Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 09:54
Behavioral task
behavioral1
Sample
2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe
-
Size
8.9MB
-
MD5
8c819f7e632740c87d694356afc931ed
-
SHA1
68e53829368abd4f1d23cb531131223881df97f7
-
SHA256
8b0148744435d6298d2b73fe69019433ca6393e164af4e50709b7dda4b648891
-
SHA512
9c06084ef75c3fc0e83663c0705c2d6f61c3348a8d89050ce07e322898043e42234887386929a066b85f9459006b62269cd3b17b75920085834dd7b781428eea
-
SSDEEP
98304:gHxMZDJ1TRpxYVX9u2iazANfLhZytTD5iqa:GxEvYjHzANDhwN
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/1752-5-0x0000000000970000-0x0000000001291000-memory.dmp family_glupteba behavioral2/memory/1752-100-0x0000000000970000-0x0000000001291000-memory.dmp family_glupteba behavioral2/memory/776-103-0x0000000000970000-0x0000000001291000-memory.dmp family_glupteba behavioral2/files/0x00080000000234e2-184.dat family_glupteba behavioral2/memory/776-185-0x0000000000970000-0x0000000001291000-memory.dmp family_glupteba behavioral2/memory/2100-190-0x0000000000A50000-0x0000000001371000-memory.dmp family_glupteba behavioral2/memory/2100-278-0x0000000000A50000-0x0000000001371000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4820 netsh.exe -
resource yara_rule behavioral2/files/0x00080000000234c7-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation pCrEUV.exe -
Executes dropped EXE 5 IoCs
pid Process 1904 pCrEUV.exe 3436 pCrEUV.exe 2100 csrss.exe 5012 pCrEUV.exe 5052 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe pCrEUV.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe pCrEUV.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE pCrEUV.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe pCrEUV.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe pCrEUV.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE pCrEUV.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe pCrEUV.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe pCrEUV.exe File opened for modification C:\Program Files\7-Zip\7zG.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe pCrEUV.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe pCrEUV.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe pCrEUV.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE pCrEUV.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe pCrEUV.exe File opened for modification C:\Program Files\Windows Mail\wab.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe pCrEUV.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe pCrEUV.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe pCrEUV.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe pCrEUV.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe pCrEUV.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe pCrEUV.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe pCrEUV.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE pCrEUV.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe pCrEUV.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe File created C:\Windows\rss\csrss.exe 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe -
pid Process 612 powershell.exe 996 powershell.exe 688 powershell.exe 3112 powershell.exe 4552 powershell.exe 4668 powershell.exe 2848 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pCrEUV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pCrEUV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pCrEUV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3496 schtasks.exe 1248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 612 powershell.exe 612 powershell.exe 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 996 powershell.exe 996 powershell.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 688 powershell.exe 688 powershell.exe 688 powershell.exe 3112 powershell.exe 3112 powershell.exe 3112 powershell.exe 4552 powershell.exe 4552 powershell.exe 4668 powershell.exe 4668 powershell.exe 4668 powershell.exe 2848 powershell.exe 2848 powershell.exe 2848 powershell.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 2100 csrss.exe 2100 csrss.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 2100 csrss.exe 2100 csrss.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe 5052 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 612 powershell.exe Token: SeDebugPrivilege 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Token: SeImpersonatePrivilege 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe Token: SeDebugPrivilege 996 powershell.exe Token: SeDebugPrivilege 688 powershell.exe Token: SeDebugPrivilege 3112 powershell.exe Token: SeDebugPrivilege 4552 powershell.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeSystemEnvironmentPrivilege 2100 csrss.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1904 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 84 PID 1752 wrote to memory of 1904 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 84 PID 1752 wrote to memory of 1904 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 84 PID 1752 wrote to memory of 612 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 86 PID 1752 wrote to memory of 612 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 86 PID 1752 wrote to memory of 612 1752 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 86 PID 1904 wrote to memory of 64 1904 pCrEUV.exe 89 PID 1904 wrote to memory of 64 1904 pCrEUV.exe 89 PID 1904 wrote to memory of 64 1904 pCrEUV.exe 89 PID 776 wrote to memory of 3436 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 99 PID 776 wrote to memory of 3436 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 99 PID 776 wrote to memory of 3436 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 99 PID 3436 wrote to memory of 4120 3436 pCrEUV.exe 100 PID 3436 wrote to memory of 4120 3436 pCrEUV.exe 100 PID 3436 wrote to memory of 4120 3436 pCrEUV.exe 100 PID 776 wrote to memory of 996 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 102 PID 776 wrote to memory of 996 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 102 PID 776 wrote to memory of 996 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 102 PID 776 wrote to memory of 2356 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 105 PID 776 wrote to memory of 2356 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 105 PID 2356 wrote to memory of 4820 2356 cmd.exe 107 PID 2356 wrote to memory of 4820 2356 cmd.exe 107 PID 776 wrote to memory of 688 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 110 PID 776 wrote to memory of 688 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 110 PID 776 wrote to memory of 688 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 110 PID 776 wrote to memory of 3112 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 112 PID 776 wrote to memory of 3112 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 112 PID 776 wrote to memory of 3112 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 112 PID 776 wrote to memory of 2100 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 114 PID 776 wrote to memory of 2100 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 114 PID 776 wrote to memory of 2100 776 2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe 114 PID 2100 wrote to memory of 5012 2100 csrss.exe 115 PID 2100 wrote to memory of 5012 2100 csrss.exe 115 PID 2100 wrote to memory of 5012 2100 csrss.exe 115 PID 5012 wrote to memory of 2632 5012 pCrEUV.exe 116 PID 5012 wrote to memory of 2632 5012 pCrEUV.exe 116 PID 5012 wrote to memory of 2632 5012 pCrEUV.exe 116 PID 2100 wrote to memory of 4552 2100 csrss.exe 118 PID 2100 wrote to memory of 4552 2100 csrss.exe 118 PID 2100 wrote to memory of 4552 2100 csrss.exe 118 PID 2100 wrote to memory of 4668 2100 csrss.exe 124 PID 2100 wrote to memory of 4668 2100 csrss.exe 124 PID 2100 wrote to memory of 4668 2100 csrss.exe 124 PID 2100 wrote to memory of 2848 2100 csrss.exe 126 PID 2100 wrote to memory of 2848 2100 csrss.exe 126 PID 2100 wrote to memory of 2848 2100 csrss.exe 126 PID 2100 wrote to memory of 5052 2100 csrss.exe 128 PID 2100 wrote to memory of 5052 2100 csrss.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\pCrEUV.exeC:\Users\Admin\AppData\Local\Temp\pCrEUV.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\637b18d0.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:64
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:612
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-25_8c819f7e632740c87d694356afc931ed_poet-rat_snatch_wapomi.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\TEMP\pCrEUV.exeC:\Windows\TEMP\pCrEUV.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\TEMP\6a7c157d.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4120
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4820
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\TEMP\pCrEUV.exeC:\Windows\TEMP\pCrEUV.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\TEMP\61ab72bc.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:3496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:1248
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5c278049930be440a1b466b4f6946569c
SHA136c39f991b3542eb8e12e09b8ad8b1ebd6e849ab
SHA2560a4c7d8ce2934b7197fbdba209435b27945e99a230fd6eadd78567ee6ed1d5be
SHA512093c85790f140ca5364b8f73c69aab54683d3f3a1be887ace61bc99cc5c6830c6b613ba0c4ce9f7d270f77eb077b990615a266f79c979dedc50821d77215d9a9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55d16b29eaa6f8e83b9a60aed230b9c3f
SHA17e24dc677f719d638879ab3a684c7dd16e76f974
SHA256986acf464bc5d5dda51c590a7288d4328c926d2099040a4947f56131f0e3ac1f
SHA512742c5e7deb789f573ec0bcd9474acc2faa8f117b87dc7c5e4a79845f5f79702b48e19b6fd15f0b316fc21fff05cee21dc37da55dd1ee30041fdd558e2fcb28c4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD568cf8f663a8b0dc867962ea266408475
SHA1e0c1096694976325db9fa33c85d35c932711699c
SHA256478962adadcfd84c97f52a72e0e122269273e21c53b631879454996fcaab576e
SHA51293f05ca9e506f4ad4b8c16187e51177d3437ad2d78d210cecb8b13187df3df3ec35b36b49069a46d629c44f6e6bf399db18c6598f6f45a15431ed7f3b4f79c7e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD533b3102b82213e2d566c952851981fd8
SHA182aa0ad12496fcb255aa8d4cae081365874dd2c8
SHA25694d70c7d068ff143c2e2b3b0175e9fbfb6382312a1416fefac7c557425f057d6
SHA51209450095e0d9cf79a71e7f3e8fe7385456e653bba6c0b3a67e1fb3cadb16f44bd19b76aab9792610ee7e0aad8c537c5058a00b0b416c6bf0673d39c2673b795d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54987efa12ae2568becb8587d22522dc7
SHA1c72cda95ba7e5f980e9d2645a90825a14d38e9cd
SHA25630510b15661830624232453cde842f9386db64de5ffa7498f5e063bdcc551b78
SHA5128bb45ad4d22a69f396a90f711c6a48cf14bba42d86ccad0d43ac9b8e1ab8f1dac16c201c8fa8dcb38c8a4b63c4a26575f3ef4587653f7524527e7bc605e643bb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD546b2795f3b7d736bb2f74be6e66ad426
SHA11a0c734a8f981358bd99c938a212092f4a6e53c7
SHA2565da6654242a7a54eb7c104f0e9ad7164fef7346f62b787718e0394eae610f1b5
SHA5124f8f2a5542e2eeaef66b52dc0f733bae377985441e898cecc863b33f12078a71d31c8441b2089d8cb02dd837e8164ed77fad68751236d6ad53461f1feb0b19a2
-
Filesize
133B
MD55c83bab9bc4d412f2165abc45e27b206
SHA1b2889e5d6a7e9b750d3e111b9d3918ba2c0b566a
SHA2569e41b6ba8d5fc7da433c606985030a06f05f6bb6cabbb1fb2e4021a379409554
SHA512d06d9a28d97c175ddf3669055f55f7da13e5f46025a60ebe34a961d438b2792598182205c86d8752e4d35dcd5cde77ed615485423777cc5667e696aa2277d4c2
-
Filesize
133B
MD5cb6934bb742053e16a66b8bc607803fa
SHA1956ebc0633e4d2ecf760e0c2f2c93db8f75ac27a
SHA256331e59810b520ae50ffe27639fd81d3996afaa7f4e7242d098c623ab54198f58
SHA512103295de42212dce54b7acbd236e3d66cc02212d4b4f213b35cd7b1a3e821c5912ecc104d1c1c859a506aff9e062b808e612c6c2d9b7fe2b1b1d66e63a67de5b
-
Filesize
8.9MB
MD58c819f7e632740c87d694356afc931ed
SHA168e53829368abd4f1d23cb531131223881df97f7
SHA2568b0148744435d6298d2b73fe69019433ca6393e164af4e50709b7dda4b648891
SHA5129c06084ef75c3fc0e83663c0705c2d6f61c3348a8d89050ce07e322898043e42234887386929a066b85f9459006b62269cd3b17b75920085834dd7b781428eea