Resubmissions
08-02-2024 19:00
240208-xnla2ahe7z 1008-02-2024 07:34
240208-jd5p2aefen 1008-02-2024 04:47
240208-fevdxabb9y 10Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-02-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe
Resource
win10-20231220-en
General
-
Target
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe
-
Size
5.5MB
-
MD5
c4580e8db0c3dbc88891842fd8a31158
-
SHA1
744f03fcf10db1459d3f40beaea2bfe1b000582b
-
SHA256
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922
-
SHA512
cefd412e0d5aba56d6603fdc46a056474ce387dbb220b32a9317dca0822bef9320515afacc2ab2086db46f9e01b3456c87a0dc83bd99c246550d87efd3606945
-
SSDEEP
98304:Fs9EI6sZJrf04Hr3VvPkrcRizJ6krK4JLQaEHlXU+vG9G1jMaZQRrkp:W+I6sU4HjZkwkVJo1+G1jMaZQpk
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.ldhy
-
offline_id
pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw
Extracted
vidar
7.7
655507914130aa0fe72362726c206a7c
https://t.me/newagev
https://steamcommunity.com/profiles/76561199631487327
-
profile_id_v2
655507914130aa0fe72362726c206a7c
Signatures
-
DcRat 7 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exerty25.exed21cbe21e38b385a41a68c5e6dd32f4c.exeschtasks.exepid process 1028 schtasks.exe 4240 schtasks.exe 1200 schtasks.exe 1480 schtasks.exe Key created \REGISTRY\MACHINE\Software\Microsoft\SystemCertificates\Root rty25.exe Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe 2112 schtasks.exe -
Detect Fabookie payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3444-94-0x0000000003900000-0x0000000003A2C000-memory.dmp family_fabookie behavioral2/memory/3444-479-0x0000000003900000-0x0000000003A2C000-memory.dmp family_fabookie -
Detect Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2172-2038-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral2/memory/2172-2043-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 13 IoCs
Processes:
resource yara_rule behavioral2/memory/976-1977-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/976-1979-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/976-1982-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/976-1994-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2001-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2003-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2011-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2012-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2016-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2018-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2019-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2029-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1312-2051-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/4968-31-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral2/memory/4968-36-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4968-181-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral2/memory/4968-419-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4968-436-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2816-439-0x0000000002D90000-0x000000000367B000-memory.dmp family_glupteba behavioral2/memory/2816-440-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2816-971-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2816-1196-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4064-1741-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4064-2020-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4064-2059-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3892 netsh.exe -
Drops startup file 1 IoCs
Processes:
E4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe E4.exe -
Executes dropped EXE 32 IoCs
Processes:
InstallSetup_nine.exed21cbe21e38b385a41a68c5e6dd32f4c.exerty25.exetoolspub1.exeu104.0.exeu104.1.exed21cbe21e38b385a41a68c5e6dd32f4c.execsrss.exeF7BE.exeinjector.exe2111.exe2111.exe2111.exe2111.exewindefender.exewindefender.exebuild2.exebuild2.exebuild3.exebuild3.exe9F89.exemstsca.exeE4.exemstsca.exeqemu-ga.exeithdjhbmstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 1300 InstallSetup_nine.exe 4968 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3444 rty25.exe 1836 toolspub1.exe 360 u104.0.exe 1756 u104.1.exe 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4064 csrss.exe 4372 F7BE.exe 196 injector.exe 1800 2111.exe 976 2111.exe 4128 2111.exe 1312 2111.exe 4568 windefender.exe 920 windefender.exe 2984 build2.exe 2172 build2.exe 4672 build3.exe 2896 build3.exe 2968 9F89.exe 2976 mstsca.exe 2036 E4.exe 5040 mstsca.exe 4228 qemu-ga.exe 2216 ithdjhb 4788 mstsca.exe 64 mstsca.exe 3772 mstsca.exe 4864 mstsca.exe 1780 mstsca.exe 3616 mstsca.exe -
Loads dropped DLL 2 IoCs
Processes:
u104.0.exepid process 360 u104.0.exe 360 u104.0.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/4568-2028-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/920-2061-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exe2111.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\9e8ebbe8-66e4-44cd-ab77-89988f12705a\\2111.exe\" --AutoStart" 2111.exe Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 49 api.2ip.ua 50 api.2ip.ua 61 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
2111.exe2111.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 1800 set thread context of 976 1800 2111.exe 2111.exe PID 4128 set thread context of 1312 4128 2111.exe 2111.exe PID 2984 set thread context of 2172 2984 build2.exe build2.exe PID 4672 set thread context of 2896 4672 build3.exe build3.exe PID 2976 set thread context of 5040 2976 mstsca.exe mstsca.exe PID 4788 set thread context of 64 4788 mstsca.exe mstsca.exe PID 3772 set thread context of 4864 3772 mstsca.exe mstsca.exe PID 1780 set thread context of 3616 1780 mstsca.exe mstsca.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Windows directory 4 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.execsrss.exedescription ioc process File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3704 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3400 2172 WerFault.exe build2.exe 2284 2968 WerFault.exe 9F89.exe 4572 2216 WerFault.exe ithdjhb -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
F7BE.exetoolspub1.exeithdjhbdescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F7BE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F7BE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F7BE.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ithdjhb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ithdjhb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ithdjhb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u104.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u104.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u104.0.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2112 schtasks.exe 1480 schtasks.exe 1028 schtasks.exe 4240 schtasks.exe 1200 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exepowershell.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub1.exepowershell.exeu104.0.exepid process 1836 toolspub1.exe 1836 toolspub1.exe 3868 powershell.exe 3868 powershell.exe 360 u104.0.exe 360 u104.0.exe 3868 powershell.exe 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
toolspub1.exeF7BE.exepid process 1836 toolspub1.exe 4372 F7BE.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exed21cbe21e38b385a41a68c5e6dd32f4c.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exeE4.exedescription pid process Token: SeDebugPrivilege 3868 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 4968 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 4968 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 4064 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 4212 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 5100 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 3196 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 4108 powershell.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeSystemEnvironmentPrivilege 4064 csrss.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeSecurityPrivilege 3704 sc.exe Token: SeSecurityPrivilege 3704 sc.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeDebugPrivilege 2036 E4.exe Token: SeShutdownPrivilege 3408 Token: SeCreatePagefilePrivilege 3408 Token: SeShutdownPrivilege 3408 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u104.1.exepid process 1756 u104.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exed21cbe21e38b385a41a68c5e6dd32f4c.exeInstallSetup_nine.exeu104.1.execmd.exed21cbe21e38b385a41a68c5e6dd32f4c.execmd.execsrss.exe2111.exedescription pid process target process PID 2232 wrote to memory of 1300 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe InstallSetup_nine.exe PID 2232 wrote to memory of 1300 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe InstallSetup_nine.exe PID 2232 wrote to memory of 1300 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe InstallSetup_nine.exe PID 2232 wrote to memory of 4968 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2232 wrote to memory of 4968 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2232 wrote to memory of 4968 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe PID 2232 wrote to memory of 3444 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe rty25.exe PID 2232 wrote to memory of 3444 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe rty25.exe PID 2232 wrote to memory of 1836 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe toolspub1.exe PID 2232 wrote to memory of 1836 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe toolspub1.exe PID 2232 wrote to memory of 1836 2232 1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe toolspub1.exe PID 4968 wrote to memory of 3868 4968 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 4968 wrote to memory of 3868 4968 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 4968 wrote to memory of 3868 4968 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 1300 wrote to memory of 360 1300 InstallSetup_nine.exe u104.0.exe PID 1300 wrote to memory of 360 1300 InstallSetup_nine.exe u104.0.exe PID 1300 wrote to memory of 360 1300 InstallSetup_nine.exe u104.0.exe PID 1300 wrote to memory of 1756 1300 InstallSetup_nine.exe u104.1.exe PID 1300 wrote to memory of 1756 1300 InstallSetup_nine.exe u104.1.exe PID 1300 wrote to memory of 1756 1300 InstallSetup_nine.exe u104.1.exe PID 1756 wrote to memory of 3024 1756 u104.1.exe cmd.exe PID 1756 wrote to memory of 3024 1756 u104.1.exe cmd.exe PID 1756 wrote to memory of 3024 1756 u104.1.exe cmd.exe PID 3024 wrote to memory of 2808 3024 cmd.exe chcp.com PID 3024 wrote to memory of 2808 3024 cmd.exe chcp.com PID 3024 wrote to memory of 2808 3024 cmd.exe chcp.com PID 3024 wrote to memory of 2112 3024 cmd.exe schtasks.exe PID 3024 wrote to memory of 2112 3024 cmd.exe schtasks.exe PID 3024 wrote to memory of 2112 3024 cmd.exe schtasks.exe PID 2816 wrote to memory of 1116 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 1116 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 1116 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4488 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe cmd.exe PID 2816 wrote to memory of 4488 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe cmd.exe PID 4488 wrote to memory of 3892 4488 cmd.exe netsh.exe PID 4488 wrote to memory of 3892 4488 cmd.exe netsh.exe PID 2816 wrote to memory of 4064 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4064 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4064 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4212 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4212 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4212 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe powershell.exe PID 2816 wrote to memory of 4064 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 2816 wrote to memory of 4064 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 2816 wrote to memory of 4064 2816 d21cbe21e38b385a41a68c5e6dd32f4c.exe csrss.exe PID 4064 wrote to memory of 5100 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 5100 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 5100 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 3196 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 3196 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 3196 4064 csrss.exe powershell.exe PID 3408 wrote to memory of 4372 3408 F7BE.exe PID 3408 wrote to memory of 4372 3408 F7BE.exe PID 3408 wrote to memory of 4372 3408 F7BE.exe PID 4064 wrote to memory of 4108 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 4108 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 4108 4064 csrss.exe powershell.exe PID 4064 wrote to memory of 196 4064 csrss.exe injector.exe PID 4064 wrote to memory of 196 4064 csrss.exe injector.exe PID 3408 wrote to memory of 1800 3408 2111.exe PID 3408 wrote to memory of 1800 3408 2111.exe PID 3408 wrote to memory of 1800 3408 2111.exe PID 1800 wrote to memory of 976 1800 2111.exe 2111.exe PID 1800 wrote to memory of 976 1800 2111.exe 2111.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe"C:\Users\Admin\AppData\Local\Temp\1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\u104.0.exe"C:\Users\Admin\AppData\Local\Temp\u104.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:360
-
-
C:\Users\Admin\AppData\Local\Temp\u104.1.exe"C:\Users\Admin\AppData\Local\Temp\u104.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:2112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- DcRat
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:3892
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1480
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:196
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:1028
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:1012
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"2⤵
- DcRat
- Executes dropped EXE
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\F7BE.exeC:\Users\Admin\AppData\Local\Temp\F7BE.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4372
-
C:\Users\Admin\AppData\Local\Temp\2111.exeC:\Users\Admin\AppData\Local\Temp\2111.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\2111.exeC:\Users\Admin\AppData\Local\Temp\2111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:976 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\9e8ebbe8-66e4-44cd-ab77-89988f12705a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\2111.exe"C:\Users\Admin\AppData\Local\Temp\2111.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\2111.exe"C:\Users\Admin\AppData\Local\Temp\2111.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build2.exe"C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2984 -
C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build2.exe"C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build2.exe"6⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 20847⤵
- Program crash
PID:3400
-
-
-
-
C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build3.exe"C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4672 -
C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build3.exe"C:\Users\Admin\AppData\Local\1d11d2b2-5ee1-43b9-a043-f95908ba78db\build3.exe"6⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
PID:4240
-
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:920
-
C:\Users\Admin\AppData\Local\Temp\9F89.exeC:\Users\Admin\AppData\Local\Temp\9F89.exe1⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9882⤵
- Program crash
PID:2284
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2976 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\E4.exeC:\Users\Admin\AppData\Local\Temp\E4.exe1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"2⤵
- Executes dropped EXE
PID:4228
-
-
C:\Users\Admin\AppData\Roaming\ithdjhbC:\Users\Admin\AppData\Roaming\ithdjhb1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 4842⤵
- Program crash
PID:4572
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:64
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3772 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:4864
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1780 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:3616
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5267f3fbb231876ea1b3de1b8aaea1917
SHA1df0843fb7137e7e81e449ba3c05168fe892ffa78
SHA2565157427e4c6e429f14a19cec39e30d37b17040ca86886879c0315d157e7b90d5
SHA512dec882dbb4505cce10525f935a90c2a87552ddc08701e3faa8de7561dea23f4c029142154b6818e0a50599a2e3341fb12b5c4554d06a0ee5f2ab07941eeecc61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5856c6f761e9ae81c8792298cdce1e323
SHA13fef81b2b32f53435ca9106e0369205bf043ab02
SHA25699b51aed617386db40324e48eab43a11de07048d14feffe98dd1214cebda8727
SHA5126353aa47a1a6501899525d243dbb91d38b727c7d57598eb96d92f020184d98520f57574a43897675c21bbf3a7401757a6e069159f05f11067454bc2595dd9466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD57ae0d94dd14527c4eab91e0b284141f7
SHA14893a78c47394ad618d70e72b8aa3a6181375e62
SHA256fc1c396cb14e9c768d5724685d66ccc5b9449005825e2632936cc13bc15574bf
SHA512959b147537bb87d754ff174b956f9f875db94a400656e6570e895f5f2a555ce62e034b94f2b6f3236ad97df1e694db43090770d9bd06dfd947ca28ff1bd1ad83
-
Filesize
332KB
MD5a0cc1241aa4803dc23ff778af73e3768
SHA175d07c8f1784e8e64e7520c2666bc63c2a477ffa
SHA256c0b12bbdcb41f6941d4356309fd8a43f61cbfd18eee044ff1771cbdbba248466
SHA5123ccb46eca07827f5c86b31da5f7ab1b4a4b80f0cf3c1f8245c9ea57cf7c2244bc5f867a09696ce1c80cce38c631c7f6a13dca537b8e4b297735324f52cabb755
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
733KB
MD55b127dfb33460a1a7f49309e53e5074c
SHA12f372ad5bfe1395f703dfe0f63980bad366c726e
SHA256e701ffa4d637b5a0dce41b547d1c7447a9fdc36198cd83c22a22a983ea828d40
SHA512900a9ad9ac8c4dcc6db655d38498b2c2480a4525adfb590ed726d32ca876d89c6dc0565ec370e6a0b06eabdb2e14745c7a7e2b62e49fc05d5ab1354296eb785f
-
Filesize
6.0MB
MD595e59305ad61119cf15ee95562bd05ba
SHA10f0059cda9609c46105cf022f609c407f3718e04
SHA256dd87f94c961b9612bbd65761bee6ed15318d63652f262e2c425bd177a2341a19
SHA5125fbcfe79162460080e0c3944df747835f0b8f2cdb35b038eb69eadf2eb85a209f7d5432a328d0f0eeafba036012f48793e3c08d94531b98a12a498bcf3b00ad2
-
Filesize
649KB
MD535ffefa212414c2538df410e5ad3afa7
SHA1e7721fbb85e400c74c7f4de95f1c27b6318caabd
SHA2569217999518147c602f16ed7d80c9b95dec621f442192ce49192736a27e73847f
SHA5127bf9ffe99588a1e6e01a6c84fee7bd998b337653c908e33d3c10f1aa9abc7af925ca9d86a884099824133947614aa070181c973b220163dd99dde87765152a25
-
Filesize
234KB
MD5d1b4b083e0ea20a087018bde31c37a75
SHA1fe5a597a8a0dcf26204e99ef8f7abf2c9359e47f
SHA256a578ab8f490d32d4ec916f02ce6ed22ef4572bf21db481dcce5b1b2ccf228d92
SHA51230d41aa90f517119ac77ac0cc9fc86d6f17ccde315dfd05cdbbc7b27e38039a3c2772583c8cf206c21f5a92980cbf1a64f759b364529f88cbdaaa4d85350eb6d
-
Filesize
419KB
MD5654abe1db0f972272b5b012914d9e5d6
SHA11ac7b42167369dcfa528837f13a2c80de7bcc161
SHA2565f2bdf7f83ab075f7dafaf7493cbf4ab08d2e79b95cd3382621acfe73ba96094
SHA51218823ab8a9a160ac169052ec210e6adb356190dc0644c8b5fd6f5ccbc8de2666c5e9d44ef90c954d5b6e948c81ef2666900c0fe40b7d5e4b644a39e8b93c1a12
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
4.2MB
MD566560a15081c9dee9fed498d5f0a25a9
SHA1fbd7626525777262423fb9beea1e5b7e50fda2b5
SHA25611e2cfb1fb58a3f69826d5bc36e88fde44c53def20891739ea7054eaabf24551
SHA512dbd84583c6248db88452ef12074aa668ee982a9fe18484611a1b6d67a7233f9f3fca466bc843dfbc227099a5fd67af24c98f2d5408b26f8cf9fd635f7c70ba07
-
Filesize
715KB
MD58dc1f88ae1fcedeb3983c5f5c3d486b0
SHA1d40e67ba5558d90cb11eeca04d213322159336fc
SHA2564a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca
SHA5120b2263fe049e280af1178fd396a06a04e6b99f7c971839207ae225161257ed9d9b7eaa8d0ceb1f14d3aa2094b53ce91dd045ebc169102e707ea7285f91432ac1
-
Filesize
238KB
MD58c20d9745afb54a1b59131314c15d61c
SHA11975f997e2db1e487c1caf570263a6a3ba135958
SHA256a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
SHA512580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
Filesize
245KB
MD56bcb57185d8d60e412c18a77c073c282
SHA130dfe3fe86a5262fa6541f9f341dbf64257b3cd1
SHA256273c007885a368407eb619a50c605396aa279e46c5ab89de04a0e75540a157c4
SHA51237eeaf3bb36ecfea89cd800f8bdff9b821b76c557f503f84da5ca36e4ddea0fb06b493e13cbb4bb1e70827eb07ec2329c9d3fa8d270a716b7009e9dcd19332ef
-
Filesize
4.7MB
MD55e94f0f6265f9e8b2f706f1d46bbd39e
SHA1d0189cba430f5eea07efe1ab4f89adf5ae2453db
SHA25650a46b3120da828502ef0caba15defbad004a3adb88e6eacf1f9604572e2d503
SHA512473dfa66a36feed9b29a43245074141478327ce22ba7cce512599379dcb783b4d665e2d65c5e9750b988c7ed8f6c3349a7a12d4b8b57c89840eee6ca6e1a30cd
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f37d198bc3d134c79059c4adbea0b5a9
SHA18364cda4965e7c9434b41f697cfefb9ab622fbdb
SHA256d43eb1f853ab99b7abb548c00025e7c21765dc5ad23ea13080d96b5b99673f28
SHA512eb9172a3eaf5d723cfbbd1e23a24b1eb8ba07eca1f3bcf31e808764e4a0caf3c9ef6fcac2cb0f645592cb51278d709b22a7874ffe5fab4cba84c3be67b51b96e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD589fe82ac7acd9d0769e89287a5445459
SHA117f822ffd5da59d8d724f4f60586c04d174c4901
SHA25600a60cb9eb9d8d983cd92cacbb375c34dbbc865a9aa9715c75349219564de3b7
SHA512a92d3e45ead2846c995c6dc79e7501c3ab7448da9534f18429ca6d7270fe2f7e352ad4a544d5b9c4d18435fcd980a59fcb8c3c849901c2308c2e7abd63e0cca8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f3e59a3f1cc710d969a7b13ecd179235
SHA1285bcbf19b8ec30b3578fc57df82ac122eba3d1e
SHA2565532d685dbc8ee777c7f1e05c8f511899e2902bb4a2642b612c4a5227f10e470
SHA512f42ff5e331e862252b6afd9e74a45517b0723c3695ed450d50a6a2a4550c58e32cfae1033247f838fbe39d9239b580521de14b36ab131e87e24dd1d20380c734
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b59017a8c30d7006d85ced2c9734eb50
SHA1fb6c933d88b75101f4f2ee79d9d2d09a89a6d121
SHA25667b72f157f829026c6c81abce46cab95972190061f45c2dc0c02394d48a71070
SHA5122337d25ee6593031405d2bbddec7f0ee6c4d1bddd9326326ba89991465f6855f27d30f385940383d0cbd418a195e8ba02002d76c554da9966f42d236551b50bf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51e7d302e65ee9fc9d3345f0017436189
SHA130b248e176ff275b11b00fba9ea6a19bfdad64be
SHA2564dc056c2cbdfd39cc5c164654ec3d3d3f55a0268714073c5a4e3ec040c66c5ad
SHA51275222732d94815c5fead9ac8436060f6605554e80ca139f343337fca0c60da2f1f94c1d6db1f96f1f2874ef8f8fe4df73f1f4ffb6a89896589b9155a8751bb1b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571