Analysis
-
max time kernel
57s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-03-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe
Resource
win11-20240221-en
General
-
Target
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe
-
Size
313KB
-
MD5
49c1a7094df766b5e5868811f298b529
-
SHA1
c48fc045b5ee06e02d558f3c3551a463199725b9
-
SHA256
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976
-
SHA512
c34cf47f715fffb4c4b9ec4ba587ea0c455d3baf7192408114b9f7260dbb1ee6b28c794157cfdd12c6048e99e9140220d77232bd9355cb96db7df9e566ba9490
-
SSDEEP
3072:9gw3B7c4wkQMR+BYYeEX+qP4XTkedBoRv0XgGlf+N9XF6kVQvVYKAG:zxd/RmFMkeAv0ltKXF6k2NvJ
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://sajdfue.com/test1/get.php
-
extension
.vook
-
offline_id
1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1
-
payload_url
http://sdfjhuz.com/dl/build2.exe
http://sajdfue.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
4.185.137.132:1632
Signatures
-
DcRat 4 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
F57D.exeschtasks.exeschtasks.exeabc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\47de060a-5eda-414f-b20d-02673e203e16\\F57D.exe\" --AutoStart" F57D.exe 2948 schtasks.exe 4204 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe -
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 -
Detected Djvu ransomware 9 IoCs
Processes:
resource yara_rule behavioral2/memory/4504-21-0x0000000002610000-0x000000000272B000-memory.dmp family_djvu behavioral2/memory/3492-22-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3492-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3492-25-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3492-26-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3492-41-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/560-65-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/560-67-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/560-72-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/3372-134-0x0000000005300000-0x0000000005BEB000-memory.dmp family_glupteba behavioral2/memory/3372-136-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3372-165-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3372-219-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3372-227-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3372-229-0x0000000005300000-0x0000000005BEB000-memory.dmp family_glupteba behavioral2/memory/3864-268-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3864-382-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3864-414-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/3864-442-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/2216-502-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba behavioral2/memory/2216-593-0x0000000000400000-0x000000000312F000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4192-654-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1244 netsh.exe -
Deletes itself 1 IoCs
Processes:
pid process 3312 -
Executes dropped EXE 8 IoCs
Processes:
F57D.exeF57D.exeA9.exeF57D.exeF57D.exe3362.exe467F.exe5219.exepid process 4504 F57D.exe 3492 F57D.exe 2516 A9.exe 2796 F57D.exe 560 F57D.exe 5052 3362.exe 4388 467F.exe 3372 5219.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
F57D.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\47de060a-5eda-414f-b20d-02673e203e16\\F57D.exe\" --AutoStart" F57D.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 api.2ip.ua 1 ip-api.com 4 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
F57D.exeF57D.exeA9.exe467F.exedescription pid process target process PID 4504 set thread context of 3492 4504 F57D.exe F57D.exe PID 2796 set thread context of 560 2796 F57D.exe F57D.exe PID 2516 set thread context of 2424 2516 A9.exe RegAsm.exe PID 4388 set thread context of 3992 4388 467F.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2460 560 WerFault.exe F57D.exe 2288 2424 WerFault.exe RegAsm.exe 1036 5052 WerFault.exe 3362.exe 4540 4584 WerFault.exe RegAsm.exe 1724 4584 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2948 schtasks.exe 4204 schtasks.exe -
Modifies registry class 8 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3084248216-1643706459-906455512-1000\{AE63838F-10DA-4073-B7C8-913ABBEE7956} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exepid process 3404 abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe 3404 abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exepid process 3404 abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
RegAsm.exeexplorer.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeDebugPrivilege 3992 RegAsm.exe Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 3312 Token: SeCreatePagefilePrivilege 3312 Token: SeShutdownPrivilege 2816 explorer.exe Token: SeCreatePagefilePrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeCreatePagefilePrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeCreatePagefilePrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeCreatePagefilePrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeCreatePagefilePrivilege 2816 explorer.exe Token: SeDebugPrivilege 4304 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
explorer.exepid process 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
explorer.exepid process 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exeF57D.exeF57D.exeF57D.exeA9.execmd.exe467F.exedescription pid process target process PID 3312 wrote to memory of 3180 3312 cmd.exe PID 3312 wrote to memory of 3180 3312 cmd.exe PID 3180 wrote to memory of 2276 3180 cmd.exe reg.exe PID 3180 wrote to memory of 2276 3180 cmd.exe reg.exe PID 3312 wrote to memory of 4504 3312 F57D.exe PID 3312 wrote to memory of 4504 3312 F57D.exe PID 3312 wrote to memory of 4504 3312 F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 4504 wrote to memory of 3492 4504 F57D.exe F57D.exe PID 3492 wrote to memory of 1896 3492 F57D.exe icacls.exe PID 3492 wrote to memory of 1896 3492 F57D.exe icacls.exe PID 3492 wrote to memory of 1896 3492 F57D.exe icacls.exe PID 3492 wrote to memory of 2796 3492 F57D.exe F57D.exe PID 3492 wrote to memory of 2796 3492 F57D.exe F57D.exe PID 3492 wrote to memory of 2796 3492 F57D.exe F57D.exe PID 3312 wrote to memory of 2516 3312 A9.exe PID 3312 wrote to memory of 2516 3312 A9.exe PID 3312 wrote to memory of 2516 3312 A9.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2796 wrote to memory of 560 2796 F57D.exe F57D.exe PID 2516 wrote to memory of 4852 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 4852 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 4852 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 2516 wrote to memory of 2424 2516 A9.exe RegAsm.exe PID 3312 wrote to memory of 5052 3312 3362.exe PID 3312 wrote to memory of 5052 3312 3362.exe PID 3312 wrote to memory of 5052 3312 3362.exe PID 3312 wrote to memory of 4104 3312 cmd.exe PID 3312 wrote to memory of 4104 3312 cmd.exe PID 4104 wrote to memory of 3632 4104 cmd.exe reg.exe PID 4104 wrote to memory of 3632 4104 cmd.exe reg.exe PID 3312 wrote to memory of 4388 3312 467F.exe PID 3312 wrote to memory of 4388 3312 467F.exe PID 3312 wrote to memory of 4388 3312 467F.exe PID 4388 wrote to memory of 3992 4388 467F.exe RegAsm.exe PID 4388 wrote to memory of 3992 4388 467F.exe RegAsm.exe PID 4388 wrote to memory of 3992 4388 467F.exe RegAsm.exe PID 4388 wrote to memory of 3992 4388 467F.exe RegAsm.exe PID 4388 wrote to memory of 3992 4388 467F.exe RegAsm.exe PID 4388 wrote to memory of 3992 4388 467F.exe RegAsm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe"C:\Users\Admin\AppData\Local\Temp\abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3404
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E9A4.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\F57D.exeC:\Users\Admin\AppData\Local\Temp\F57D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\F57D.exeC:\Users\Admin\AppData\Local\Temp\F57D.exe2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\47de060a-5eda-414f-b20d-02673e203e16" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\F57D.exe"C:\Users\Admin\AppData\Local\Temp\F57D.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\F57D.exe"C:\Users\Admin\AppData\Local\Temp\F57D.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 6005⤵
- Program crash
PID:2460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A9.exeC:\Users\Admin\AppData\Local\Temp\A9.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 11443⤵
- Program crash
PID:2288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 560 -ip 5601⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2424 -ip 24241⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\3362.exeC:\Users\Admin\AppData\Local\Temp\3362.exe1⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 11442⤵
- Program crash
PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3538.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5052 -ip 50521⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\467F.exeC:\Users\Admin\AppData\Local\Temp\467F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\5219.exeC:\Users\Admin\AppData\Local\Temp\5219.exe1⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\5219.exe"C:\Users\Admin\AppData\Local\Temp\5219.exe"2⤵PID:3864
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1320
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:464
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1244
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3636
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2216
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2348
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:2948
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4216
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:4204
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\94D4.exeC:\Users\Admin\AppData\Local\Temp\94D4.exe2⤵PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\9B4D.exeC:\Users\Admin\AppData\Local\Temp\9B4D.exe2⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"3⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"4⤵PID:4736
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:5064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 4766⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 11526⤵
- Program crash
PID:1724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"4⤵PID:4952
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4192
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B137.exeC:\Users\Admin\AppData\Local\Temp\B137.exe2⤵PID:2572
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:4152
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1460
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:4704
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:2600
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:3896
-
C:\Users\Admin\AppData\Roaming\uicfrbrC:\Users\Admin\AppData\Roaming\uicfrbr1⤵PID:4356
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:652
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4584 -ip 45841⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4584 -ip 45841⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50610a4c36df2531d0760aaf9ebe1f02d
SHA14d302b5d99b70f1f94e5b91cc132a84e836cf82c
SHA2569a73590b4c4d2e74c68ff0d88e6880c64ca30ff4eb68c937062bffd5cdc6325a
SHA512a5812d9b868a74c15fae549391ed6148690447d153e0404c91d4a4bdf34af76b42c46d912e124622713ad24e7d3a28816c1e0bc5bc03c309ed2a57b2f0e184f8
-
Filesize
1022B
MD5e0e52915eb6309693aac1c4535b28b9f
SHA120c9362e4a4ee8b454d255945b68f2fe8d8c09bb
SHA256fbdc94cee75d57351bf94954d03b172f2a13b080e385de8068ff5f637c67218a
SHA5120c43d95ec620502374ef0d6da286bebbc391df29694899625e84741ee271f4caf5fb63801e666bba30ec914852ebc5b30f0b0751a3409f58b23641fe5d2be4c8
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\B19DE93B-F36A-4896-BA50-9F4A8F97397C\Zrtu2hQ08VU_1.bytecode
Filesize62KB
MD5d086993f38b70c227bc090c83899b526
SHA19534cd37499f1fd0000fb4dfd59f7270c14ca955
SHA256c6b8add3d89dd2dfb4c255771c05c7abce11bfbb33d12861fb1eafb338e48a06
SHA512e3e0d312da3eca4410c89c8836ea7e1864be46272453e22744be2be2249b8901306255bb6dd4b06775f5ce33e487ddf90f40db51443eee40a659a7c40594e1fa
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\B19DE93B-F36A-4896-BA50-9F4A8F97397C\Zrtu2hQ08VU_1.metadata
Filesize192B
MD567598848cb6251441a2e15a90847b4fe
SHA1769e0155b736f5e567a28a710a9d4544cde368d4
SHA25624efcf85ef21551acf8f6e3a34c80611f4965f114dac223587b3ff2b4835935a
SHA512275403c4626aa9d2642a300d127e7013b79d3e3884ca87a7db11c8483d4a4a5a180bc033dbe9accdad79e733be7a9a0f968c8dcf62d64c3424c3afa6292578ab
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A
Filesize313B
MD53ea358bc5d2636c7c05260406a76be5d
SHA1ca64794c172f9d2c46c91d868ce6b703aa7b4157
SHA256561d6c91d0e6061ad178a87d9cdc23e25a8f79310564a90c5b4025ef1a745701
SHA512641e00f3b3225f639271ce7c1da87f12650386dd4842ed240fe9a89a4baa704efc3433c55dae41665ad9ac9053a10d4f2adca8902c733a91159512006daf96d7
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A
Filesize404B
MD526837185beb926f1c4d6a4b3b5e511ae
SHA18f3ddc13bdd978a4c8f5da02953bba28836498bd
SHA2569b78499fd4ec5c4388f2a88b1ce43f0a04885c7da0b592a1fb1b06cf461f2f47
SHA512e4e304f7d42776cd3876f2a0716603ffb6e4af40b5bd3b1b32648aa3556d8d1d5506b7c72f2eb6cc6b11bf156016d855d34b39a7a9b826937a7211f05947c160
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\33P75E8Z\www.bing[1].xml
Filesize2KB
MD5e0239a6c81cd0f511aaf7b0476dd54ca
SHA138328a28e33b16ec9016ebdc2d804238779f4546
SHA2564b7d87b8385eda2bb0e28ecb4b31fc797975199075465e67b81762ec0661bcd2
SHA51200a42c2dd0ae0d375be0e71c67e96a4cacd85681277fc2f4522cb0acd062f1f21d3998483fdeaa3712e6ae0123b3fd69c889b8a059cd0389142923b35a12bd83
-
Filesize
832KB
MD50164a4ff87a0dc5a2bd089be2417b5e7
SHA1bfff6c1915a40ccc66ab2fc151ee0e7245c863df
SHA256cbc1041ba8e2614a8bfe07cc1bc79ffcd4bd2ffc166e49934a225163981e9843
SHA512320f83f7747e65c809ca255e347b9efe486664a48edda7e5a3404321ccb5d7e2a6e7cb7c8c50a136fdf1b73b93a3d1fbe08748eab6ad362fe2e088f43b3fdbc1
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
6.5MB
MD59e52aa572f0afc888c098db4c0f687ff
SHA1ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b
SHA2564a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443
SHA512d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62
-
Filesize
124KB
MD515e99fef6ef1009225f7c4c6e150be76
SHA189bc8a468138da2fac12db6a0fb7b93ffd8703c3
SHA25611d03ca1f0e3a488cd6ce3b2db917f470218473ed7cbbe75b1e7bf301ea23269
SHA5123b8ef63d2f08ef6dc0d74e596c23afaa701b22d8dbf52fc1d073b0d285256f340587d9a933d7eb664f2a79df9e0576fa6737a9919304e67150e39e3d51c10480
-
Filesize
2.2MB
MD5dd342d3d95fb436e58a143ca35aa67a5
SHA10e05885061c078e840f388391f9388a1febbef02
SHA256b5a9d417b89a353cbb6cf7935970d45eaf928956b5b602b309d72ba26129150b
SHA51211050c96447ee178ecb9579712289f8e2230bdb8e8800164a8044aff306883e40d6ac6c1313df414155d3ef7dcf624e888a987eb0b927a2657f5a01dd9d67bc6
-
Filesize
1.9MB
MD517fb99c142cf9f689ee0c761dc7406fb
SHA10e8bc8d9e465958bfb47d6a8c4768933cab70555
SHA25699af8c8c18098c030f9bf75b30e2701afdbf91092afb5fef9b4093fac2def6db
SHA5128c6df89117a31a4db5768652349012c25a058a77d6fdae46f049147a1756972d2e40e3138723915bafd4abc4b502da989ab3fd1cf720d09e2f765804ddc1cbf0
-
Filesize
3.5MB
MD51354ff27fa001cd992ddce43deff3a05
SHA1d25769c20a131ef5cbd06c21e5e8598ef72bf25f
SHA256931661582896e7bb516d2d6f3ea2e0970c1e2d2cbe5146366bff1d264439875b
SHA51273d3180026508facf00747c75d435cae292748979e8dd088995d8db96a43b627819fad96e10178d19356477b8a41ee3982f590403d63b89a0ba39ee9f520eeff
-
Filesize
1.8MB
MD5dfb04c99ff9c9c5e3680e9f66eed0b42
SHA16f1bfffeb5d0df4af3c02969d42c075d6f8e28d8
SHA256ec056709f6332170c8c92141476541b3730b1e610d6d8e835e1489b608ea892f
SHA5123f7e6edb722a154094d59e8d92cdacca74e86a2853c567a4158025525780d62f0854a3eaa3007874f0d2a3ee467285313e84336a7550e06de52c86ff361696b1
-
Filesize
351KB
MD5cdecfa866f6afdc28197256d599ea9d6
SHA13de6536984bb94009be0b5b3761239fdc861b4aa
SHA2565b65a8e580bd4add0ebc2759cc1a9619bdb24a011f0256373e493e3143a49427
SHA5128e6d69703364b7b2b7eba2bfcf039ae0bda91e88ed6d47946eaa3e2dc4b19566dffa1da5c355929e0bbe2172095c39ab5c99e703c41f27d2ab092a8d738ca78d
-
Filesize
1.5MB
MD5ce330a87078b27865f933d27f1239c8a
SHA148c79a789a595de5082c65a8cab995543ae445b4
SHA256f2cd57fdb5835b43910fb4ec7829a6d08c54074d0657e78931b8b41cf3af27c7
SHA51258b18db087eb2c54b7d117ffd8631e9c0978e004f06505b7275358d968d63c63bfde1edc05ab102e73358ff57762ead678e1241bc3a7cd55e17e0301a2a9e6c2
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
725KB
MD51e4a31d86b7890bb038908aef7c9c898
SHA15dd3dd0460c67983cafc92282307e7a3d15ea493
SHA25679d2a17028a6442b48d12fb5cfe9015d8a5cae8f706f88082a4f3efed0a6981e
SHA512687bc5f34a53a96e7e74fa46497d96425a0ba92aa59d52a240cbb13275f7646c93e5a4a861139c5be27e3d8feed40a5ea3a1bc67011923fd8c36f76fe3903095
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
313KB
MD549c1a7094df766b5e5868811f298b529
SHA1c48fc045b5ee06e02d558f3c3551a463199725b9
SHA256abc5152266564f883ab915f2a1eec762cd98920e5e315974c926632942e31976
SHA512c34cf47f715fffb4c4b9ec4ba587ea0c455d3baf7192408114b9f7260dbb1ee6b28c794157cfdd12c6048e99e9140220d77232bd9355cb96db7df9e566ba9490
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize8KB
MD54a1556d0d31eda1257008e6d77fe4e14
SHA1c7b2310cee3314c49d85f70d8be1f676186507ae
SHA2561fed4ec2a248f76c32730e409ebc4e34b2aeecda01e282c3d38b0f96a51c1ff6
SHA512e745675989cc53d2286612a302b1459ce04c38ec0daa54950ebb3479c68e8c3f8157746bb2a17d80192aa8811a4bf7ba39f7d8cdc18cf67340ac9e24a89d15e8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD521c29ce2398c338dec45a78bc2d86939
SHA1c0c2c12b024b31df9ca69666cca9c5aa95fca398
SHA256d36bb4a3f6c7f1e97cdc01fe64056b9468b84ef9070322f96d572964f04bbb4a
SHA512122ee51acc2518941a199a029ef6ca7556c91a1f396abc0f5eb195019c053eb6d6a02749993de5cc22b0ae115402abc912e021bc23fb7d89b451a0f23fa6642c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b38782ab4347fbd17f1df83adfdb66b2
SHA11d763cced53771899129b5b88862fff790637856
SHA256646d1d7d7153a82ad3adcdd1efa78cff39fe0b0010849294c947aa09cb28344d
SHA512ae20a3c35e0ce995f243064e27b4c0313f095cfcdcbc58e40562e355daca1701f81e6b4e8b0eba48e638c4d29188bb91c534fff20771aee49af8ddd8bd24960e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD516ccb278987754ac7904e89c51e7c8af
SHA14c901177d4a3d90663d76cdcb78e757c8636d882
SHA256d39ebf3fc13bad0382465079ea699f111bd26abbc4a25f1ac9382be3194efe24
SHA5126cb61f0d15cc0cf03aa950ff34839c326d1a81f72e0a689a62b9bfcb6889d32edfe579f27b69c5ea8b801b836b2025e7c1c0ee830a21f9123f261e2cd06f3d69
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f20176e5518a2bd7d0f6e028bb5fcfa1
SHA18cfbcb9ddcd25c898ed52e1e22218ee1677e1c7f
SHA25667382564657b99a05501f2862d2f60d7a6fa654171c713dc84adfa64b7bba403
SHA51257a90326134fcbc801d261233e055e474be55745cc0bb61cb5fa18fb68f48c207335d8b681e72eb67229cded43ed00f7483b9fd8ac303ba6749a64e37d5d11e7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50d28f0966d76128ec263c2877d5fcc13
SHA1967231d53850ad0a2661adde8032339a31d62951
SHA256d69227852a15213531c8e9a60cf367de1b2ac17e1bc6e0c25a01d16a110ba7fd
SHA51203ca2c7411108d1c0a681a3a549cfb6958c73e8e19677b283081ad6efae79fa1664fef7416117560498f5159f7022613588951a56afb8fb61a95a798215ea49b
-
Filesize
288B
MD5069d30f837fb0e32bfc7ea439a7bcf15
SHA1fe6aeb11ac52b7e2f1923b5b62e90f65ba4e51c5
SHA256e314b9058307ad8a26161480ff5fe004a70143fbbe0d4449fc9767182b0ae9dd
SHA5125ddd18fcfd1659ea8e2d4417dc3fbdf2ccf2ae368f521895aa3e792de59d4a28e080ede39d489f1f59f448658661d9bcb4589112b4638cdfd78a2608858e1f00
-
Filesize
4.2MB
MD526984b7e8f20df949a84fcd0186ab274
SHA16da52690931aa3a7d2cd2a70e077b9eeaba80953
SHA2568aa544e4289dc9cbcaeaee9b145afb4e59a0f6a4298954ca04c2a7aa2711a45a
SHA51246d86ce79928fef0090e5ac528e5d1337146c04accfbfe7071cf8de4d2322fb55d177b83d31f6729259903d3f0de5a0a6a447bc78698d0a2531f633daf592463