Analysis
-
max time kernel
83s -
max time network
309s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06-05-2024 22:31
Static task
static1
General
-
Target
2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe
-
Size
392KB
-
MD5
ccc754d02cc1188f0a0477b306539065
-
SHA1
8a73b2e84fbdcadfaa98cc325c2222096bdc309b
-
SHA256
2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38
-
SHA512
6cabd1b19ddd94280528e4c2512e222bacc9bea6806e1df5610ffd3d993f52c4599e65fc7573d3d426e4d6d8c3756244e3e242b55b499796222f971b15ca8e0a
-
SSDEEP
6144:htbMqLyDywnR6E5qkDPWQo9f+1llNEaVl5CMba/W1i5adCexXadKxQ3qhqrS8PbH:ht4qLC7RFfT7Ew5Csfi5advxaVkk
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/5256-4708-0x000002CD5A550000-0x000002CD5DD84000-memory.dmp family_zgrat_v1 behavioral2/memory/5256-4717-0x000002CD78520000-0x000002CD7862A000-memory.dmp family_zgrat_v1 behavioral2/memory/5256-4726-0x000002CD78730000-0x000002CD78754000-memory.dmp family_zgrat_v1 -
Glupteba payload 29 IoCs
resource yara_rule behavioral2/memory/4676-574-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/3764-575-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4356-579-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/1472-580-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4676-1226-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/3764-1227-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/3764-1259-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4676-1258-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4356-1261-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/1472-1262-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5696-1663-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5832-1661-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5884-1662-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5740-1664-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5832-2257-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5740-2260-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5884-2258-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5696-2259-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5832-2978-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5696-2980-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5884-2979-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5740-3217-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5696-3815-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5832-3950-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5740-3951-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/5884-3961-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4496-4445-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4496-4730-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/4496-4757-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e1TUuqX2IUVzeUs2xcCkN7vU.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\77wuYEZExU0KksC2aXOc28on.exe = "0" 77wuYEZExU0KksC2aXOc28on.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\NmxtPpHgG8c5AwLshRN2JfZz.exe = "0" NmxtPpHgG8c5AwLshRN2JfZz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\xFohppZnTpRXQIdjsvE5duLP.exe = "0" xFohppZnTpRXQIdjsvE5duLP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe -
pid Process 2028 powershell.exe 3232 powershell.exe 6052 powershell.exe 684 powershell.exe 5388 powershell.exe 6020 powershell.exe 4092 powershell.exe 4644 powershell.exe 3236 powershell.exe 1972 powershell.exe 6068 powershell.exe 6072 powershell.exe 2276 powershell.exe 1556 powershell.exe 5276 powershell.exe 6024 powershell.exe 5568 powershell.exe 1180 powershell.exe 5860 powershell.exe 892 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 5492 netsh.exe 5416 netsh.exe 5356 netsh.exe 4256 netsh.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mEnJ8wzJMLfvya8xUHZOtPWs.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\g02rU0e8NOaFTFA1JlPqZI2B.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jXPC4ZI8SIQy8iUQJcLt7pyq.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8mBLk2MD4Yfnzm8wMXyr4oxG.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DIUstaAxoFKfvE6tsdMkhLA9.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2zplqZxEmlLNd77ww81nCv3j.bat regsvcs.exe -
Executes dropped EXE 12 IoCs
pid Process 4676 77wuYEZExU0KksC2aXOc28on.exe 3764 xFohppZnTpRXQIdjsvE5duLP.exe 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe 2600 u1z0.0.exe 5832 77wuYEZExU0KksC2aXOc28on.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 5904 u1z0.1.exe 4496 csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000800000001ab99-4213.dat themida behavioral2/memory/4716-4215-0x0000000140000000-0x0000000140862000-memory.dmp themida behavioral2/memory/4716-4707-0x0000000140000000-0x0000000140862000-memory.dmp themida behavioral2/memory/4716-4753-0x0000000140000000-0x0000000140862000-memory.dmp themida -
resource yara_rule behavioral2/files/0x000b00000001abe8-4760.dat upx behavioral2/memory/1036-4762-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\77wuYEZExU0KksC2aXOc28on.exe = "0" 77wuYEZExU0KksC2aXOc28on.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e1TUuqX2IUVzeUs2xcCkN7vU.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\NmxtPpHgG8c5AwLshRN2JfZz.exe = "0" NmxtPpHgG8c5AwLshRN2JfZz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\xFohppZnTpRXQIdjsvE5duLP.exe = "0" xFohppZnTpRXQIdjsvE5duLP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e1TUuqX2IUVzeUs2xcCkN7vU.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" NmxtPpHgG8c5AwLshRN2JfZz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" xFohppZnTpRXQIdjsvE5duLP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 4 pastebin.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.myip.com 55 ipinfo.io 57 ipinfo.io -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4656 set thread context of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e1TUuqX2IUVzeUs2xcCkN7vU.exe File opened (read-only) \??\VBoxMiniRdrDN NmxtPpHgG8c5AwLshRN2JfZz.exe File opened (read-only) \??\VBoxMiniRdrDN 77wuYEZExU0KksC2aXOc28on.exe File opened (read-only) \??\VBoxMiniRdrDN xFohppZnTpRXQIdjsvE5duLP.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe xFohppZnTpRXQIdjsvE5duLP.exe File opened for modification C:\Windows\rss e1TUuqX2IUVzeUs2xcCkN7vU.exe File created C:\Windows\rss\csrss.exe e1TUuqX2IUVzeUs2xcCkN7vU.exe File opened for modification C:\Windows\rss NmxtPpHgG8c5AwLshRN2JfZz.exe File created C:\Windows\rss\csrss.exe NmxtPpHgG8c5AwLshRN2JfZz.exe File opened for modification C:\Windows\rss 77wuYEZExU0KksC2aXOc28on.exe File created C:\Windows\rss\csrss.exe 77wuYEZExU0KksC2aXOc28on.exe File opened for modification C:\Windows\rss xFohppZnTpRXQIdjsvE5duLP.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5888 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1z0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1z0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1z0.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1z0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1z0.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe 5848 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" xFohppZnTpRXQIdjsvE5duLP.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" NmxtPpHgG8c5AwLshRN2JfZz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" xFohppZnTpRXQIdjsvE5duLP.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 77wuYEZExU0KksC2aXOc28on.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" NmxtPpHgG8c5AwLshRN2JfZz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" NmxtPpHgG8c5AwLshRN2JfZz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" xFohppZnTpRXQIdjsvE5duLP.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" NmxtPpHgG8c5AwLshRN2JfZz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" NmxtPpHgG8c5AwLshRN2JfZz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 77wuYEZExU0KksC2aXOc28on.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" xFohppZnTpRXQIdjsvE5duLP.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" xFohppZnTpRXQIdjsvE5duLP.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" xFohppZnTpRXQIdjsvE5duLP.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 77wuYEZExU0KksC2aXOc28on.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" e1TUuqX2IUVzeUs2xcCkN7vU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" xFohppZnTpRXQIdjsvE5duLP.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 892 powershell.exe 892 powershell.exe 892 powershell.exe 2028 powershell.exe 2028 powershell.exe 3236 powershell.exe 3236 powershell.exe 3232 powershell.exe 3232 powershell.exe 1972 powershell.exe 1972 powershell.exe 2028 powershell.exe 1972 powershell.exe 3236 powershell.exe 3232 powershell.exe 2028 powershell.exe 3236 powershell.exe 3232 powershell.exe 1972 powershell.exe 2600 u1z0.0.exe 2600 u1z0.0.exe 3764 xFohppZnTpRXQIdjsvE5duLP.exe 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe 3764 xFohppZnTpRXQIdjsvE5duLP.exe 4676 77wuYEZExU0KksC2aXOc28on.exe 4676 77wuYEZExU0KksC2aXOc28on.exe 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe 6052 powershell.exe 6052 powershell.exe 6072 powershell.exe 6072 powershell.exe 6068 powershell.exe 6068 powershell.exe 6024 powershell.exe 6024 powershell.exe 6052 powershell.exe 6072 powershell.exe 6068 powershell.exe 6024 powershell.exe 6052 powershell.exe 6068 powershell.exe 6024 powershell.exe 6072 powershell.exe 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 5832 77wuYEZExU0KksC2aXOc28on.exe 5832 77wuYEZExU0KksC2aXOc28on.exe 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 5832 77wuYEZExU0KksC2aXOc28on.exe 5832 77wuYEZExU0KksC2aXOc28on.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe 5884 xFohppZnTpRXQIdjsvE5duLP.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 4180 regsvcs.exe Token: SeIncreaseQuotaPrivilege 892 powershell.exe Token: SeSecurityPrivilege 892 powershell.exe Token: SeTakeOwnershipPrivilege 892 powershell.exe Token: SeLoadDriverPrivilege 892 powershell.exe Token: SeSystemProfilePrivilege 892 powershell.exe Token: SeSystemtimePrivilege 892 powershell.exe Token: SeProfSingleProcessPrivilege 892 powershell.exe Token: SeIncBasePriorityPrivilege 892 powershell.exe Token: SeCreatePagefilePrivilege 892 powershell.exe Token: SeBackupPrivilege 892 powershell.exe Token: SeRestorePrivilege 892 powershell.exe Token: SeShutdownPrivilege 892 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeSystemEnvironmentPrivilege 892 powershell.exe Token: SeRemoteShutdownPrivilege 892 powershell.exe Token: SeUndockPrivilege 892 powershell.exe Token: SeManageVolumePrivilege 892 powershell.exe Token: 33 892 powershell.exe Token: 34 892 powershell.exe Token: 35 892 powershell.exe Token: 36 892 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 3236 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 3232 powershell.exe Token: SeDebugPrivilege 3764 xFohppZnTpRXQIdjsvE5duLP.exe Token: SeDebugPrivilege 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe Token: SeImpersonatePrivilege 3764 xFohppZnTpRXQIdjsvE5duLP.exe Token: SeImpersonatePrivilege 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe Token: SeDebugPrivilege 4676 77wuYEZExU0KksC2aXOc28on.exe Token: SeImpersonatePrivilege 4676 77wuYEZExU0KksC2aXOc28on.exe Token: SeDebugPrivilege 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe Token: SeImpersonatePrivilege 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe Token: SeDebugPrivilege 6052 powershell.exe Token: SeDebugPrivilege 6072 powershell.exe Token: SeDebugPrivilege 6068 powershell.exe Token: SeDebugPrivilege 6024 powershell.exe Token: SeDebugPrivilege 4092 powershell.exe Token: SeDebugPrivilege 684 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 5388 powershell.exe Token: SeDebugPrivilege 6020 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 5568 powershell.exe Token: SeDebugPrivilege 1180 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe 5904 u1z0.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 892 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 75 PID 4656 wrote to memory of 892 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 75 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 4180 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 77 PID 4656 wrote to memory of 1432 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 78 PID 4656 wrote to memory of 1432 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 78 PID 4656 wrote to memory of 1432 4656 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe 78 PID 4180 wrote to memory of 4676 4180 regsvcs.exe 82 PID 4180 wrote to memory of 4676 4180 regsvcs.exe 82 PID 4180 wrote to memory of 4676 4180 regsvcs.exe 82 PID 4180 wrote to memory of 3764 4180 regsvcs.exe 83 PID 4180 wrote to memory of 3764 4180 regsvcs.exe 83 PID 4180 wrote to memory of 3764 4180 regsvcs.exe 83 PID 4180 wrote to memory of 2556 4180 regsvcs.exe 84 PID 4180 wrote to memory of 2556 4180 regsvcs.exe 84 PID 4180 wrote to memory of 2556 4180 regsvcs.exe 84 PID 4180 wrote to memory of 4356 4180 regsvcs.exe 85 PID 4180 wrote to memory of 4356 4180 regsvcs.exe 85 PID 4180 wrote to memory of 4356 4180 regsvcs.exe 85 PID 4180 wrote to memory of 1472 4180 regsvcs.exe 86 PID 4180 wrote to memory of 1472 4180 regsvcs.exe 86 PID 4180 wrote to memory of 1472 4180 regsvcs.exe 86 PID 3764 wrote to memory of 3232 3764 xFohppZnTpRXQIdjsvE5duLP.exe 89 PID 3764 wrote to memory of 3232 3764 xFohppZnTpRXQIdjsvE5duLP.exe 89 PID 3764 wrote to memory of 3232 3764 xFohppZnTpRXQIdjsvE5duLP.exe 89 PID 4356 wrote to memory of 2028 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe 90 PID 4356 wrote to memory of 2028 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe 90 PID 4356 wrote to memory of 2028 4356 e1TUuqX2IUVzeUs2xcCkN7vU.exe 90 PID 1472 wrote to memory of 3236 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe 88 PID 1472 wrote to memory of 3236 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe 88 PID 1472 wrote to memory of 3236 1472 NmxtPpHgG8c5AwLshRN2JfZz.exe 88 PID 4676 wrote to memory of 1972 4676 77wuYEZExU0KksC2aXOc28on.exe 93 PID 4676 wrote to memory of 1972 4676 77wuYEZExU0KksC2aXOc28on.exe 93 PID 4676 wrote to memory of 1972 4676 77wuYEZExU0KksC2aXOc28on.exe 93 PID 2556 wrote to memory of 2600 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 96 PID 2556 wrote to memory of 2600 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 96 PID 2556 wrote to memory of 2600 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 96 PID 5740 wrote to memory of 6052 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 104 PID 5740 wrote to memory of 6052 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 104 PID 5740 wrote to memory of 6052 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 104 PID 5884 wrote to memory of 6068 5884 xFohppZnTpRXQIdjsvE5duLP.exe 105 PID 5884 wrote to memory of 6068 5884 xFohppZnTpRXQIdjsvE5duLP.exe 105 PID 5884 wrote to memory of 6068 5884 xFohppZnTpRXQIdjsvE5duLP.exe 105 PID 5696 wrote to memory of 6072 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 106 PID 5696 wrote to memory of 6072 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 106 PID 5696 wrote to memory of 6072 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 106 PID 5832 wrote to memory of 6024 5832 77wuYEZExU0KksC2aXOc28on.exe 107 PID 5832 wrote to memory of 6024 5832 77wuYEZExU0KksC2aXOc28on.exe 107 PID 5832 wrote to memory of 6024 5832 77wuYEZExU0KksC2aXOc28on.exe 107 PID 2556 wrote to memory of 5904 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 112 PID 2556 wrote to memory of 5904 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 112 PID 2556 wrote to memory of 5904 2556 cbMzO28ECyxBfQTqWL5WGpxG.exe 112 PID 5884 wrote to memory of 1188 5884 xFohppZnTpRXQIdjsvE5duLP.exe 115 PID 5884 wrote to memory of 1188 5884 xFohppZnTpRXQIdjsvE5duLP.exe 115 PID 5696 wrote to memory of 5308 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 116 PID 5696 wrote to memory of 5308 5696 e1TUuqX2IUVzeUs2xcCkN7vU.exe 116 PID 5740 wrote to memory of 5256 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 158 PID 5740 wrote to memory of 5256 5740 NmxtPpHgG8c5AwLshRN2JfZz.exe 158 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe"C:\Users\Admin\AppData\Local\Temp\2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\Pictures\77wuYEZExU0KksC2aXOc28on.exe"C:\Users\Admin\Pictures\77wuYEZExU0KksC2aXOc28on.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Users\Admin\Pictures\77wuYEZExU0KksC2aXOc28on.exe"C:\Users\Admin\Pictures\77wuYEZExU0KksC2aXOc28on.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5300
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4256
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:2276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
-
C:\Users\Admin\Pictures\xFohppZnTpRXQIdjsvE5duLP.exe"C:\Users\Admin\Pictures\xFohppZnTpRXQIdjsvE5duLP.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\Pictures\xFohppZnTpRXQIdjsvE5duLP.exe"C:\Users\Admin\Pictures\xFohppZnTpRXQIdjsvE5duLP.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6068
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1188
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5492
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
-
-
C:\Users\Admin\Pictures\cbMzO28ECyxBfQTqWL5WGpxG.exe"C:\Users\Admin\Pictures\cbMzO28ECyxBfQTqWL5WGpxG.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\u1z0.0.exe"C:\Users\Admin\AppData\Local\Temp\u1z0.0.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\u1z0.1.exe"C:\Users\Admin\AppData\Local\Temp\u1z0.1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵PID:5256
-
-
-
-
C:\Users\Admin\Pictures\e1TUuqX2IUVzeUs2xcCkN7vU.exe"C:\Users\Admin\Pictures\e1TUuqX2IUVzeUs2xcCkN7vU.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\Pictures\e1TUuqX2IUVzeUs2xcCkN7vU.exe"C:\Users\Admin\Pictures\e1TUuqX2IUVzeUs2xcCkN7vU.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5308
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:5416
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6020
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5848
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:5860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:6020
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2204
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:1036
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:6000
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:5888
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\NmxtPpHgG8c5AwLshRN2JfZz.exe"C:\Users\Admin\Pictures\NmxtPpHgG8c5AwLshRN2JfZz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Users\Admin\Pictures\NmxtPpHgG8c5AwLshRN2JfZz.exe"C:\Users\Admin\Pictures\NmxtPpHgG8c5AwLshRN2JfZz.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6052
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5256
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5356
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5388
-
-
-
-
C:\Users\Admin\Pictures\cPYfY5Ucexb6Agj3qp1nyyFl.exe"C:\Users\Admin\Pictures\cPYfY5Ucexb6Agj3qp1nyyFl.exe"3⤵PID:4716
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵PID:1432
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:320
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
19KB
MD5b736aaebe529340591a1d0f49c05d80f
SHA18c3c8a3d4ecee21412c18c95cdbda8396d543634
SHA256bc4fccedfbec4de5915627a2c5d732ffdb2e0ac3a1cc0fcff92ca7b20636991d
SHA512dbf7401abd2d2365f79e338da0ee6dc4c4398f008f9d2d09a844c63e7484b37f240b33e787f82e4dfbd57dbdc26566667713716178ba077e14d026dbf78451ae
-
Filesize
19KB
MD5fa9df7031d684fc8e8bb765e2a50d48b
SHA1b34f723c8dfe45c60d88241f8e33f84c996b20e1
SHA2568f56c2ed7963f9c40bfdefc0e214473ee3eded9937b3b0dd31e41453297ff9e1
SHA51272f8060623a233fd6388ed92bc8f27ba7541fc682df5921e801ae32e5824a578464422677d9f3d0cfbf9c22b7f1235a0e9a0947fe45ffb9f7fd51e454c90c4e1
-
Filesize
19KB
MD523a417bba426decb34963539601fb836
SHA1b8cdcb04f2a55193749ba3bb7166b29f88112308
SHA25652e9c5d9a66c5f3547ab176394180397a0f5a39a75ded7bec47d0207b04ee993
SHA5125d2f76022d9057c90af4331674172b071171dbe45eec2fa0488fde4e95a364f604a0de018baae670ecf2b0dab402003772fc8caa552ac9340120d350fc7c807d
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5cb8ddb13ce51ade44a9aeb9c4d5d9c74
SHA11ae0065ec1e37d8b44e30e5326af8f517fe8e1a5
SHA2568e1b9330dab6e2d36f83f658a1cf51c31eb1a519580e9b15eb6532a4a4e90884
SHA512fb1927779a1f03e7a0cdc0fe5bfa88a9fc25b736f7934d2c9e00e4d220e7a546b53f92ef70e90312a79826c49e7f9fe9b6b16e931b74b26b7df47af247496bb0
-
Filesize
282KB
MD5f72e01dfb65e6409cb0fc611e466e9d5
SHA1e3d9f9d5e531ea1537bbecbf8064c5772a3c4a26
SHA2567eec5c68ccc964cae08684c73b65a0427623454286b253b4ee4453dc1aa93bbf
SHA5127f47b5e7d997d923ca3d2a481bd8754b01c444c3be284b01e8577e58632bf1b69db87927e57079999e9ffc4dc1d50c45b68a5ce3b4ad58bdcf55d48acb9a87c1
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
4.2MB
MD561ea29403f696bdb529abfed16a6cef4
SHA157aaf7b5fa7765bc42a4391a640502d30b6432b1
SHA256944c792b16309c7461018d999d0831a2d299b19f81015da489d77d1445ac24da
SHA51204eb6d2e7944a80ead6eb58a019aef33900c142e7cfd156c215d94f879d5d1586ce451aa40dc5e8f0b9d78a503be967301e89dfc65f85e639e1dc94cfa021004
-
Filesize
4.2MB
MD5d42f70bc211153abcc56b7b550d8f066
SHA12e79143fa90a058e56dad12920f2d450cc138098
SHA256f1ad483fb40354a1d2c9f1b8ed46ae799fc67433af0a6ff0393c59939f752d4f
SHA512c10085de5476de153204a08c7e66245fa729922f118f6a2567ec547097effe710c31d0f626aedae4af1a971e3594fd7cf2544d353168f931ed4ab9dc99f12c79
-
Filesize
5.5MB
MD526193ade61357f8be316a489dfbe08c7
SHA112f618f5c00f81477f7dfbb513d88c66166e1aed
SHA256cd08d7d53e4206301c103aa6db8cf423e289679a203973a0c7c13404e7490e48
SHA512881f6cbd27adf3f038a6ae2c9ee20af97ba0502c775d95bbc47d1a605691bdc3158129fa6123b9256202d34d40e48e90a1e7863d0d1c03d0e3672bada6c61c9a
-
Filesize
423KB
MD57e082a8f4b814df02d2492b92ba08679
SHA1ebc6c49b269bcf96a64f198353efbc26564e0103
SHA256788b07ddb4703999ebce7d1ea6de760f99667a6d2f3e905932c913d689c83ae2
SHA51288a94cf73ba5311361f264c80419af3ba85c953cf6a486b042f949f5e0331f5c3a7a44a7afa20d4184fa990b030a04dfb5d3a7f9146d33a49ff84add0c57253a
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52692414a38eefb1363c479ea692b7859
SHA15bfb945d267bd5f9a6181e313d8159e313d8d6c5
SHA256055dc44ca5096015fa9f1b31825594defe82869dfb4aef7f447c3d63b8c9df39
SHA5121d4218ed72cb7419bcf20d17054d87db5bf055dccedd81f73480d80a79bd78086266d7777e3f7600fc536887e58a906ceb960fbb597c0a0c2a84cac750cd5c44
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c165a2b75440b256d25f7ddb3a589f24
SHA1ab4772f3d9fe962c79b4c055bb60b549676a4290
SHA256f575bd61315f343db8b256104c7a5b7fdaaefb7263eb4de0ffffe434e4eda58f
SHA512f10edb21edc8981e9b32f55c8b7c0edbef330ffe3c60bee1655b9baa38f1c8a76b7568802108ef792f215340b35aa8ceb6a9115ac6e5b120e31f92a04b1ecf60
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD574f77cbe58d89e153d7439c877ce1e48
SHA15a4beaa8489f81639670ad50232ffed2fddaf465
SHA256337e48729544249cd4fa66ae260ad71bc15542048b2bb8641f7d2fafc93e530b
SHA512901db4cc34bcd5f81fe8a469f4e6f2294b2921a14434bd3ea9c81ff5ddb79810494cbf572ac0ad154b6cf26261c55f3792d64a0176ca0db4131bc1baf92646d2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51214768e4ee89d71e77e3d6b1679f043
SHA14b079053a4dfcf11a9eb3be3b416ac21ade9b0b4
SHA2567d6baf62c414dc7969e1c2cc72a3febb9b61fa441c75e441eb5ccfde4e816c3b
SHA512998947098c158e6e118492852243d8b4ea259cdbd76e62844cde25e2829b505a1586f032a677469cf5a6c48b351320e3b8c7b968fdd2b0d968476781f8cd83de
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD54631af7fde48f6289ae704b0075f3970
SHA1705f821bd52ea5af645093a354ec54399f63a9fe
SHA256f9758da4f416ec4bdd70815918c82d8d36f2154c0aa33e3582d155e0587c2bb6
SHA512c06f2c595a861ea23ca65fc31dd43ea50ebea8f3555e673b6338e688a0dbc4155a2e80f1b7508b25140f4e42d9a4464e7e0404284888cc1842964c49d0d6e20e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f2d79af99be05b5b3b64248285028bc0
SHA17bd8d6b51bf6513985db74e1abde9ab1d647951d
SHA256b1c9981171a819c6e994d7a9be68c00b8fa283ea133909933972dc048fac9341
SHA512c71826c9c99e2e24909255284d00598536a130cfe88a0425b9d2a4dba262403e5364a511691fe49eb0aa05c0377ae27aac91bff1704735aab099b482f1e8d8ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56120ca9321d78e944d8c373180903f9e
SHA158a67375940b6ec0de63c3a57348534abc1f666b
SHA256892d94871f81c5aa7e8e1cd8ebec4d76a91e2ccf06a37754d5cac4b3f226181a
SHA51214696bcca9838afa9660838c521ee8a7de98546b3bf5e02a8246bf6e93a0a85af364e99f4b69bbcfcbeb4d823979c80329bbeac868117ec7e298a650bf798789
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD534469a0a089cffc472bbf57ebefabdd3
SHA18ac67767eec3931cab721bcfdeef113b798d60b1
SHA256cc8df870896a2aa0cbbca128a6d77cfbcbfd4ce7b587fda2b088954b253b35b3
SHA51203f0fddccb5e2c5c0eda37a93292201708fed6822df19b226186a9a5d571ab4c9e4aaaf4110243e00f23c79ecd36bbc0d8522273b8d5550a31097729f692c548
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec