Analysis
-
max time kernel
123s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
f44d23b0b845ca4388424f9d5be32890.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f44d23b0b845ca4388424f9d5be32890.exe
Resource
win10v2004-20240226-en
General
-
Target
f44d23b0b845ca4388424f9d5be32890.exe
-
Size
283KB
-
MD5
f44d23b0b845ca4388424f9d5be32890
-
SHA1
d46eac4684455e34a396eba79ddb01441359ebb6
-
SHA256
067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46
-
SHA512
a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede
-
SSDEEP
3072:c+tpp4K1PAppyBA1Q8EkKXU1iKL4i2Dva2ICXIIKcKU1KpVT/wV9tmX3m:cud14pEWC5/Hi2KCY5mUpVTEy
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
20.218.68.91:7690
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://associationokeo.shop/api
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 2 IoCs
resource yara_rule behavioral2/memory/4064-360-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4064-440-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2488-133-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FA6E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ F721.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 179 208 rundll32.exe 189 2900 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4820 netsh.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F721.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F721.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FA6E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FA6E.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation CFC3.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation InstallSetup_four.exe -
Deletes itself 1 IoCs
pid Process 3352 Process not Found -
Executes dropped EXE 19 IoCs
pid Process 800 F721.exe 3796 FF9E.exe 2472 explorgu.exe 3912 7D0E.exe 1140 osminog.exe 3460 goldprime123.exe 532 7D0E.exe 1372 CFC3.exe 500 InstallSetup_four.exe 4864 D736.exe 4064 288c47bbc1871b439df19ff4df68f076.exe 3468 D736.tmp 3576 emailboxorganizer.exe 1564 emailboxorganizer.exe 3980 FA6E.exe 3316 udw.0.exe 2088 288c47bbc1871b439df19ff4df68f076.exe 3452 1470.exe 5028 udw.1.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Software\Wine FA6E.exe Key opened \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Software\Wine F721.exe Key opened \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Software\Wine explorgu.exe -
Loads dropped DLL 6 IoCs
pid Process 2652 regsvr32.exe 532 7D0E.exe 2132 rundll32.exe 208 rundll32.exe 2900 rundll32.exe 3468 D736.tmp -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/532-153-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-155-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-157-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-158-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-151-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-159-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-160-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-213-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-320-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/532-415-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/files/0x000800000002340f-500.dat upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 7D0E.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 FF9E.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 800 F721.exe 2472 explorgu.exe 3980 FA6E.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1140 set thread context of 4296 1140 osminog.exe 117 PID 3460 set thread context of 2488 3460 goldprime123.exe 120 PID 3912 set thread context of 532 3912 7D0E.exe 121 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job F721.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2868 500 WerFault.exe 130 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1470.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1470.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1470.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 udw.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString udw.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4484 schtasks.exe 1496 schtasks.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4412 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2452 tasklist.exe 4908 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 f44d23b0b845ca4388424f9d5be32890.exe 2860 f44d23b0b845ca4388424f9d5be32890.exe 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found 3352 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2860 f44d23b0b845ca4388424f9d5be32890.exe 3452 1470.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeDebugPrivilege 3460 goldprime123.exe Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeDebugPrivilege 2488 RegAsm.exe Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeDebugPrivilege 568 powershell.exe Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeDebugPrivilege 2788 powershell.exe Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeDebugPrivilege 4064 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 4064 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeShutdownPrivilege 3352 Process not Found Token: SeCreatePagefilePrivilege 3352 Process not Found Token: SeDebugPrivilege 4052 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3352 Process not Found 3352 Process not Found 800 F721.exe 3468 D736.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5028 udw.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 800 3352 Process not Found 103 PID 3352 wrote to memory of 800 3352 Process not Found 103 PID 3352 wrote to memory of 800 3352 Process not Found 103 PID 3352 wrote to memory of 3796 3352 Process not Found 105 PID 3352 wrote to memory of 3796 3352 Process not Found 105 PID 3352 wrote to memory of 3796 3352 Process not Found 105 PID 3352 wrote to memory of 1872 3352 Process not Found 111 PID 3352 wrote to memory of 1872 3352 Process not Found 111 PID 1872 wrote to memory of 2652 1872 regsvr32.exe 112 PID 1872 wrote to memory of 2652 1872 regsvr32.exe 112 PID 1872 wrote to memory of 2652 1872 regsvr32.exe 112 PID 3352 wrote to memory of 3912 3352 Process not Found 114 PID 3352 wrote to memory of 3912 3352 Process not Found 114 PID 3352 wrote to memory of 3912 3352 Process not Found 114 PID 2472 wrote to memory of 1140 2472 explorgu.exe 115 PID 2472 wrote to memory of 1140 2472 explorgu.exe 115 PID 2472 wrote to memory of 1140 2472 explorgu.exe 115 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 1140 wrote to memory of 4296 1140 osminog.exe 117 PID 2472 wrote to memory of 3460 2472 explorgu.exe 118 PID 2472 wrote to memory of 3460 2472 explorgu.exe 118 PID 2472 wrote to memory of 3460 2472 explorgu.exe 118 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3460 wrote to memory of 2488 3460 goldprime123.exe 120 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 3912 wrote to memory of 532 3912 7D0E.exe 121 PID 2472 wrote to memory of 2132 2472 explorgu.exe 123 PID 2472 wrote to memory of 2132 2472 explorgu.exe 123 PID 2472 wrote to memory of 2132 2472 explorgu.exe 123 PID 2132 wrote to memory of 208 2132 rundll32.exe 124 PID 2132 wrote to memory of 208 2132 rundll32.exe 124 PID 208 wrote to memory of 2060 208 rundll32.exe 125 PID 208 wrote to memory of 2060 208 rundll32.exe 125 PID 208 wrote to memory of 568 208 rundll32.exe 127 PID 208 wrote to memory of 568 208 rundll32.exe 127 PID 3352 wrote to memory of 1372 3352 Process not Found 129 PID 3352 wrote to memory of 1372 3352 Process not Found 129 PID 3352 wrote to memory of 1372 3352 Process not Found 129 PID 1372 wrote to memory of 500 1372 CFC3.exe 130 PID 1372 wrote to memory of 500 1372 CFC3.exe 130 PID 1372 wrote to memory of 500 1372 CFC3.exe 130 PID 3352 wrote to memory of 4864 3352 Process not Found 131 PID 3352 wrote to memory of 4864 3352 Process not Found 131 PID 3352 wrote to memory of 4864 3352 Process not Found 131 PID 1372 wrote to memory of 4064 1372 CFC3.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f44d23b0b845ca4388424f9d5be32890.exe"C:\Users\Admin\AppData\Local\Temp\f44d23b0b845ca4388424f9d5be32890.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\F721.exeC:\Users\Admin\AppData\Local\Temp\F721.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:800
-
C:\Users\Admin\AppData\Local\Temp\FF9E.exeC:\Users\Admin\AppData\Local\Temp\FF9E.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3796
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\35B3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\35B3.dll2⤵
- Loads dropped DLL
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\727153400192_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe"C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe"2⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\onefile_4776_133546122132187968\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe"3⤵PID:3984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:2832
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"4⤵PID:3900
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer5⤵PID:744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"4⤵PID:1784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:2824
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:2452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"4⤵PID:2164
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer5⤵PID:3020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:3752
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:1596
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:4908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7D0E.exeC:\Users\Admin\AppData\Local\Temp\7D0E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\7D0E.exeC:\Users\Admin\AppData\Local\Temp\7D0E.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\CFC3.exeC:\Users\Admin\AppData\Local\Temp\CFC3.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:500 -
C:\Users\Admin\AppData\Local\Temp\udw.0.exe"C:\Users\Admin\AppData\Local\Temp\udw.0.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\udw.1.exe"C:\Users\Admin\AppData\Local\Temp\udw.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵PID:4660
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:4444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:4484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 500 -s 15723⤵
- Program crash
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
PID:2088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3976
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4820
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1628
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:884
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3812
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:5092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:2160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D736.exeC:\Users\Admin\AppData\Local\Temp\D736.exe1⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\is-D97TA.tmp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\is-D97TA.tmp\D736.tmp" /SL5="$9017E,1714247,56832,C:\Users\Admin\AppData\Local\Temp\D736.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3468 -
C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe"C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe" -i3⤵
- Executes dropped EXE
PID:3576
-
-
C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe"C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe" -s3⤵
- Executes dropped EXE
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\FA6E.exeC:\Users\Admin\AppData\Local\Temp\FA6E.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3980
-
C:\Users\Admin\AppData\Local\Temp\1470.exeC:\Users\Admin\AppData\Local\Temp\1470.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 500 -ip 5001⤵PID:2132
-
C:\Users\Admin\AppData\Roaming\eiarrsgC:\Users\Admin\AppData\Roaming\eiarrsg1⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.9MB
MD5624ac460f358aafa2a0537e7b28e112c
SHA1069b80a456b5d7915db336f8e14b5c31b7c73704
SHA25685e83804521d4f88d7ba520e99af05712600cc39fd612592b72b93ee6000b6f5
SHA5122685a3b345f49c34942f9895053449aba28b00c3603910a625f2f5df7f2de2623b612a377133aa766c3cef6ea7dc537cd77a633c4d7782c53192b1497473e765
-
Filesize
318KB
MD569c8535d268d104e0b48f04617980371
SHA1a835c367b6f9b9e63605c6e8aaa742f9db7dcf40
SHA2563c74e8c9c3694e4036fea99eb08ba0d3502ad3fe2158432d0efdfaacd9763c35
SHA51293f35aa818391d06c4662796bec0dced2dc7a28b666c5c4bf6a6f68898ed52b77fa2ac7dd031b701b1ab8ae396e8941ade4ef0159765419788034742534a0c9e
-
Filesize
555KB
MD5e8947f50909d3fdd0ab558750e139756
SHA1ea4664eb61ddde1b17e3b05e67d5928703a1b6f1
SHA2560b01a984b362772a49cc7e99af1306a2bb00145b03ea8eca7db616c91f6cf445
SHA5127d7f389af526ee2947693983bf4c1cf61064cfe8c75a9708c6e0780b24f5eb261a907eeb6fedfaefcd08d8cddc9afb04c1701b85992456d793b5236a5a981f58
-
Filesize
2.1MB
MD5ff3281a231d33ebac7da40ab73e5061c
SHA1d3529b1c69adb69d61a937cf1f19275d3503ce9f
SHA256af77f9f57d25c1e9753be1f5b5776df132df1a1ec5abfaf4cd8d6729bb73b105
SHA51280234dd4f081e134c179224978a04988b6c5e7a1867488f0818c26b178fad1c91fd737b2e073c0e5642223fdaf969b53ca0ff9bd9f6c4065a817c6ade1493f00
-
Filesize
3.8MB
MD5fe090dab01cbe8df0c4347d54d8684c8
SHA162204a53dc3814436c0f4476ec2647a48c2bdb48
SHA256bc2cc74a4e25594ca95e7439831d96d1d962eb43cf9734665bc76c5976579ea5
SHA512061dfddc837f657be1858a6bc90eeb60586e8ee7c68f428ef1eb6134dd84e759669c34342ba960e5ea660a51fae65eae30fe9b6b59fc04ccf4e816973ad3e24f
-
Filesize
283KB
MD566901f8020ccd8b99cb1000ba1b12644
SHA1852615fdbcc56969a83c66964fc98fb1a4970313
SHA256209308a7011b49365b1e6172b040a0ee3a0c56706ad9ab62f94537091a8d9b83
SHA512aa2263357c27b2973a500495c005b9e6ca5efb0e6df2018db131906af233a7a4f41cfc1fe37422d1180f5934bc379b20f362f0197967d7c48c648731aaa07194
-
Filesize
2.2MB
MD577b7a92f2fba9f8cb9e7a30f1534bd33
SHA104cdef584a96e981d90568784e9dd67b409133d9
SHA256ff2bd96978c30eeb7741366c4cb1782ef5efed9d84afaea33222d65797fbe2a8
SHA512bafcdb81459d375024fa1a0219ff28979265f4541a19c3d04789f56d7f9ea600981d29e68867c520919af3c58de7ca23a250c29ce15b0425553485e02d47e48c
-
Filesize
2.1MB
MD5834907ca03a771049a8d409a156e2386
SHA1f0bc96a53fd6ef4414ccc18d74c6481d6f95c7be
SHA256f5c1b18c340668d9adb063984f35550c2ecd4bb448da19d8d764ca3bb8134861
SHA512047b0ce7ea5b4ecd6d2a8d677aa4703a42e21a4e93de5f30006ce5bc121181510935837ac9c793d0212419d220e265d5bbefce9c4fbe53af7f6826ccc0108591
-
Filesize
1.2MB
MD5d74c7c9ff06b3952b3513e0bc8d294d9
SHA1fcdc983eb4a973a4e82f0ded3db257f91965dd33
SHA2567d6b47f4e34883ab2904cb8a1318bf34ff8c2bb17141133538d900d2599e2fdf
SHA512020bb393bf611aa857779f04ca9477e159e222b1c6db3e123734e8a0e54c2aaeba7960a1990e0bd29a51cee3ae0def1b5008720dd10aaaa4869530b8de980795
-
Filesize
1.1MB
MD5b3f3819aebd1787d057fffc3f33c7e0c
SHA134c12f557d0d1c42c20ee68f509d13ee87dd620b
SHA256d9cef1fb3799cad926779232aa6d0771afcf95a0ec460ba326f19c869dace000
SHA512314894bbc58582199d374001275b835edb55d2dfff8c3cd563772237d749d6c4e2bae689a895439cbcea56096b18878baf22b77b64ad03d05a6d978d49b8c119
-
Filesize
832KB
MD54d82d0e88ec8236ae11cb9cd35b39a52
SHA1caff9c44afdc8ca9a7d20886b67c6f9645849842
SHA256bec05b1869f3f7a1139de0f72764da8035b926d8d048b73b7b50b0565a846f9c
SHA51258ff9ecd6c1f2d0fd0e5411fbdf7dfd2a0e47a0f64f6d6276ea97ffcc2d1ed1bfada9bf5da616d82343883eda7e34e3d2ee96e275d25ab7b7bf0568c24fe241d
-
Filesize
2.8MB
MD5b0fb18cfcac1983582e7fd67b2843ce8
SHA1ca29cf7cee80be38c5d667d5e8c00e6ea11b3294
SHA2564132c2587cfe85b944d95835d8d0bf92a08a0f831ea26a45c826146048347f45
SHA5124d9e1b14ef1a8adc15d38846c0a4e1d762e76fd944c76621ef6ac3a8482d14e40cfd4d7a14853d7a99cca2a99aa438eba996e842f1172f5f9a8f34ba1d97daf9
-
Filesize
2.6MB
MD5c63047bd54d6fe5f1e767bdd972d5632
SHA18b735fe171834d13ee767b48d23f9f25c6d365fd
SHA2561b11737404b8c0327069d9e2c5d85ab89d15bbed4b0643a473c461740cd95d87
SHA512c30d5993bd553df1296f929d5589a045406e9f493597e128059cc8ed303165a1972ae37d787dad57e35f9932898359cb8bdd92fd9718f370fcf0c65041589439
-
Filesize
5.0MB
MD54faef38fb30bc46302d62e532c4c5dff
SHA15154eaeb59d044a2f3e3c8c988731ad175430261
SHA256e8885e19602b3f9d0d7e2a9a7bce375af05cfc820587d0768ffaec173ed2d831
SHA51281238c5bd6ebe50537d56114984191e27248a56135d53e078a52894058bb2fbcc0de402206e6459f7cdecd85aad75880a75b362ae56909849a3e71c9986f40a5
-
Filesize
1.8MB
MD5996c2b1fb60f980ea6618aeefbe4cebf
SHA1a8553f7f723132a1d35f7a57cae1a2e267cbc2ac
SHA256f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50
SHA5124af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056
-
Filesize
4.4MB
MD5f3fdde1bac850ed065bde5e3a03e12e2
SHA12bfafa4134452425fdd5ad734c07383abdb90194
SHA256f96c472e92984d1391d5177f4bc9512116a3c6b59305c908beced9b6f5b8d5bd
SHA5123b375fcc90c17338dc71a68981fbe3b05e1135693be7386bd479a921070bd990087cf1659acc4c3d7ab568739bcad1d9a6cf9b20fe67ed858cd514596a57755f
-
Filesize
2.0MB
MD5e8b5e79bfcf6676adbad4b286df73d89
SHA19ee8ef9956a6a6f25cc887f442a597cca2a61575
SHA256985e179ac7076905f3c0e12c02399feb49d450c6d4d701ff4fd364de2eb38b77
SHA512a9a8aff7e1f065b2270d04061fc58c52564e574246bcb63b9e7d9475a59b70e956222d975326c63d897a6b41d332185ae56fe5f04d79331865792d965ebf020b
-
Filesize
1.7MB
MD5c4b94a733a873b889d69aafd11affbac
SHA1e0596c40e9d437908e7b4339717ac2d0b972e938
SHA2568039b9d33f042b46c3781e589348b08bc572ac1868ee29101ffc0e20c4d5fcbe
SHA512c7a56cddca8920de6e5472682b2194fd3de05bc76cc81a7f00d7fb9cb1f7e3434457eed95b9cb36ea765c3a289a0173b66560dd53cf0d61340744dcc15adf584
-
Filesize
1.8MB
MD53bf261c0a00e880ee85c3e5d53f46e1e
SHA10e22830cd59a76ba4e7da643d1a4054deea4c7e5
SHA256d0f4716356c11256ce372336dee85883a2696134f28b7b123e6fb76a6bf7fa3a
SHA512538243d1b37f2b74c3fa5ab2d04ca379f743b758c268f11b5b16e2797427b3029ecf54896b9b5c0e67a7ae0c0de0c29cdb1f7f6ebb54aa059a4b1f3fbcab0d55
-
Filesize
554KB
MD5a1b5ee1b9649ab629a7ac257e2392f8d
SHA1dc1b14b6d57589440fb3021c9e06a3e3191968dc
SHA2562bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65
SHA51250ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b
-
Filesize
331KB
MD54d07092a87d4212cd8b2bf4d7576c1a0
SHA1bf5fe8140ff117b171efda94b25a5cd52e6c276d
SHA256c659350d81f9bed61a7c300cf55ad211230a337a624424c0379f589de2bb20a1
SHA512d1fe5eb758db5a34bd846c08e5240e0473b72b2604b846b5cfefa10c3b2ed7b0e948ccc26fddafa646ee526082b1445454f740767faa7488268082505b144bb4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
690KB
MD54df57aaf92a50f25127408e03415e9ae
SHA18f7670cfae2f405be830c8ec5f06856358d301a1
SHA256d247810adf596b210b373af971bfeeeebea4f574cf2175d87d4899dcfa6e405c
SHA512a2bbb20f3d41b86f01455640c188b2c80d2bf8559ffd335e4cbeac7d70b8d88da3f75432e19a3597ffb79c183c32e1f071f0d259b277caf9173cf60479d312b5
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
2.1MB
MD5b1455296389172b8c9adc2433484a052
SHA1c8d88474f7161546cea0ccfb4cfd2590143e179e
SHA25602aa5869b88e55fd72889b19afd952db7d44b82d8e9af5855b85c7bd44afb95e
SHA5123bde30ba29b1d6a1292eed9bd04fa2f47ddbab8d90ba504964c0649516a45558117439cdec335cbc99b40d3eefae587427950c48c1dc3f177ed9f715475afe42
-
Filesize
1.9MB
MD5264b99652cf2c56454e2dd3e875b446c
SHA15643deaf0f24e0ae3e99a71a34d8651c67450eae
SHA2561ce99cf50285c13befe986236059a2fbbd5e6a7fc0321d90de858bff6c722fa3
SHA5125e8f8e3bae1d52fea80784fb065f37358b521ada474f6ceeb0c8912013bee1fbb6c6145ff6b1c16f2839921258cdf546f78f382ac515921259d2b73b68948347
-
Filesize
2.1MB
MD5d1141950a004935ac2dfab90d35fcda4
SHA1cd617ed9f3fcfa49c1727f3e92900ec54c13135c
SHA25671766fcfbd5ae65b6c1caa7da135125714d53904cd0a0e015407db4fc39d0b29
SHA512adbee9faaf3a8e610f42bb08bcf6c5ce973d081a0eefee37d4a9657106b11f0adc9a326cd82f271ec95ee1e312d741e27d92a2f24a55a5b806ccc4179aa55031
-
Filesize
1.8MB
MD543357710e366cd8576d29c8b805491f8
SHA1c3484a1fe8d9fded55d956cece1981f4aa3262b6
SHA256aa8eb9a9de68ab2b2aafb93758d863baaf6522b4384f450dc2f71ca15e573887
SHA5128b373970d02b1daff09b25564e5f054dfd2b623ea061e84a3a890cb44129e77f0b2b659ddb688e4e99856b6dfb4a8e23d76d0556d4eb4baf0685f1dde20731c2
-
Filesize
282KB
MD554e0220b6f9b4f8f64382b71c6033595
SHA11f599189588a7a174a6b8a4587ae0df5c15bdd6f
SHA25647bccced008024236587fbe59d8419a52888f7b50b01cc6c7dc92101a0885607
SHA5120c4e27554ee5a090f8e8e1fa0b901cc5cc90fb6f1a3fb68c4a991096d8ea53a07e452d1ad119b046107deffe34173b21a5ff2f0062b98ae9b23945ea05ad8708
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
384KB
MD5784e5316cc19e70f60214f7ee115e43c
SHA111cc0f48d317b680a18083e1380cb50d0189560c
SHA2562fc3b3eecbde36b4f5d63648f3d664bc1edf1c1046f508ef16c84962788d2bdf
SHA512f85dd8db999ef784b4c8ee65f158130e6983519b2ffd52fd2324a84ef74eccfc85a34e949362589c7bdd6c5162570d1f0d8e24bec3467c53a97b7cec1a1ca646
-
Filesize
256KB
MD5fbcac4353ba60f37597d2c7da1a16514
SHA1b124d04c0e993fad09e21275487759c28dd56516
SHA2560e7cd360a715c7753d00086fe52629827565c001f483c4e4f65fc20bda7e3f75
SHA512c07dbb64786b5c03fc291c6778199753e2d331fbb628cfa37a27f1ae197ca25cd4bf892bb73884d8fa521bfebab6b8e0e235fb75667677ef43b0c5273409ff05
-
Filesize
128KB
MD5d0e279a310ad44c7681264024f550632
SHA1c917095bba2fe56c87415e1012f73892fdf21cd9
SHA2564992528efd981b75cf8284b2e24e2408b04d028cb7264b9bf1e04c30cb5be4b5
SHA512461267846ecd31824f86c52b19a9f3a12e026c712dbe7556a6971df56bb87681601f995f3025d64761b24012c1ebf32a8d04e873bcb20086a644a7415267714f
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
283KB
MD5f44d23b0b845ca4388424f9d5be32890
SHA1d46eac4684455e34a396eba79ddb01441359ebb6
SHA256067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46
SHA512a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57add187d44013c5fdee82069f0d221bb
SHA17c93a4478363cfb309b17b2ee26543bdc2a25bb3
SHA2568ed67971ef815e8d713a1f4b4354b6b771866e319504883d4b972e8f4fe3aef2
SHA512d642b67f9d5216274d83a6b0f53128d7654a17d3a155fadcf2c6c83ce80b71d22e9282eee36aa51b901286eb8d17b4a3d0ed771ebb8b76ec4026c5c2081f0a17
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD539337efd0ae38dee3f8e93108f87da76
SHA1288b28210ff20a586f999f4f1c23155e67834e9a
SHA25693cccffe99db68c1a2ddd498035c1a83d426760532560aa23bee9734ef62e407
SHA512eb50533f3ea43045b169ed9923e56f54d90c622dabb57eb4d519258d8e52f250b70fb207c5bd056fbf19e34bf8369ce60e6e1a1e81b402f1f732fb78fa6a19c5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5083c2100502a2de14f40d3769e614bd3
SHA1e932f38027f9f1c066b53ed8e40400a45c1fba2e
SHA2564d073d4527847ee1913ea6908776605a2a8412e639fee084e9fadc5237d64576
SHA51266ad724db8174487c695f17fb00ee5c1997a4556d447717ed988b40bb34ce800c2eba3cfc62aad7f9d90bf39016610d93f7f2eaaca639654933b405118d22470
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5924f9dd85d7ccd29ed40f2dab96e3e63
SHA1996de86761e1c3e388b267de927b21c2f7689579
SHA256c97e0d203474e173dbc28e1a41a0111df4b5df12802207a8d5a60e1d6d6e518c
SHA512945a318993be36cef0a50d7af9b4e786d6578fc22d53575006de783cb817079ca7c562a61ee01910d6f5726ff60f1d479e7d736547eab6e86b9c1c6432159074
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a6e0080504ca453c6af5ee781bc661ee
SHA1773c05b614a5704872c9b5d351b64c417a9c6e23
SHA256a1723c260fd39cf18209a2c5b145d20853b9b911e1b6ccc005392ab2b60d83a4
SHA512e7d0c1594513311af846e561aeb47b934f7e4d7ec3674ddfe785828a7953ca14d387c3f5da8bf43f9dca0bc8a06da759e221bd649d53c51f86b4f655988b14ea
-
Filesize
4.1MB
MD5b869cd2b17a48a042c543f97b5ff7e2f
SHA1325559575cdba97275743c3077be2780b20e8558
SHA25630487d60a6dc7d5a6da51e624ae8586c9906547fff22ba533df1b53a4ad94728
SHA5121706d77d8dd3ead8a1da0f58daaba8737cdccf4563fdc98878d5922f6b0f0ce78d3176e2233380a3942b671146b2d9fa7d4d504ced6d5e17c27e8b5033a018d6