe 120 PID 1056 wrote to memory of 2240 1056 7B75.exe 122 PID 1056 wrote to memory of 2240 1056 7B75.exe 122 PID 1056 wrote to memory of 2240 1056 7B75.exe 122 PID 1056 wrote to memory of 4236 1056 7B75.exe 123 PID 1056 wrote to memory of 4236 1056 7B75.exe 123 PID 1056 wrote to memory of 4236 1056 7B75.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4580e8db0c3dbc88891842fd8a31158.exe"C:\Users\Admin\AppData\Local\Temp\c4580e8db0c3dbc88891842fd8a31158.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\u1rg.0.exe"C:\Users\Admin\AppData\Local\Temp\u1rg.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 23644⤵
- Program crash
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1rg.1.exe"C:\Users\Admin\AppData\Local\Temp\u1rg.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2520
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1428
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:1844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:3036
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:952
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵PID:4748
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:696
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:400
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2640 -ip 26401⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\6481.exeC:\Users\Admin\AppData\Local\Temp\6481.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1612
-
C:\Users\Admin\AppData\Local\Temp\7B75.exeC:\Users\Admin\AppData\Local\Temp\7B75.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\7B75.exeC:\Users\Admin\AppData\Local\Temp\7B75.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\46a03768-4297-4d11-858b-5e2f63ec1c10" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\7B75.exe"C:\Users\Admin\AppData\Local\Temp\7B75.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\7B75.exe"C:\Users\Admin\AppData\Local\Temp\7B75.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 5685⤵
- Program crash
PID:1252
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4008 -ip 40081⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\C3F9.exeC:\Users\Admin\AppData\Local\Temp\C3F9.exe1⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 11162⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 11122⤵
- Program crash
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\D986.exeC:\Users\Admin\AppData\Local\Temp\D986.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3448 -ip 34481⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3448 -ip 34481⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\838.exeC:\Users\Admin\AppData\Local\Temp\838.exe1⤵PID:2988
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 10643⤵
- Program crash
PID:384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 9842⤵
- Program crash
PID:5048
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\151A.exeC:\Users\Admin\AppData\Local\Temp\151A.exe1⤵PID:2312
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3500
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"3⤵PID:2252
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"3⤵PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\1941.exeC:\Users\Admin\AppData\Local\Temp\1941.exe1⤵PID:1688
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1956
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\1000025001\mrk1234.exe"C:\Users\Admin\AppData\Local\Temp\1000025001\mrk1234.exe"2⤵PID:4388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 8244⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 11684⤵
- Program crash
PID:2324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000026001\plaza.exe"C:\Users\Admin\AppData\Local\Temp\1000026001\plaza.exe"2⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\ladas.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\ladas.exe"2⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\1000028001\sehv.exe"C:\Users\Admin\AppData\Local\Temp\1000028001\sehv.exe"2⤵PID:4692
-
C:\Users\Admin\AppData\Roaming\ms_updater.exe"C:\Users\Admin\AppData\Roaming\ms_updater.exe"3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵PID:4388
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵PID:628
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\073191680435_Desktop.zip' -CompressionLevel Optimal4⤵PID:1996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000029001\redline1234.exe"C:\Users\Admin\AppData\Local\Temp\1000029001\redline1234.exe"2⤵PID:1928
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "ACULXOBT"3⤵
- Launches sc.exe
PID:3216
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "ACULXOBT" binpath= "C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe" start= "auto"3⤵
- Launches sc.exe
PID:2716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "ACULXOBT"3⤵
- Launches sc.exe
PID:3888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:2364
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵PID:560
-
-
C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exeC:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe1⤵PID:5104
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2988 -ip 29881⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2608 -ip 26081⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4980 -ip 49801⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4980 -ip 49801⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
698KB
MD5bf2a3e48b0ea897e1cb01f8e2d37a995
SHA14e7cd01f8126099d550e126ff1c44b9f60f79b70
SHA256207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
SHA51278769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
Filesize
1.1MB
MD5cf938f309ab31bb603b0464c79fec918
SHA13bdb9964a57d5c7c3cf3fedb06b012a4d5cebc39
SHA256e96e4812bc6e17ecb5e5245ac2a4426b7a7e7bfd65731b0f741fd298521b5fac
SHA51212e38379400d2d3c2eba1e9705fddaf7e88a97d869dfcd4bdc5e917e2b36ab78bf3d6eeef9b47a3a8bbac52ed88336b3bb7b089caf21b8d632627450f978bb83
-
Filesize
2.2MB
MD5d49f653b741e1eff325512459c8b1e1b
SHA1de3245ba90a2c36247f67d3e1fcb88201d2dc2ea
SHA2561bddc504e09a417a1aa836b0cb5dad6ea346ed132c08ac2a16ce6aceaa7294cb
SHA512e2c5df9082385d88191bafb3694acafe4f11c7cf3169f6ef6ba150b1478807b6f69b1e42caabcf6b5f46b4c6242fe1e38fa969f93df27753ab6888389f26afbb
-
Filesize
754KB
MD577d117991eb0289267f32080fd1a26a2
SHA1ccb05a4825ecfec0ebfc89058e4b671ac1772fd8
SHA256d997205df962c1a04bf549616eaa0fb839c4bc549056eb2b37fe3d6c51ad9b32
SHA5122621ac8a38e20405e14a376026e6f05a2b22958e33ce3117d8270c0abcfbaa6dc1d6dba359f00a7efce21d50177940f58592272068a27c970f09658de36b5f70
-
Filesize
2.5MB
MD55dec9f02f7067194f9928e37ed05c8f6
SHA106f13ca068514d08f0595ded4ef140078888235a
SHA256dfecb99cc255e99b5df34a042f0585c0e8458a4e0075e7d513d2c0b492c41806
SHA51298f980ab103c54c4b1b344b738bcaccd10a35923749a730dd3386355897156d382f01715d07a056ff7451e876898a76268328f92d1e8203b254bb7a082f18e7c
-
Filesize
1.6MB
MD5f50536d2ac683c7edc8706198103ccb8
SHA14545e786b576dcda04acc2bb8370627f7d7bbf83
SHA256854929dccfca0bc24198bb737a81a8d74b2bc924049167b8ed6ad8e96a75610b
SHA512a46835687045bc023049adef6b026575847a8f6e9f1de9e0b00e094ab2f66391c4c4e8ccfc01c8ef5c48c36564deebbd2163d82796691768fcad4e450221dd07
-
Filesize
590KB
MD5caf451d07706d636ba09ef376030bf82
SHA15ac690d49430a9f22f24656387d7b1c12791b776
SHA25687c4e34bd82ec6ad1f3d43de1e8516c0e53f11ff685347285bf326946539051f
SHA5121fe42ccbea531a2d0191df8997e5ae15cf3aa086474084df7081b563dc889f8501e5e73a77e0ad1b3fcf6e3544a1dba7b0287c5c57220ae0637f12d753d73512
-
Filesize
807KB
MD58fb7e3b6da6922609bad77f4e60105e9
SHA105b95c19a2047b6b74abd4e3e00635b40dce5574
SHA25669414978717bbd821559ec67ca4fb371ca2f2c787b53655b7b91762cca55f425
SHA5129ddc7520a6a4d9c54277c5abaa6c538ec295516ee3494dd616b67a6e644d9e36ccf5b3fbe04ad9b47afe8e95cd725bc7775413b18f952cb56b75bf98555c49f0
-
Filesize
6.3MB
MD56b7ac869352fe68f34f875b8e134c7cd
SHA16e4930f6a246179048a29aa00500c158eaede7fd
SHA256b79ed7cc341e26c68385af0f815fc7fd7a888bfa12906f58d21754f232067375
SHA512ee3e93483b44e4529226142edba0b506d29c69d86c9522fbeea6a69799345b0d2509dbda369ff2dfb6f7eb2516d46e5a49812a7745d6a2abe6e02cde6793eb55
-
Filesize
1.9MB
MD55ac03188a5078efc0d0e5f3775425a86
SHA1f42e9e4edcef1c97eaa8b5837cb4d1eae8bfd307
SHA2565949af990c5cc726aa69ba0d34e83390f153c24ad45b7c6dc29358ac30566c67
SHA512fc6e5a434e0a5dc6f3e589710b25b87560a188908355aa30661f041fbb17d5c6a52dcddb613554213756f0fb5ac8dab88b2bc863d25b09773681fc65838d0024
-
Filesize
6.0MB
MD595e59305ad61119cf15ee95562bd05ba
SHA10f0059cda9609c46105cf022f609c407f3718e04
SHA256dd87f94c961b9612bbd65761bee6ed15318d63652f262e2c425bd177a2341a19
SHA5125fbcfe79162460080e0c3944df747835f0b8f2cdb35b038eb69eadf2eb85a209f7d5432a328d0f0eeafba036012f48793e3c08d94531b98a12a498bcf3b00ad2
-
Filesize
2.5MB
MD5b1c30caedd619e8f26c16ccbc0f0a95f
SHA1e1da667e9a11dea55566ebd79bba8dc3f2a0bf5d
SHA256a1e3bcf29a0a23c82347e7c7b85afeaca954e72618dbae109cad8cf6c022a9e7
SHA51270ae2cfef63bceaba5d07791677268df7b57846c42d6c61608943d48b69cb0b5cfa976946a5a2322c7c1e5ca12e89da7a28c9651fe9244e7763f60a88580330d
-
Filesize
419KB
MD5654abe1db0f972272b5b012914d9e5d6
SHA11ac7b42167369dcfa528837f13a2c80de7bcc161
SHA2565f2bdf7f83ab075f7dafaf7493cbf4ab08d2e79b95cd3382621acfe73ba96094
SHA51218823ab8a9a160ac169052ec210e6adb356190dc0644c8b5fd6f5ccbc8de2666c5e9d44ef90c954d5b6e948c81ef2666900c0fe40b7d5e4b644a39e8b93c1a12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4.2MB
MD566560a15081c9dee9fed498d5f0a25a9
SHA1fbd7626525777262423fb9beea1e5b7e50fda2b5
SHA25611e2cfb1fb58a3f69826d5bc36e88fde44c53def20891739ea7054eaabf24551
SHA512dbd84583c6248db88452ef12074aa668ee982a9fe18484611a1b6d67a7233f9f3fca466bc843dfbc227099a5fd67af24c98f2d5408b26f8cf9fd635f7c70ba07
-
Filesize
715KB
MD58dc1f88ae1fcedeb3983c5f5c3d486b0
SHA1d40e67ba5558d90cb11eeca04d213322159336fc
SHA2564a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca
SHA5120b2263fe049e280af1178fd396a06a04e6b99f7c971839207ae225161257ed9d9b7eaa8d0ceb1f14d3aa2094b53ce91dd045ebc169102e707ea7285f91432ac1
-
Filesize
238KB
MD58c20d9745afb54a1b59131314c15d61c
SHA11975f997e2db1e487c1caf570263a6a3ba135958
SHA256a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
SHA512580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
Filesize
320KB
MD57c0b88535c506fc8bec1510f08f3329c
SHA1026965f027f53725e0e93d069a7143d12badd35c
SHA2567f2b4169d20bb191467b02abcae4dbc05e80bb5a20aece8e3d04aac7f05b0382
SHA5123e5d80f017b99e556a2ce8ac1849ac52e5e1ec38812d015e1dd8e4c276c45e3b5462ca0961d3c806113266b130b350fc993f6734a07a093a5a50bccc7c5f160b
-
Filesize
4.7MB
MD55e94f0f6265f9e8b2f706f1d46bbd39e
SHA1d0189cba430f5eea07efe1ab4f89adf5ae2453db
SHA25650a46b3120da828502ef0caba15defbad004a3adb88e6eacf1f9604572e2d503
SHA512473dfa66a36feed9b29a43245074141478327ce22ba7cce512599379dcb783b4d665e2d65c5e9750b988c7ed8f6c3349a7a12d4b8b57c89840eee6ca6e1a30cd
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
512KB
MD5b7c4827f8932dc28b4035c1c4ddb9521
SHA18e40a068226f6869b1831ee849b8d30c91dd1030
SHA25610087103922e07b20d5614e2dea417843d15ee16b9e4b7e8ce5fe73ce0446d4e
SHA512da3b3dc82b5ae648edbde0e08b903f9724461e280613a3354770a9c3460e5508f283c22eb8cc0da3feee31848e48c3fba649c54c29ea9c0aa5c98d1c85ec2b93
-
Filesize
570KB
MD5ea037914e6f1aa6a8ad565407158d49b
SHA15fbbd923c0bbcf33fafca5a0ed847c19478856e5
SHA2569deee2315490381305b70eeaff5805df00d10feb9d9f78fbce33b3cd5795ed73
SHA512369943b3ac01a8c89c7d163391e60c2a4f9f616ade5161df8a67e75c490ff4a70b37d4b617675518c924d2fbc07605a37d4f76166da9becefcb4bd5052a69e55
-
Filesize
313KB
MD5753db7d6804f9f27aaf30fe62c00a011
SHA14c29fef91e4a099c08b90c0aa9f0397fba36d452
SHA2568f09598518b4d2a084e1fe1068c43027fe9e6caed74de0926bdac110a305ac2c
SHA5127ff04ef374e8a97b58f110dbf3451493c2e2644fce3935a6d4107074819d9547ea861c06a2ed24b5d459f41784bcc0be107c920e78310332ca50f3143b7ac830
-
Filesize
440KB
MD5d514f9e98e87c2438e6ee8bca0be26d1
SHA1ded0a58f2bd6df081814d7b18ec64a0c0f1a4a55
SHA256e0a536b6e024cd1395ca89bc4eaf7de646d3d779763a95daba3ca6100c717f69
SHA5129a416fd5cbe2a0fe2844c0ad5cccaf8087e97c9756dda535524f2c9f08beb2b2eb8ba5148da1faf3bf4a3de3c526f8d98957392f52f23f2cecaea200edd89465
-
Filesize
74KB
MD5b9ca7186d049496514c8f1934102c895
SHA188f2c9ee04d9ce8e3fae0cb8959300e1834330a6
SHA2562beeb298fb5971b8da2b484782f0749769f2b88265981f9dfabcdb907dee5fbc
SHA512e5d2847a22ddbd48c024211127cf86fca19e2d86782ccbe5f839ede5a76d928757e2afe214098b8b168877cf41c3f3fb9af21069b80be0b8c7b5b97c9b87fff0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f5319a9baddef2bc3f2ff7b5857cfd9d
SHA1612f5f1b7339a7c6fd0c4b68516e75da0850ad9b
SHA256ac699de442a392065aa8d0a7cd58476f4e767f3cdec9e94297f797efc1331ac1
SHA512c5486ea0a7e729b3a5a6334099a067a5869a4ad0d30d7b0ba4d28ab3e7cb8206895552b4c3e569bf4ce0dd2e7bca0ea734443894926b817365455f1c67997e1c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5315f4cf19d1e7eb4b5d6edb1b0c452e4
SHA126e997508d2572df07c8521d0b4db99e5fa69015
SHA256f7b0c4d901698717adb981d99239fa83a627117fb8159a2366354cd4a3c4ddc5
SHA5121b6921fd21ec944d8335a50ea3216c31442125578a543d4ebba53fea93e549a2a3e9e73d5bc6a71865db749aa1cdbc701407986453dd3111d4111e33a38e3b6d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5241674f32e60b3eb5f480f7181f34c8f
SHA1017d088f3fb06dbdcd9c5187ed91f4fd23fa9413
SHA2562c57a3caecd5a2481e266776a8308ec7f80e8af1cc56d1e5dbfc599c902c3b08
SHA512dad1b53d47965284c62d8cab1cfa92af9d915ac617bbcafc5d6501a7000f8b538b683909793534ef1e6206062461835667207305d9d22d589c27b031312ac72e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD591a7171e29290933c9eb4c5722611076
SHA1590bdc3a6ac6c15518d8dc3211d7d04d280741e2
SHA256a754ec768511e7b3b18e303e21022f8562f8688d427660f9f2c58968fbf6593c
SHA5123caa5983f45643335f1401d29a0c5b5e2c32c28707b7e18e86d854930501e8fc002d563873302255384b48f9b9cdc0c017d45f3a74356f83cfe20e1f67cb26dc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD575c9dc20e50a95845df39152b7fec9d5
SHA10faa58d7a0f961cab83989f4fea12bd6a6c1b796
SHA2564143222748ec1617dbefe0704d59298caaf5b8a37af787d95b91343aa427ccfc
SHA5121ee9cfbc62e5556c0ee048174d34576ab690fc2a8111a72b727b92983316fa00551f819cd528c907a7d48b705e7491dcb6f584f97de0347de111b61920251348
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec