Resubmissions
25-04-2024 18:41
240425-xbtfwade97 1023-02-2024 00:25
240223-aqsrkahd35 1022-02-2024 20:52
240222-znqxmafa7x 1022-02-2024 17:28
240222-v17zfsdd86 1022-02-2024 17:13
240222-vrss6sdc92 1022-02-2024 17:01
240222-vjm8qadc33 1022-02-2024 15:57
240222-ted9ksce55 10Analysis
-
max time kernel
122s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
6958ACC382E71103A0B83D20BBBB37D2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6958ACC382E71103A0B83D20BBBB37D2.exe
Resource
win10v2004-20240221-en
General
-
Target
6958ACC382E71103A0B83D20BBBB37D2.exe
-
Size
232KB
-
MD5
6958acc382e71103a0b83d20bbbb37d2
-
SHA1
65bf64dfcabf7bc83e47ffc4360cda022d4dab34
-
SHA256
078f586ebb8a22305540fb5982b2521f1b82e4317f286e13bab680fff0a9d164
-
SHA512
ebfa8b6986630b3502409d38cdff54881e4bce48511c7ba4f027345296c29708112c19ec6c9181c4b0188fa1f5cbe17b3c5d44dc07f33858323c677ef9caaeae
-
SSDEEP
3072:FdfbYSFlTBL/A9OYh6++4hY7gfv9yPQxAVUmZAzsqvj1letKv/jbNRKCnrQbW:PbYSFH/AYYh9vERVUmSAQj1la9
Malware Config
Extracted
smokeloader
tfd5
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.lkhy
-
offline_id
OxV6DGl22io8sqMOW1zCCOlzPiv4f1Vqzw7Y8zt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-uNdL2KHHdy Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0851ASdw
Extracted
lumma
https://resergvearyinitiani.shop/api
https://technologyenterdo.shop/api
https://detectordiscusser.shop/api
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a8e0840e-b118-40a3-b971-b20f5d38d0bf\\BF98.exe\" --AutoStart" BF98.exe 380 schtasks.exe 4900 schtasks.exe -
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral2/memory/4568-22-0x0000000002600000-0x000000000271B000-memory.dmp family_djvu behavioral2/memory/2484-23-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2484-25-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2484-26-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2484-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2484-37-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4696-43-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4696-44-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4696-46-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 12 IoCs
resource yara_rule behavioral2/memory/5080-95-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral2/memory/5080-96-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5080-181-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5080-183-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral2/memory/5080-193-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3340-196-0x0000000002F30000-0x000000000381B000-memory.dmp family_glupteba behavioral2/memory/3340-197-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3340-245-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3340-293-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4092-400-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4092-401-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4092-410-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3216 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation BF98.exe Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation A5C6.exe -
Deletes itself 1 IoCs
pid Process 3256 Process not Found -
Executes dropped EXE 12 IoCs
pid Process 4568 BF98.exe 2484 BF98.exe 3600 BF98.exe 4696 BF98.exe 2220 8A8.exe 5080 9847.exe 4960 A5C6.exe 1040 A809.exe 4040 Upgrades.pif 3340 9847.exe 4092 csrss.exe 2880 rjfavwt -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4296 icacls.exe -
