Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 15:36
Static task
static1
General
-
Target
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe
-
Size
409KB
-
MD5
edcd9de4254f050ffa56e723be49c0c5
-
SHA1
054c541726383f1d70572f72a83ad86061141d64
-
SHA256
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3
-
SHA512
aadf2f8fd82146c1174efe01261871caff89ba0ca3b18c6be77472609b8dbfa8b4c2b9d15968a7d423be9af0c79005311663478bd6d79fbcb87cf42a5bd20328
-
SSDEEP
12288:AiwMdowCeYkiyh9bGfD7NUwW1ROABchrj9j48Re9TY:AiwQowukiS4iwGROuqrj91
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/3672-369-0x0000021A6B8D0000-0x0000021A6F104000-memory.dmp family_zgrat_v1 behavioral1/memory/3672-408-0x0000021A72830000-0x0000021A7293A000-memory.dmp family_zgrat_v1 behavioral1/memory/3672-412-0x0000021A717F0000-0x0000021A71814000-memory.dmp family_zgrat_v1 -
Glupteba payload 24 IoCs
resource yara_rule behavioral1/memory/4156-230-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/4368-232-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/3764-231-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1732-233-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1956-344-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/2752-346-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1372-345-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/64-347-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/2752-467-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1372-466-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/64-468-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1956-465-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1372-589-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1956-588-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/2752-590-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/64-591-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1956-603-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/64-604-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/2752-605-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/1372-606-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/4724-636-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/4724-697-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/4724-709-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral1/memory/4724-715-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2548 powershell.exe 4852 powershell.exe 2028 powershell.exe 4752 powershell.exe 1600 powershell.exe 1668 powershell.exe 2588 powershell.exe 1912 powershell.exe 3440 powershell.exe 3732 powershell.exe 1644 powershell.exe 3368 powershell.exe 5032 powershell.exe 2032 powershell.exe 4692 powershell.exe 2412 powershell.exe 2420 powershell.exe 3680 powershell.exe 1088 powershell.exe 4348 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 928 netsh.exe 3560 netsh.exe 668 netsh.exe 3324 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation regasm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 88qVA71GFy1Nq4onm1oSpddh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation u2z0.1.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3nIXyefvAynIECsArtWYsqAH.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dk5k6N55yZG9NmBc2NJZ47fH.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gYGCry2efJc88HLTlemr0VKL.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\y0lRizMW1SK3tDRzxCRtuOLC.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Z2Brp3JiHK3QLJkkYlAkOnwx.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rPLnwVvRy6GVl4JzJqZo0y27.bat regasm.exe -
Executes dropped EXE 15 IoCs
pid Process 3852 88qVA71GFy1Nq4onm1oSpddh.exe 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe 4368 HkNR03C8eGLoJYmYsDiS3idD.exe 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe 3116 u2z0.0.exe 3696 u2z0.1.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 4724 csrss.exe 808 injector.exe 4404 windefender.exe 3300 windefender.exe -
resource yara_rule behavioral1/files/0x000800000002343f-701.dat upx behavioral1/memory/3300-713-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" gkCrJzLv4Tcf2A3uZl1bCPwG.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" gkCrJzLv4Tcf2A3uZl1bCPwG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" mROzCSDwjdNgpJpwGjxU8PZ6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" Mkb433YgG0jW3gAvc3R5VDpF.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" HkNR03C8eGLoJYmYsDiS3idD.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 12 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2112 set thread context of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN mROzCSDwjdNgpJpwGjxU8PZ6.exe File opened (read-only) \??\VBoxMiniRdrDN Mkb433YgG0jW3gAvc3R5VDpF.exe File opened (read-only) \??\VBoxMiniRdrDN gkCrJzLv4Tcf2A3uZl1bCPwG.exe File opened (read-only) \??\VBoxMiniRdrDN HkNR03C8eGLoJYmYsDiS3idD.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\rss\csrss.exe gkCrJzLv4Tcf2A3uZl1bCPwG.exe File opened for modification C:\Windows\rss mROzCSDwjdNgpJpwGjxU8PZ6.exe File opened for modification C:\Windows\rss Mkb433YgG0jW3gAvc3R5VDpF.exe File created C:\Windows\rss\csrss.exe Mkb433YgG0jW3gAvc3R5VDpF.exe File created C:\Windows\rss\csrss.exe HkNR03C8eGLoJYmYsDiS3idD.exe File opened for modification C:\Windows\rss gkCrJzLv4Tcf2A3uZl1bCPwG.exe File created C:\Windows\rss\csrss.exe mROzCSDwjdNgpJpwGjxU8PZ6.exe File opened for modification C:\Windows\rss HkNR03C8eGLoJYmYsDiS3idD.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2944 3852 WerFault.exe 91 4440 3116 WerFault.exe 97 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2z0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2z0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2z0.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2z0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2z0.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3640 schtasks.exe 1568 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" Mkb433YgG0jW3gAvc3R5VDpF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 powershell.exe 2548 powershell.exe 1644 powershell.exe 1644 powershell.exe 2420 powershell.exe 2420 powershell.exe 3680 powershell.exe 3680 powershell.exe 4852 powershell.exe 4852 powershell.exe 2420 powershell.exe 3680 powershell.exe 4852 powershell.exe 1644 powershell.exe 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe 4368 HkNR03C8eGLoJYmYsDiS3idD.exe 4368 HkNR03C8eGLoJYmYsDiS3idD.exe 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe 1088 powershell.exe 1088 powershell.exe 1600 powershell.exe 1600 powershell.exe 1668 powershell.exe 1668 powershell.exe 2588 powershell.exe 2588 powershell.exe 1088 powershell.exe 1600 powershell.exe 1668 powershell.exe 2588 powershell.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 1372 HkNR03C8eGLoJYmYsDiS3idD.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 1964 regasm.exe Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe Token: SeDebugPrivilege 4368 HkNR03C8eGLoJYmYsDiS3idD.exe Token: SeDebugPrivilege 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe Token: SeImpersonatePrivilege 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe Token: SeDebugPrivilege 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe Token: SeImpersonatePrivilege 4368 HkNR03C8eGLoJYmYsDiS3idD.exe Token: SeImpersonatePrivilege 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe Token: SeImpersonatePrivilege 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 3368 powershell.exe Token: SeDebugPrivilege 1912 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeDebugPrivilege 3672 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 5032 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeDebugPrivilege 3732 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeSystemEnvironmentPrivilege 4724 csrss.exe Token: SeSecurityPrivilege 3908 sc.exe Token: SeSecurityPrivilege 3908 sc.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe 3696 u2z0.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2548 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 84 PID 2112 wrote to memory of 2548 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 84 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 1964 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 2112 wrote to memory of 3980 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 87 PID 2112 wrote to memory of 3980 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 87 PID 2112 wrote to memory of 3980 2112 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 87 PID 1964 wrote to memory of 3852 1964 regasm.exe 91 PID 1964 wrote to memory of 3852 1964 regasm.exe 91 PID 1964 wrote to memory of 3852 1964 regasm.exe 91 PID 1964 wrote to memory of 3764 1964 regasm.exe 92 PID 1964 wrote to memory of 3764 1964 regasm.exe 92 PID 1964 wrote to memory of 3764 1964 regasm.exe 92 PID 1964 wrote to memory of 4368 1964 regasm.exe 93 PID 1964 wrote to memory of 4368 1964 regasm.exe 93 PID 1964 wrote to memory of 4368 1964 regasm.exe 93 PID 1964 wrote to memory of 1732 1964 regasm.exe 94 PID 1964 wrote to memory of 1732 1964 regasm.exe 94 PID 1964 wrote to memory of 1732 1964 regasm.exe 94 PID 1964 wrote to memory of 4156 1964 regasm.exe 95 PID 1964 wrote to memory of 4156 1964 regasm.exe 95 PID 1964 wrote to memory of 4156 1964 regasm.exe 95 PID 3852 wrote to memory of 3116 3852 88qVA71GFy1Nq4onm1oSpddh.exe 97 PID 3852 wrote to memory of 3116 3852 88qVA71GFy1Nq4onm1oSpddh.exe 97 PID 3852 wrote to memory of 3116 3852 88qVA71GFy1Nq4onm1oSpddh.exe 97 PID 4156 wrote to memory of 2420 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe 100 PID 4156 wrote to memory of 2420 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe 100 PID 4156 wrote to memory of 2420 4156 Mkb433YgG0jW3gAvc3R5VDpF.exe 100 PID 3764 wrote to memory of 1644 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe 99 PID 3764 wrote to memory of 1644 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe 99 PID 3764 wrote to memory of 1644 3764 mROzCSDwjdNgpJpwGjxU8PZ6.exe 99 PID 4368 wrote to memory of 4852 4368 HkNR03C8eGLoJYmYsDiS3idD.exe 102 PID 4368 wrote to memory of 4852 4368 HkNR03C8eGLoJYmYsDiS3idD.exe 102 PID 4368 wrote to memory of 4852 4368 HkNR03C8eGLoJYmYsDiS3idD.exe 102 PID 1732 wrote to memory of 3680 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 101 PID 1732 wrote to memory of 3680 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 101 PID 1732 wrote to memory of 3680 1732 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 101 PID 3852 wrote to memory of 3696 3852 88qVA71GFy1Nq4onm1oSpddh.exe 107 PID 3852 wrote to memory of 3696 3852 88qVA71GFy1Nq4onm1oSpddh.exe 107 PID 3852 wrote to memory of 3696 3852 88qVA71GFy1Nq4onm1oSpddh.exe 107 PID 64 wrote to memory of 1088 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 117 PID 64 wrote to memory of 1088 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 117 PID 64 wrote to memory of 1088 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 117 PID 1372 wrote to memory of 1600 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 119 PID 1372 wrote to memory of 1600 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 119 PID 1372 wrote to memory of 1600 1372 HkNR03C8eGLoJYmYsDiS3idD.exe 119 PID 1956 wrote to memory of 1668 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 120 PID 1956 wrote to memory of 1668 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 120 PID 1956 wrote to memory of 1668 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 120 PID 2752 wrote to memory of 2588 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 123 PID 2752 wrote to memory of 2588 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 123 PID 2752 wrote to memory of 2588 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 123 PID 2752 wrote to memory of 528 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 126 PID 2752 wrote to memory of 528 2752 mROzCSDwjdNgpJpwGjxU8PZ6.exe 126 PID 64 wrote to memory of 1744 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 128 PID 64 wrote to memory of 1744 64 Mkb433YgG0jW3gAvc3R5VDpF.exe 128 PID 1956 wrote to memory of 2944 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 129 PID 1956 wrote to memory of 2944 1956 gkCrJzLv4Tcf2A3uZl1bCPwG.exe 129 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe"C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\Pictures\88qVA71GFy1Nq4onm1oSpddh.exe"C:\Users\Admin\Pictures\88qVA71GFy1Nq4onm1oSpddh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\u2z0.0.exe"C:\Users\Admin\AppData\Local\Temp\u2z0.0.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 12725⤵
- Program crash
PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2z0.1.exe"C:\Users\Admin\AppData\Local\Temp\u2z0.1.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 15164⤵
- Program crash
PID:2944
-
-
-
C:\Users\Admin\Pictures\mROzCSDwjdNgpJpwGjxU8PZ6.exe"C:\Users\Admin\Pictures\mROzCSDwjdNgpJpwGjxU8PZ6.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\Pictures\mROzCSDwjdNgpJpwGjxU8PZ6.exe"C:\Users\Admin\Pictures\mROzCSDwjdNgpJpwGjxU8PZ6.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:528
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:928
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
-
-
C:\Users\Admin\Pictures\HkNR03C8eGLoJYmYsDiS3idD.exe"C:\Users\Admin\Pictures\HkNR03C8eGLoJYmYsDiS3idD.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\Pictures\HkNR03C8eGLoJYmYsDiS3idD.exe"C:\Users\Admin\Pictures\HkNR03C8eGLoJYmYsDiS3idD.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3328
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:668
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
-
C:\Users\Admin\Pictures\gkCrJzLv4Tcf2A3uZl1bCPwG.exe"C:\Users\Admin\Pictures\gkCrJzLv4Tcf2A3uZl1bCPwG.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Users\Admin\Pictures\gkCrJzLv4Tcf2A3uZl1bCPwG.exe"C:\Users\Admin\Pictures\gkCrJzLv4Tcf2A3uZl1bCPwG.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2944
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3560
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3640
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:808
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1568
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:4524
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Mkb433YgG0jW3gAvc3R5VDpF.exe"C:\Users\Admin\Pictures\Mkb433YgG0jW3gAvc3R5VDpF.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Users\Admin\Pictures\Mkb433YgG0jW3gAvc3R5VDpF.exe"C:\Users\Admin\Pictures\Mkb433YgG0jW3gAvc3R5VDpF.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1744
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3324
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3852 -ip 38521⤵PID:1760
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3116 -ip 31161⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD52c3c5110dba295f6a43399d0c0f3bcf6
SHA15808d6e05444d9ba2161bb86e62747e1bce10662
SHA256d69c3f881824d37a1d50313cffb81b00845a799fc38e1da8e189eacd4124c54d
SHA5124f8888252b5b006b05065aaa82e17fbc9947667b17245973799269ad9edc09272ccf2ec4b001231aaaf5c131009b81c8195ec42cff0975288c4002381d21afa3
-
Filesize
664B
MD50a560bd6e4ef1d819e190e3b221c3c45
SHA1b90544e2f23205e58f7c0f10b060c0845d575d45
SHA256d3f876482907f9f1637ce26b1a05639171105d5e204823c7af3fccb23e0252aa
SHA51212668d6c505b159907a6e53e75e9bc5b4fd53afb2cf359b8e2be0d2f098bcbf061c6272ec93552194df8c5766906077ef57e4be04a399786a0ce7db23708a9f9
-
Filesize
21KB
MD5467921b8dfdea995764be4db0e929f10
SHA13478bfd842f9a18bba096ea5835d9d24bc36b131
SHA2561a74e2cb15498ec88c4518ba8a8352019bb69fc855c4211178b23880deeef494
SHA5125d27124b6c753483501cfed3f41c22b57c3f1a3e0da98dcd72c5ab719a8dc2b87be556d66a07e6f3678235f318b4bdece9baf7aa5037c278c3ca941c2adb59ad
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD545029627d064f6f7a3e2584118ed7563
SHA1f42993a8ac5fb932a7c7c42c7bd655f3054cffbc
SHA256699308affe36089532cfa1b08ab450772afae397a4eb3c5bd7564ecfa2c62f16
SHA51295899f1df7fe01bb763349d44e615b2b0363a5097c16b7d7196207045fd4261386b49fe8acde81a9cff9c5b0f199538387d6cb83b9c2cad0fcda05853ca47d24
-
Filesize
3KB
MD5df6c931876d0256be99bfa456e322695
SHA1fd5f0557d9789d862929f69e17ee2af81771cdda
SHA256a8970ca480b6431643a4e8627d2a9969a2325574624c441b28fb35546cfc92ef
SHA51289c79fbc9efdfcfc697af4209a7cef5193f8c0be6186b48f839eb3a7df7ed445984e8de2b8581b63ef491713b568dc3f144b59caa090b0daa81619009bf5708f
-
Filesize
226KB
MD5c4b38f17b16a0b545d989a5e7f192308
SHA17325ba75f76855f332e840d595cadc591ea220af
SHA25645072f942cb27587d1815a9c079c066c85ac313fe1388fd61dd69c77bdc68b4b
SHA512ca30aa925c6bec667fa4aceda9918d9e7c1ddee1fb7eded4ee266f6f6ae2d3e2fea7070049dc28540615832fc2e60e2821aabc839f468d446b44e082558ef041
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
368KB
MD55af092dba0ea0929354397630215b41a
SHA1fd605744f6d4f629e22e7a2fb370c8da4dc21d83
SHA2569abf357befc1310b1960a5a976866438d916ab066aeb15cc43a9713b29bf300e
SHA5125e16cae0240a1de45bc474c53bb00ca720fb030c66dac7e74c762e137e5b2361f9e0a89399d39b4b0d9b38b3bb18a49fc10176ec1afe1c54bc1c5d5583e01ab9
-
Filesize
4.1MB
MD5d55b5ef96c5ec431ddb9baeac60272f4
SHA1e1744f8a4b1433746d91972388f2af6b26fa841d
SHA256ada79f56b84a94f7870b9ac7c425494358863e30609bd18baf0229d3e55388da
SHA5128b3b57fc9a22476ddfcce95aed99ebda03a7021c306daa6fdad898e56fe8bb6c4932d46a0e53deaea0e807552b3598b27a69bc359bd907bd75bfd1575bfa565d
-
Filesize
4.1MB
MD5f6a39cd537cec35ae05b5615702c0125
SHA13b8bf4e10848eb7a05d9c85c588af194bb02df4c
SHA25636d0a6d463a523e3644575a513c96ed6833b87d1c4efc579d89b2261b226f7b6
SHA51259e3148b1fe69e657708eac51db39a8b50b12e52190d792a0ea691c174c46ef85908bc62d9f0a20d1bdaf017d98de07643c755816bd9f294257ab9a3cc45443b
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d89ec8e3842a5bb783cd609bd6e31609
SHA14b30d36f4dfdd73e0ad6ef93e9d4c26981ae43d5
SHA256156bbb4c65977dcfd2c1867d3468d8938b3c994b1be4b244fa435c96bcbbfc15
SHA51227e91c03b60a5827a906d6573647df5b27919038f72c95352105f8dfdc93c615eec67175353078112ead9bc8a742fd1a5b514cb3262d55e597a8a9da96f550af
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50ea9ce67c3eb523620a08b7ed50b2f73
SHA1304385c0efae289bdef3feab51f0ebb72078b603
SHA256015bc7ea417534a671e761bf8e5b4d07ca8423278fea5ae8da6184373c7cb479
SHA5122f300f496cbe799cec9145dba66c017784cd07dfcde14b1ce45fdf597cde5b308f7ffcfbe14af98ace562bb13b9b6a66cbed1ba21857188bc8b4877d0787598d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52ba5b7220c90bdeed1a51401a6590427
SHA1abaa09852a300a328244a92c8ecc071a7da4dac5
SHA256cfe6fd1676e686a469f4e21396f79e28a6ac2988aee204e49f59dc77150b9e36
SHA512063741841c02c2a3327fef7e46a3973ad9bc32ce772f60e8a883449af712e4042d286eb53b79608b0d53eecd84532353f98156839f5a4d9bef2bc9de34d90c41
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58b1d907024e1f190b9d9d8c249af6325
SHA1385fefaeb29cfb3a3422c228e03c922cd426bf81
SHA2565e26333b162d53c5760bc5627db7540e14e29c0499e2b25c917edc2d9c7b50b1
SHA512ca86a04c1f922e85afd0f2ffbcd711fd2871532bb292a3d477e5012820c46287c6dc434f65db52c2ae8d3716e803b83ffb6b280f13e9a7b74b152aef997ff590
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56fc89ca01a228bbbc5f485cb2b3975e8
SHA189e190812a95d582ad6f9ab889118a4b942eb9ae
SHA256e5655438d9cbe73ec5f566220b5e8126bcc5f4d53a93b0af3088b94882376dd3
SHA512c087b3d3a11c0f37bbe7639bcc8ae00ff62e612d8b1bc6973f18afa00a0933f1455d3b884d518bfb9c2dc0498c8762b43a456de53204186e5ea1d1606cfa24d4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c37d3603a3c3424a1ba35ccd33639de2
SHA1f3bd2aadcb84fa30cd8b780f7e1735fa01d93473
SHA256fe13a5eeec7cbc2de623e0c44c9cceee4b06a62ddc21dd94309c57974b6af0e5
SHA512ae4e82c487f9285c22b446c4370aa65c4a50ecd62477c59c219e9832afc6fdbe6135f7534ee592a2c2f7ee7658efe26dddca6e85a289e37721d2ee03aba4e189
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e5390d219923194bba0842c0da667c60
SHA16342dfe8a7cfa521cdd2df22156a7ebf4825307c
SHA2565a3aafa8ec73b001958fe8322b4a5937c8b91daaf7fc7ac394ff9695f3e0a5d7
SHA512db144ce371fe614a0b1c10c6a19228fc20e7f2330661358830f76b09286cea32816e4f446b8ec20050a880913830950fa75e950a57e396a84c2165e1457c1eb7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d386a3422a037d3082b2fc2d151a384f
SHA18506ab4855b241a804498e26854ffee87ed8ab95
SHA256ce2b0b15d94df18b4b23c026a6f8269c1dc2459df395a6de0cad19b0a82ab189
SHA5123a5eedf9a72a5326c468d42744e9764283e44f2b348b7a7cd733ba63ff1dc9a667f44c54ba364e926cf46785ef869c6dc72047d1f47c86bc0b58b762e6eaeda4
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec