Analysis
-
max time kernel
101s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-05-2024 22:58
Static task
static1
General
-
Target
5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe
-
Size
389KB
-
MD5
b8974e005f6850373862db8ec43c739d
-
SHA1
da18ff2135677c6e6ec438fd5a3cc86f274b2072
-
SHA256
5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f
-
SHA512
79d002d26fabbcf9807d7b4ceec0244b27a192601f4c654438324153a258dff165925cca6d882a297240d335e935cda0dab25af67666596bc7142f1ef4ace385
-
SSDEEP
6144:VoavxgYvX2ZXThTtP8KVa2txCbPhou247E/VnX+Q2EVGxm5mwhQ4bkSp:VoaJgnXTpR8KVatbV8OEIralJ
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/3036-1349-0x0000015CE7ED0000-0x0000015CEB704000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-1356-0x0000015CEE0B0000-0x0000015CEE0D4000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-1352-0x0000015CEDEA0000-0x0000015CEDFAA000-memory.dmp family_zgrat_v1 -
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/2512-152-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/2512-683-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/920-687-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/1828-969-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4148-1275-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4148-1328-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/2492-2082-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-4978-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-4987-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-4990-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-4992-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-4994-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-4996-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-5002-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-5004-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-5006-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-5008-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba behavioral2/memory/4368-5010-0x0000000000400000-0x0000000002ED5000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\GGsU4X6VMQN31vaf0D0hEU8V.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\WtsViihOsPSQ7UUIBzLVgqLq.exe = "0" WtsViihOsPSQ7UUIBzLVgqLq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 40 1324 u3ks.0.exe 45 1324 u3ks.0.exe -
pid Process 2484 powershell.exe 504 powershell.exe 1660 powershell.exe 4052 powershell.exe 1448 powershell.exe 4112 powershell.exe 4604 powershell.exe 512 powershell.exe 2520 powershell.exe 1968 powershell.exe 2204 powershell.exe 4472 powershell.exe 4472 powershell.exe 1784 powershell.exe 5060 powershell.exe 2896 powershell.exe 3560 powershell.exe 4320 powershell.exe 4976 powershell.exe 2680 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 4488 netsh.exe 4952 netsh.exe 4164 netsh.exe 516 netsh.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MqTrZaalfvE8qBZD76e7LWCL.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\g9HHffHvHWkA5HFHyXQtJHxt.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CHsU5cNqhCr36G9QN3FjjiVP.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aWZeUlLR8wxVB6E2N2VR9JvG.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tzLU2kOZ71weVu54dZGp6rHp.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lF1CCG9qn3kxjbH3dKJHJUiQ.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AaLJpxSgPzIL0hLRf5CnHKf4.bat installutil.exe -
Executes dropped EXE 12 IoCs
pid Process 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe 920 WtsViihOsPSQ7UUIBzLVgqLq.exe 1828 llfKXf1yeHXHusdsJEOuEUmt.exe 1324 u3ks.0.exe 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 192 WtsViihOsPSQ7UUIBzLVgqLq.exe 2500 llfKXf1yeHXHusdsJEOuEUmt.exe 4608 u3ks.1.exe 1844 wLkK5x9eg8eXLZKKRbVLP7BN.exe 4368 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 u3ks.0.exe 1324 u3ks.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000a00000001ac3c-4982.dat upx behavioral2/memory/4036-4986-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1936-4993-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\GGsU4X6VMQN31vaf0D0hEU8V.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\WtsViihOsPSQ7UUIBzLVgqLq.exe = "0" WtsViihOsPSQ7UUIBzLVgqLq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" GGsU4X6VMQN31vaf0D0hEU8V.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" WtsViihOsPSQ7UUIBzLVgqLq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 524 set thread context of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN GGsU4X6VMQN31vaf0D0hEU8V.exe File opened (read-only) \??\VBoxMiniRdrDN WtsViihOsPSQ7UUIBzLVgqLq.exe File opened (read-only) \??\VBoxMiniRdrDN llfKXf1yeHXHusdsJEOuEUmt.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss GGsU4X6VMQN31vaf0D0hEU8V.exe File created C:\Windows\rss\csrss.exe GGsU4X6VMQN31vaf0D0hEU8V.exe File opened for modification C:\Windows\rss WtsViihOsPSQ7UUIBzLVgqLq.exe File created C:\Windows\rss\csrss.exe WtsViihOsPSQ7UUIBzLVgqLq.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4200 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3ks.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3ks.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3ks.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3ks.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3ks.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1948 schtasks.exe 1968 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" GGsU4X6VMQN31vaf0D0hEU8V.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2680 powershell.exe 2680 powershell.exe 2680 powershell.exe 2484 powershell.exe 2484 powershell.exe 2484 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe 920 WtsViihOsPSQ7UUIBzLVgqLq.exe 920 WtsViihOsPSQ7UUIBzLVgqLq.exe 512 powershell.exe 512 powershell.exe 512 powershell.exe 512 powershell.exe 1828 llfKXf1yeHXHusdsJEOuEUmt.exe 1828 llfKXf1yeHXHusdsJEOuEUmt.exe 1324 u3ks.0.exe 1324 u3ks.0.exe 1448 powershell.exe 1448 powershell.exe 1448 powershell.exe 1448 powershell.exe 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 504 powershell.exe 504 powershell.exe 504 powershell.exe 504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 3612 installutil.exe Token: SeIncreaseQuotaPrivilege 2680 powershell.exe Token: SeSecurityPrivilege 2680 powershell.exe Token: SeTakeOwnershipPrivilege 2680 powershell.exe Token: SeLoadDriverPrivilege 2680 powershell.exe Token: SeSystemProfilePrivilege 2680 powershell.exe Token: SeSystemtimePrivilege 2680 powershell.exe Token: SeProfSingleProcessPrivilege 2680 powershell.exe Token: SeIncBasePriorityPrivilege 2680 powershell.exe Token: SeCreatePagefilePrivilege 2680 powershell.exe Token: SeBackupPrivilege 2680 powershell.exe Token: SeRestorePrivilege 2680 powershell.exe Token: SeShutdownPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeSystemEnvironmentPrivilege 2680 powershell.exe Token: SeRemoteShutdownPrivilege 2680 powershell.exe Token: SeUndockPrivilege 2680 powershell.exe Token: SeManageVolumePrivilege 2680 powershell.exe Token: 33 2680 powershell.exe Token: 34 2680 powershell.exe Token: 35 2680 powershell.exe Token: 36 2680 powershell.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 4052 powershell.exe Token: SeDebugPrivilege 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe Token: SeImpersonatePrivilege 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe Token: SeDebugPrivilege 920 WtsViihOsPSQ7UUIBzLVgqLq.exe Token: SeImpersonatePrivilege 920 WtsViihOsPSQ7UUIBzLVgqLq.exe Token: SeDebugPrivilege 512 powershell.exe Token: SeDebugPrivilege 1828 llfKXf1yeHXHusdsJEOuEUmt.exe Token: SeImpersonatePrivilege 1828 llfKXf1yeHXHusdsJEOuEUmt.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeDebugPrivilege 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe Token: SeImpersonatePrivilege 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeDebugPrivilege 3036 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 504 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 4472 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe 4608 u3ks.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 524 wrote to memory of 2680 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 74 PID 524 wrote to memory of 2680 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 74 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 524 wrote to memory of 3612 524 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe 76 PID 3612 wrote to memory of 4636 3612 installutil.exe 80 PID 3612 wrote to memory of 4636 3612 installutil.exe 80 PID 3612 wrote to memory of 4636 3612 installutil.exe 80 PID 3612 wrote to memory of 2512 3612 installutil.exe 81 PID 3612 wrote to memory of 2512 3612 installutil.exe 81 PID 3612 wrote to memory of 2512 3612 installutil.exe 81 PID 3612 wrote to memory of 920 3612 installutil.exe 82 PID 3612 wrote to memory of 920 3612 installutil.exe 82 PID 3612 wrote to memory of 920 3612 installutil.exe 82 PID 3612 wrote to memory of 1828 3612 installutil.exe 83 PID 3612 wrote to memory of 1828 3612 installutil.exe 83 PID 3612 wrote to memory of 1828 3612 installutil.exe 83 PID 4636 wrote to memory of 1324 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 84 PID 4636 wrote to memory of 1324 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 84 PID 4636 wrote to memory of 1324 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 84 PID 2512 wrote to memory of 2484 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe 87 PID 2512 wrote to memory of 2484 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe 87 PID 2512 wrote to memory of 2484 2512 GGsU4X6VMQN31vaf0D0hEU8V.exe 87 PID 3612 wrote to memory of 4148 3612 installutil.exe 89 PID 3612 wrote to memory of 4148 3612 installutil.exe 89 PID 3612 wrote to memory of 4148 3612 installutil.exe 89 PID 920 wrote to memory of 4052 920 WtsViihOsPSQ7UUIBzLVgqLq.exe 90 PID 920 wrote to memory of 4052 920 WtsViihOsPSQ7UUIBzLVgqLq.exe 90 PID 920 wrote to memory of 4052 920 WtsViihOsPSQ7UUIBzLVgqLq.exe 90 PID 1828 wrote to memory of 512 1828 llfKXf1yeHXHusdsJEOuEUmt.exe 96 PID 1828 wrote to memory of 512 1828 llfKXf1yeHXHusdsJEOuEUmt.exe 96 PID 1828 wrote to memory of 512 1828 llfKXf1yeHXHusdsJEOuEUmt.exe 96 PID 4636 wrote to memory of 4608 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 99 PID 4636 wrote to memory of 4608 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 99 PID 4636 wrote to memory of 4608 4636 dTeKNkc9OawaO1sVTZuEd1xs.exe 99 PID 4148 wrote to memory of 1448 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe 101 PID 4148 wrote to memory of 1448 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe 101 PID 4148 wrote to memory of 1448 4148 wLkK5x9eg8eXLZKKRbVLP7BN.exe 101 PID 2492 wrote to memory of 5060 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 104 PID 2492 wrote to memory of 5060 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 104 PID 2492 wrote to memory of 5060 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 104 PID 4608 wrote to memory of 3036 4608 u3ks.1.exe 106 PID 4608 wrote to memory of 3036 4608 u3ks.1.exe 106 PID 2492 wrote to memory of 2376 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 107 PID 2492 wrote to memory of 2376 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 107 PID 2376 wrote to memory of 4952 2376 cmd.exe 109 PID 2376 wrote to memory of 4952 2376 cmd.exe 109 PID 2492 wrote to memory of 504 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 110 PID 2492 wrote to memory of 504 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 110 PID 2492 wrote to memory of 504 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 110 PID 2492 wrote to memory of 2896 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 113 PID 2492 wrote to memory of 2896 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 113 PID 2492 wrote to memory of 2896 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 113 PID 192 wrote to memory of 2520 192 WtsViihOsPSQ7UUIBzLVgqLq.exe 115 PID 192 wrote to memory of 2520 192 WtsViihOsPSQ7UUIBzLVgqLq.exe 115 PID 192 wrote to memory of 2520 192 WtsViihOsPSQ7UUIBzLVgqLq.exe 115 PID 2492 wrote to memory of 4368 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 117 PID 2492 wrote to memory of 4368 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 117 PID 2492 wrote to memory of 4368 2492 GGsU4X6VMQN31vaf0D0hEU8V.exe 117 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe"C:\Users\Admin\AppData\Local\Temp\5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\Pictures\dTeKNkc9OawaO1sVTZuEd1xs.exe"C:\Users\Admin\Pictures\dTeKNkc9OawaO1sVTZuEd1xs.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\u3ks.0.exe"C:\Users\Admin\AppData\Local\Temp\u3ks.0.exe"4⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\u3ks.1.exe"C:\Users\Admin\AppData\Local\Temp\u3ks.1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
-
C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe"C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe"C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4952
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:1660
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1948
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:4604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:1312
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1968
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:4036
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1780
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4200
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe"C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe"C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4684
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4164
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
-
-
C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe"C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe"C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:2500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:748
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:516
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
-
-
C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe"C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe"C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe"4⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
PID:4472
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3528
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4488
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
PID:1784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
PID:4320
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
19KB
MD527994b31c693a5b6447dbbb7753f1569
SHA14771802dbacf5f1f2132cef4db4703000842eb70
SHA25675efe12cf71737d2cb76e532978a1d0da62200ffa97539e1d7427f00430685d8
SHA5122fa1d013e630ae0bc58244a238c204ef2b60538d719eed774d1280ec0357e6afae223b92a109a0db816c8207b51f08bca708ed199d05bf6781c8d671c9a820a4
-
Filesize
19KB
MD56a195225b902318a70dfb4d66a20803f
SHA1c9a5f886bfb8ced376ada34a5a6d069cd634789a
SHA2568f42f0379f1998fc2f3815a640fe4c62099464e6f9d0d44a95a476dd7c9af750
SHA512500f3f90d722c14a5e30c0604796d7feff83e064c6ac3ba8f8ab696a73524caad545959f66336a22977b3ff108b1e92ebbcd230be379157b2bbba94fc61dd4bf
-
Filesize
19KB
MD5fde35998ebc02cae4bb8d22139bf5ea9
SHA162d2ac16c20bd2af1d7695d6624ee405bd0fd226
SHA256512ba43b0ec696803d3a000cb6031ae8beb7ed1ecd081a217785018471fef96b
SHA5125b2395cc059846ac2531957731b953d7c94a07a426edbf0a5ba6ffabe8e411a23ade7ba3e2cd287a7f7f6bad3efec7f82ec9847eca1ae25260d040e1193f5c87
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
3KB
MD5571244e983c64dd39af6023ef9cff0d6
SHA13a6248c9bbc3cea185424b28d7875fe20b3b855a
SHA2560130acefaf21d6a9c13ed714097e3881082d4347ba87323ccc8d6787d0e61b1f
SHA512b63e1b072c6460c74cf2473bc47fc185a471b81d3578f4b05caf189997c8790c44116e42ed7504984d91f6ccaa19393527cf8176754ce8129862a71964abb618
-
Filesize
206KB
MD50917be53327ea132956255dcab650a82
SHA1b60818917f645a8a9af3b530e3ae37c1f002be2f
SHA256211c34660898480e0777c6ef6f61bf2111f6550e00b40cab859543d567dc455a
SHA512a72acc24ba813d983bbf2ecab7929d0aab4e25637ae43e85b973a5105429bd15c061415fd855737620caaf81b456b2d6ba57f85566245efbe5f8b5db5560932a
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
4.1MB
MD5f6156b63d313f7247432a693de39daef
SHA1bff890bf23551db49d04af57779630bea35356a9
SHA256f148a51481ad34b81dbdc1c27873ca0e4d56c83729dcf8ed891f4443f5492620
SHA51254c61e755d5661da14ebfef93b9fa61d02f59fb43edc1310cf21c0780479bc54be973836286f0d5104a946e9d511e94162d38e2a5471f0f386b7b7e396e7f759
-
Filesize
18KB
MD5949f191270e024e75823b32174f15754
SHA1e2685aee44aaee2bc87888ee7c86d77bba313eae
SHA256c3356a89f9d9962232df6a5d6dbfb42a9e2b2578b2a8d89c20b61c4c2e72c71c
SHA512d3eea70b18938ab93b4d659a0dcb793ab1f440614763b005c9e3f9bf36e4ad49c87cd9d436d2821c34c194a6ec384c57351be4bf9164caaf269046d29c01a55a
-
Filesize
4.1MB
MD50ed8d071deae90ff638cb070d0b9559d
SHA19b39b4703ccd78d9ca56bbf2f4c168d71a7bcfda
SHA256691bddda01382e95f74905b1fc77da9acbb73383734ca3116075be2c7d62cf99
SHA512960a5a4e2b4f82bb7273cbab8bf622933c6e603cdc44b59b409c285b62c3a2c741bca7692ed77864520aa95c85a2f3fc31ddc9383caada588828d953346c2729
-
Filesize
384KB
MD5a09d068dbe8e20e489d1d16a67fa9c92
SHA11ab47f34b06ce91e99ed260563ff431b776df525
SHA2563a6571ca197b5ee4a0bf6d2cf32e4f35c133ce313253c9ed2b07977c22518842
SHA512ea4a0b72c3dbdee23413216a3740826ff19db61a14724541d7046c1ae590392a235c58763524f7c490bd9d34f112f511c86669cd019c6b4dcd48ef47157892c5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5535e663188020110bb570f5298534579
SHA189e8e954446b4cbab9bd0a89d6cef8395b438b07
SHA256bf7b1e1c450321217916a3eab63aef5f61f0ffd1cb0268511e7bbb1be9fb0d1d
SHA5125cdd951b3d9f6439b27499542ce892a6459bfee965fae5c7db22e16fb765d37a7fae4e0fc4e23c2a7d46b474222e30ece5578fc4f5b5b6a1bb1e73f8182cb2a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD547189053c3cdc5ccdbed853c21813d3f
SHA144cae175853c3ad24e9c34b82eddb861a3530d23
SHA256afb3f88e9d8bee2d354a89ae9a57ce60c5d818e52166f707342df7204ab2ad99
SHA5125aff4d3390235d33d9f48e2fff2d4c51e7612b09c45c80956abc7ca48e9142e1cee76673de4ac88dff1cc407e4d11ddd5f34c459dfb253ea5f1e7a3a1d76b4af
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c5f70626b31a7992d1cf3c0dd0df2f5a
SHA10e54481ed2433422d1913adbaef0a61aeca0bf0e
SHA25603ccff5cd54d6a45c230f0915fd67da4ad459a728690d1bde43f22b06e637057
SHA512d4f9190f3f07d1438f79681bb3a92132c2321e368ee56c1a069dee96073fbc42451a9db26688e924c0760ee35b8d29a88556b0cee8e1abc9d26f662c7d4c1eac
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f9855ba44d975b755ac00879e40eae9b
SHA1532cf7289942d16a74cb27c63215d41ee9508b21
SHA25677899e1e661ffd7b0f39f39d765275dbb0f4f874f9b0ae1304aa0414403f40a3
SHA512673ffe4cec75b2424d327b43b75c382201130a70eb6abc6c5f92296af34ff61ba08b6c3ada40c2ccc880f68c47bc0fcc9ca1c28821dee7e17310c40155ff6ac2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD576d7528e9ef41cdb96dc6fe63f422884
SHA1f9e88a28fdd2e358afeb94631afbabb0b2945cde
SHA256fc65bbfb54fbf2273ddcb61bf0a41541a0319d88fbca87ad8afe2692be923d21
SHA51261e549c0683bc0eee16c3ace98faedab57c682658d4791c23015ecb2d7bc4cd4f5802ab9af7e5bd8f0ea0e4b4a637303502d54270eebc3766a716bdbc20f1a58
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD510b869d34eb842c17167bf65daeb28c3
SHA1ffde178a40d5c56c73d46d19a5101d8365a3dc07
SHA2565404ea2530bda1704bdc2a11fcc3f8adf13ac82f2bb84e632779c7d3c9430161
SHA51203f139eb84ce079e577facd92ef2ed81762070726d0cad756675d90d8e11edea5e1bb3c300fc7f671839cf8e83a95be77966f8508e18f0a72b60647ece4de413
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5cd4704699a42c862a75926c70ac84c05
SHA199d5052e96af1dbb0c974346a70cd419dd6b1307
SHA2569891a37fe77048309b9da4ecd43212e887915f65ead0b94b73493825874055b2
SHA5127ee3c1a43ec4895ce654c785a697ea404f0647b7cf1bdc6821b09efd4d66aff44d2e799abe5542ec1d4c69e3febe39e2b97515deb75e6c650dd55619fd611f92
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50eb067f72dcce7bea6e0e24da64206d5
SHA16a55c7cb6cd1fe39b022b566bf95895eb092b8d8
SHA256de5346d8ef765d337f01e778d2d71830ca55111ce100e7891a99eb21249f06eb
SHA512ac23e32488c5d980f3c384ec5c9b230b46011d686a9e2bddf9215e57ad0796fb5dfe3c0d1400138f0bcde649e15a058faa6e54208e04953f8f1f357a8965146e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57ff829e4e4a09126837828b899ea4842
SHA1777a49df3327550839c7046847d3955c9c71b9bb
SHA25684dbe7d8a63523e568e1ca008e5aee7670527320370c167bd00358eee8cedcdf
SHA512fd546f72051a75b9db54775da73a11379d1a23fcca263de611438c347043c9b4cc82c0684b58e7dacb40af96e8cd6767ac24a779cfae232a2fe4ec4901140014
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a5ecab279b9aceb29ac72de80f0f0d88
SHA157a7585e1799245f03ad68b2771e1f0c8e550b32
SHA2563890ee352578cdfd7303bba09c6723a8fa2b549667ddb8dcb4af32269a127486
SHA51238f3c1155f171f498620259d52cfab88e627222e94284bd5f5784b6caf91ab9e3de303dc7046f4d6acb07d1709176448b7da4c6b2ac55e01bc1c92cf8b719672
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f157810b3eb026c09e6bf447eff5e2c0
SHA1eb908b2910dec87f008ccbcd2a2a0ed06080e178
SHA2566d8273ee566e1a5df764b872f0a946cfb1a93216f83e60798eaf67e0030adb7f
SHA512464c733e413be5e56f98c2d3f8b619b3639c4af72c3c69079340f62a45210f86afebf096de67e878b9c9e509306c1dae33dca891a60867296b22666f50fc4210
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5753d79b892721c479aaca41f1258fcd0
SHA17d54a903f00a63e68b760d3923e2396983411060
SHA256e227b9def6cf8884358d99635c8fb9d63a9c14cf8203409914fd41077dac3145
SHA512a402d01205eb285113b9abd49a508ef9aa6df3d6c92022b7bbf5c5080cdf4237fd90de266b3b0f99b197d0f432b948fb7ec116740563649d03de6c4d214352ee
-
Filesize
3.6MB
MD5284eed1a8b6af9f60ddc64d1019163cc
SHA1ab44d6ca9df9587719a38c398978c0b9453d0583
SHA256b33e8b9c2ba6e4acb040e0c206b26f726a6c6848368f122fc8d0abe2d12170b2
SHA512224b75f102c810cc8ac9f69f58aca8ccdfb88eb3cd15d02c67dd0b7db125b3b3f5110f83bdb1ba2025e0f2190f0f1b17d4c7ce3179cced3ce1271357f71471ce
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
448KB
MD5443fe66e1060dc0d7348b12abadf1e11
SHA133993c07da0464d5582a7449ed323384deb24d92
SHA256c1166b3cf1d10e26724bcfacfa93c9d8b77706132cfd8ed357c34759341c0a5d
SHA5123c335e57a4e4693d6dcffdacc0e5b8dbb8b5a29eef8bce913c256a159529855f6aa30a041c8254e6787ef488d585c85646a1307aa4bbb701ea9ede13205db024