resource yara_rule behavioral2/files/0x000700000002323f-413.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9847.exe Set value (str) \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a8e0840e-b118-40a3-b971-b20f5d38d0bf\\BF98.exe\" --AutoStart" BF98.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 api.2ip.ua 58 api.2ip.ua -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Process not Found File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4568 set thread context of 2484 4568 BF98.exe 96 PID 3600 set thread context of 4696 3600 BF98.exe 102 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9847.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 9847.exe File created C:\Windows\rss\csrss.exe 9847.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4432 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3488 4696 WerFault.exe 102 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6958ACC382E71103A0B83D20BBBB37D2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rjfavwt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rjfavwt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rjfavwt -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 380 schtasks.exe 4900 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3896 tasklist.exe 5100 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 9847.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 9847.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 9847.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 9847.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3956 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 764 6958ACC382E71103A0B83D20BBBB37D2.exe 764 6958ACC382E71103A0B83D20BBBB37D2.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 764 6958ACC382E71103A0B83D20BBBB37D2.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 3480 powershell.exe Token: SeDebugPrivilege 1040 A809.exe Token: SeDebugPrivilege 3896 tasklist.exe Token: SeDebugPrivilege 5100 tasklist.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 5080 9847.exe Token: SeImpersonatePrivilege 5080 9847.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 4084 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 4308 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 4384 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 3608 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 3168 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeDebugPrivilege 1572 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4040 Upgrades.pif 3256 Process not Found 3256 Process not Found 4040 Upgrades.pif 4040 Upgrades.pif 3256 Process not Found 3256 Process not Found -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4040 Upgrades.pif 4040 Upgrades.pif 4040 Upgrades.pif -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3256 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 4480 3256 Process not Found 92 PID 3256 wrote to memory of 4480 3256 Process not Found 92 PID 4480 wrote to memory of 3876 4480 cmd.exe 94 PID 4480 wrote to memory of 3876 4480 cmd.exe 94 PID 3256 wrote to memory of 4568 3256 Process not Found 95 PID 3256 wrote to memory of 4568 3256 Process not Found 95 PID 3256 wrote to memory of 4568 3256 Process not Found 95 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 4568 wrote to memory of 2484 4568 BF98.exe 96 PID 2484 wrote to memory of 4296 2484 BF98.exe 99 PID 2484 wrote to memory of 4296 2484 BF98.exe 99 PID 2484 wrote to memory of 4296 2484 BF98.exe 99 PID 2484 wrote to memory of 3600 2484 BF98.exe 100 PID 2484 wrote to memory of 3600 2484 BF98.exe 100 PID 2484 wrote to memory of 3600 2484 BF98.exe 100 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3600 wrote to memory of 4696 3600 BF98.exe 102 PID 3256 wrote to memory of 2220 3256 Process not Found 106 PID 3256 wrote to memory of 2220 3256 Process not Found 106 PID 3256 wrote to memory of 2220 3256 Process not Found 106 PID 3256 wrote to memory of 2872 3256 Process not Found 107 PID 3256 wrote to memory of 2872 3256 Process not Found 107 PID 2872 wrote to memory of 1692 2872 cmd.exe 109 PID 2872 wrote to memory of 1692 2872 cmd.exe 109 PID 3256 wrote to memory of 5080 3256 Process not Found 110 PID 3256 wrote to memory of 5080 3256 Process not Found 110 PID 3256 wrote to memory of 5080 3256 Process not Found 110 PID 5080 wrote to memory of 3480 5080 9847.exe 111 PID 5080 wrote to memory of 3480 5080 9847.exe 111 PID 5080 wrote to memory of 3480 5080 9847.exe 111 PID 3256 wrote to memory of 4960 3256 Process not Found 113 PID 3256 wrote to memory of 4960 3256 Process not Found 113 PID 3256 wrote to memory of 4960 3256 Process not Found 113 PID 3256 wrote to memory of 1040 3256 Process not Found 115 PID 3256 wrote to memory of 1040 3256 Process not Found 115 PID 4960 wrote to memory of 536 4960 A5C6.exe 116 PID 4960 wrote to memory of 536 4960 A5C6.exe 116 PID 4960 wrote to memory of 536 4960 A5C6.exe 116 PID 536 wrote to memory of 3896 536 cmd.exe 118 PID 536 wrote to memory of 3896 536 cmd.exe 118 PID 536 wrote to memory of 3896 536 cmd.exe 118 PID 536 wrote to memory of 3572 536 cmd.exe 119 PID 536 wrote to memory of 3572 536 cmd.exe 119 PID 536 wrote to memory of 3572 536 cmd.exe 119 PID 536 wrote to memory of 5100 536 cmd.exe 121 PID 536 wrote to memory of 5100 536 cmd.exe 121 PID 536 wrote to memory of 5100 536 cmd.exe 121 PID 536 wrote to memory of 4152 536 cmd.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe"C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A96F.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:3876
-
-
C:\Users\Admin\AppData\Local\Temp\BF98.exeC:\Users\Admin\AppData\Local\Temp\BF98.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\BF98.exeC:\Users\Admin\AppData\Local\Temp\BF98.exe2⤵
- DcRat
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a8e0840e-b118-40a3-b971-b20f5d38d0bf" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\BF98.exe"C:\Users\Admin\AppData\Local\Temp\BF98.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\BF98.exe"C:\Users\Admin\AppData\Local\Temp\BF98.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 5685⤵
- Program crash
PID:3488
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4696 -ip 46961⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\8A8.exeC:\Users\Admin\AppData\Local\Temp\8A8.exe1⤵
- Executes dropped EXE
PID:2220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CCF.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\9847.exeC:\Users\Admin\AppData\Local\Temp\9847.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\9847.exe"C:\Users\Admin\AppData\Local\Temp\9847.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:232
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3216
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:4092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:380
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4076
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:4900
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1320
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2840
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4432
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A5C6.exeC:\Users\Admin\AppData\Local\Temp\A5C6.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Unlikely Unlikely.bat & Unlikely.bat & exit2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"3⤵PID:3572
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵PID:4152
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 221083⤵PID:3164
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Here + Td + Passwords + Movements + Cambodia 22108\Upgrades.pif3⤵PID:5020
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Meaning 22108\Z3⤵PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\22108\Upgrades.pif22108\Upgrades.pif 22108\Z3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4040
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.13⤵
- Runs ping.exe
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\A809.exeC:\Users\Admin\AppData\Local\Temp\A809.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
C:\Users\Admin\AppData\Roaming\rjfavwtC:\Users\Admin\AppData\Roaming\rjfavwt1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
216KB
MD54e9db9155039f5a6a04e16a6a6bfe3b0
SHA1b293c7fe05d7e92ce7d9cc6f36940eba14f5d460
SHA256bd3cd1801a2c226c63186f6fe3182fff1847609c5d99ca22209c7e9dbdd3db2d
SHA5128692e29ec7717ddad30ea365bd4408a178f1d3ff7f7c3535f8ba1545ffdcfe78ae108259d4feb81b1ca819eedf4ef79531103512d29f7fd0fd8146beb14e854a
-
Filesize
227KB
MD51e7e25167c2a8f93c2d176e935b21834
SHA195b93372222ebde1bed0e0efec167bdda7ef04bc
SHA256d022378a9b3074cf3fb5ea080588846c0aaadb2112cfd5554a0068e76cdd5736
SHA512503f7b6797182ed5f1ef42d3b52b2815e140ebed505fc9b81ee8f920e49c36f379881c1a51afb4b398c9577a583155a0d2c66ca6cdaf303ac9538746571efdb1
-
Filesize
577KB
MD5a6c58504594ab91fc0ca6102abd10e80
SHA103edc02d3806aa46d5e4c3c1aa8b6cff1b5c80f6
SHA256b07a3cb7f4af841db56d43b6d8d35aea563993b8e0ec6d921eab372f637260f7
SHA51207d68c06afc66c71b04da74d387536cd800f7dcda422f4b67dbff60ba2b883fa360e9292190655448fc130d1ebbeb31af828ee1ba279f904b2a7e556dbb8f1ea
-
Filesize
151KB
MD5d7563558933a24bd74f0254272cf7830
SHA16982d08318ff2204d3714ce12d68a99b4f726fe7
SHA2561b11dc628b44a4982b7b13891fae62471a380eb2973af359655cf65254ac5a7e
SHA512fccdc060fd5ddd9b3892f82c343dcd80fdbc1bc24a24c50e9f86a1d917867c2b4189a3d4d6762daf8e9c719b999988a0d568f481c09802c5168010c490fdfcb5
-
Filesize
207KB
MD5334f84837c9bcece9220e2c979503f68
SHA1bdbdc63f1b85f72f8cf487dec6aaeb98e352c283
SHA25610dfb698a8c05eff79092b546608c15e7df803d4aa759090509da6d5d96373d7
SHA51237c3315a16d9f0e8ab044415a61220e2fa180e6f70f85435de7ccd7d1dcde84a0c13d48f670204e02ba7cfbe892a76f2efa979717b6b2b844a15aea0a845dcbb
-
Filesize
123KB
MD5e32d058720e98d0fab73018ce1753b55
SHA1f6b431cf3f225c3563591fbec4af922f6bff05d9
SHA2561cf7bcef592ee857c079e82d39a1c371868597ee1c33e692556d780b5040b83b
SHA5128f259f0f2eccbe01dc4efe5d4ad34a94dcb0b97f20c3f36c6b7e6c24c14a73fbb6aeefc11e76142cdba83f9bf1dd4d0647bcd1ad2d3a6780e063c48d872caa11
-
Filesize
10KB
MD519bc1bbe515dee767f02d503fa9d2cff
SHA1acc900deea8e8eff4e1bda1ac2c89aa70ef0e7f9
SHA25651ad4dc19fa436ac00a8b019da9ca49f30dcfe31d9aee0aabbb037fd10bca367
SHA512fd0b3d6a867d8c7923d1166f546d4e14db0209df8d13dc46e9d08578ee78d4fc8739638e01f456f542cc383a2d086ed600931a8e889dcb1c4eb93d3cfe3a3dac
-
Filesize
5.6MB
MD5479342d62078aaf31881972c7574f6f2
SHA1382fa9a95746ca6199e7dfb9ae2bd035f4000fb4
SHA256a6b59e0a275b5314935a3f812a5ba7dd5d5cc9524d3a6efdeb3a103eea386f6d
SHA5120e74e3e0b993968220e712ffd94a76c00d35f0452494d62b3f6780c80cc0cae2e9982978830c54bed3a57d17a5a84abbdc4c0cbb5961afcae785048ac4ac47da
-
Filesize
4.1MB
MD5c9e01ab6208b39a9f1a1253dca7e89bc
SHA15bcba5cc0dc560772f8026cb6dd4f236acbfd8bb
SHA2560e1ccfee9b80ca2c36a53cc104ef5e8d3a702dabbcc1daafecca2a7f7db043b8
SHA5124cacf3f7794a8e06ca2da7aaa0bef37009206fde58a5d5ce4326ef84addd7bdbfd7477b437ac6a72fa31023c17e9a7f7079bb0e97ff772d880d090bbb96d1da1
-
Filesize
128KB
MD5ece62c9a4225735bbd34f8b0bc797acf
SHA1e354f308248dd81939ffc0b1bd756cbc758eae13
SHA25619ff68076a9879f0b78ed86818b6a4886527e71f8c5dcd1a6bfd9a6b394ffe6a
SHA5128113f871fab27614b9f9ed5f32c31312b34754c4e047e74eed958edd9d0e917c7f685d9b9c37379e3f273ce7fa98f660e3c655ee301a9ccbca34b372b96c6b0d
-
Filesize
3.1MB
MD550be07c44e47d88cd9d5b8462d4bc011
SHA1fdb3e7e5f46b7660cf0c2282fa941009781df627
SHA2565421065755f7a312ade0466963918c685f8de366c13247b2867a7fd3917d696d
SHA512f40b6563c3efa7652cafabaeb93bea4c2338afb03dacf655a0105d2e8b96910a47d1cb756bff410389703ecce464cd55d3bd9884365edf5bd6fa561ef9e0af25
-
Filesize
11KB
MD53d3ae7c2eddea19c3146543b95cdda7e
SHA1ea36133e7bfc1b57cd8e78a6daf24f59526ceba0
SHA2561f2a148765b1ef3247ca4312ea8d1460673744448ebd4559377eabd1ca1702f2
SHA5122ee471f0e0423610dbac9f9d472d529d0b9da22f7ca45ae973a80080920f9ac04342051ad16858918ac4bbab48068b16d78d4d177b8a029c21dde509e333c775
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
666KB
MD55648348e81a70ef7ab40f963b44713f6
SHA13e2d708a95de8e53ba4a6b9359cc0cc6dfcddea7
SHA2564bf966f6dd9cb739b073a8bc48f521eb9c35b4f050e799be6eac795fe615263d
SHA512899d833a1a43ca6160bfb89775c83a049afaa0e3e8cf48dde112f7de351d307fd194c97ffe3ab0c2e86fc7bb75ed3b3d53b0d95ea1fa80252020153ca4813a8f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
232KB
MD56958acc382e71103a0b83d20bbbb37d2
SHA165bf64dfcabf7bc83e47ffc4360cda022d4dab34
SHA256078f586ebb8a22305540fb5982b2521f1b82e4317f286e13bab680fff0a9d164
SHA512ebfa8b6986630b3502409d38cdff54881e4bce48511c7ba4f027345296c29708112c19ec6c9181c4b0188fa1f5cbe17b3c5d44dc07f33858323c677ef9caaeae
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5da81748d347711407a31e7ea5fef66dc
SHA11f0a4a7b9d8892fa34a7569ce323183d564fbea3
SHA256cd1f7873de189b7c34e7b2e407d8b268ed0ead2a6a65ce5a145413a1f8804111
SHA512985d2b955a2e2021af859b71610f9edd5e3928775b7d23414168bde45690e16d4890b1dde0691b46e2a9cc57a4014dab790098926e1c3ef16ca1eb8b0c0d1516
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d8d1797059f662603821d6a51032a0b4
SHA1da78a56bfd5c5b5a8dbeb70035c8dcd72f973779
SHA256bff9fa28def49691f88fb266a22a78aec9b843ddc71fbf11717a5738b4cdb86d
SHA5125bbae5d8bbbc0c59ca117c498f127eb5df7c40872938471adabfdc54cecc9c3d5096f63c79ca7caf1318a401bd0d4bf80fbc84fcc5af7733fa65269f52668822
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58a783818152b8ca1b50a7ffe53c1a906
SHA179fa580d6e772f76c856e07e8c748314c1e27926
SHA25626d3adf7093d808ba85a9a26182488fcb11e721594a159ad26be1b2790df55e5
SHA512f821b31dd01c66e24229885783e20b1c74a167a261baaadf9a85c3f83ec1bd187019bee97a8d63063e67a17a92d145a5126fccc39548a2d4144d8f75d232da85
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59d25225958b4aa7dee7fd90644821309
SHA1588edfafac9e69757867d4c37749c1cb8ce8a5a8
SHA25636f08cb16f7cbcb6ddfdd049983c54e195756c32717c641cf3ea1faa339dcb15
SHA5121ba68a164746d83b830c94fa133f4074a3e0b7f3e841beede380ec8a0f3f3cba678fad080e8c28d4a1324798f8191d84f4565ca58b6b2b41d4b5f57d4eca401a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b4901204e06572a0563ed0a8893c1dc5
SHA1d488d30d7fb96b4b9a96cdf2f5b5d6599a6eb50a
SHA256bae5e8b8ee49f6557570ff871d5d1cd4ca26629ba2efca4fd9f3960d74789159
SHA5127cd07b3db4741689889508cfe855c2a1107e39567822712001cbe69c6db719b3b427641cbf80568e835b8b6b2d9f2290435e077537700ef8c068981a7e3f7694
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec